Action not permitted
Modal body text goes here.
Modal Title
Modal Body
CVE-2025-40201 (GCVE-0-2025-40201)
Vulnerability from cvelistv5 – Published: 2025-11-12 21:56 – Updated: 2025-12-01 06:20| Vendor | Product | Version | ||
|---|---|---|---|---|
| Linux | Linux |
Affected:
18c91bb2d87268d23868bf13508f5bc9cf04e89a , < 1bc0d9315ef5296abb2c9fd840336255850ded18
(git)
Affected: 18c91bb2d87268d23868bf13508f5bc9cf04e89a , < 132f827e7bac7373e1522e89709d70b43cae5342 (git) Affected: 18c91bb2d87268d23868bf13508f5bc9cf04e89a , < 19b45c84bd9fd42fa97ff80c6350d604cb871c75 (git) Affected: 18c91bb2d87268d23868bf13508f5bc9cf04e89a , < 6796412decd2d8de8ec708213bbc958fab72f143 (git) Affected: 18c91bb2d87268d23868bf13508f5bc9cf04e89a , < a15f37a40145c986cdf289a4b88390f35efdecc4 (git) |
||
{
"containers": {
"cna": {
"affected": [
{
"defaultStatus": "unaffected",
"product": "Linux",
"programFiles": [
"kernel/sys.c"
],
"repo": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git",
"vendor": "Linux",
"versions": [
{
"lessThan": "1bc0d9315ef5296abb2c9fd840336255850ded18",
"status": "affected",
"version": "18c91bb2d87268d23868bf13508f5bc9cf04e89a",
"versionType": "git"
},
{
"lessThan": "132f827e7bac7373e1522e89709d70b43cae5342",
"status": "affected",
"version": "18c91bb2d87268d23868bf13508f5bc9cf04e89a",
"versionType": "git"
},
{
"lessThan": "19b45c84bd9fd42fa97ff80c6350d604cb871c75",
"status": "affected",
"version": "18c91bb2d87268d23868bf13508f5bc9cf04e89a",
"versionType": "git"
},
{
"lessThan": "6796412decd2d8de8ec708213bbc958fab72f143",
"status": "affected",
"version": "18c91bb2d87268d23868bf13508f5bc9cf04e89a",
"versionType": "git"
},
{
"lessThan": "a15f37a40145c986cdf289a4b88390f35efdecc4",
"status": "affected",
"version": "18c91bb2d87268d23868bf13508f5bc9cf04e89a",
"versionType": "git"
}
]
},
{
"defaultStatus": "affected",
"product": "Linux",
"programFiles": [
"kernel/sys.c"
],
"repo": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git",
"vendor": "Linux",
"versions": [
{
"status": "affected",
"version": "5.18"
},
{
"lessThan": "5.18",
"status": "unaffected",
"version": "0",
"versionType": "semver"
},
{
"lessThanOrEqual": "6.1.*",
"status": "unaffected",
"version": "6.1.157",
"versionType": "semver"
},
{
"lessThanOrEqual": "6.6.*",
"status": "unaffected",
"version": "6.6.113",
"versionType": "semver"
},
{
"lessThanOrEqual": "6.12.*",
"status": "unaffected",
"version": "6.12.54",
"versionType": "semver"
},
{
"lessThanOrEqual": "6.17.*",
"status": "unaffected",
"version": "6.17.4",
"versionType": "semver"
},
{
"lessThanOrEqual": "*",
"status": "unaffected",
"version": "6.18",
"versionType": "original_commit_for_fix"
}
]
}
],
"cpeApplicability": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionEndExcluding": "6.1.157",
"versionStartIncluding": "5.18",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionEndExcluding": "6.6.113",
"versionStartIncluding": "5.18",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionEndExcluding": "6.12.54",
"versionStartIncluding": "5.18",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionEndExcluding": "6.17.4",
"versionStartIncluding": "5.18",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionEndExcluding": "6.18",
"versionStartIncluding": "5.18",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
}
],
"descriptions": [
{
"lang": "en",
"value": "In the Linux kernel, the following vulnerability has been resolved:\n\nkernel/sys.c: fix the racy usage of task_lock(tsk-\u003egroup_leader) in sys_prlimit64() paths\n\nThe usage of task_lock(tsk-\u003egroup_leader) in sys_prlimit64()-\u003edo_prlimit()\npath is very broken.\n\nsys_prlimit64() does get_task_struct(tsk) but this only protects task_struct\nitself. If tsk != current and tsk is not a leader, this process can exit/exec\nand task_lock(tsk-\u003egroup_leader) may use the already freed task_struct.\n\nAnother problem is that sys_prlimit64() can race with mt-exec which changes\n-\u003egroup_leader. In this case do_prlimit() may take the wrong lock, or (worse)\n-\u003egroup_leader may change between task_lock() and task_unlock().\n\nChange sys_prlimit64() to take tasklist_lock when necessary. This is not\nnice, but I don\u0027t see a better fix for -stable."
}
],
"providerMetadata": {
"dateUpdated": "2025-12-01T06:20:03.758Z",
"orgId": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"shortName": "Linux"
},
"references": [
{
"url": "https://git.kernel.org/stable/c/1bc0d9315ef5296abb2c9fd840336255850ded18"
},
{
"url": "https://git.kernel.org/stable/c/132f827e7bac7373e1522e89709d70b43cae5342"
},
{
"url": "https://git.kernel.org/stable/c/19b45c84bd9fd42fa97ff80c6350d604cb871c75"
},
{
"url": "https://git.kernel.org/stable/c/6796412decd2d8de8ec708213bbc958fab72f143"
},
{
"url": "https://git.kernel.org/stable/c/a15f37a40145c986cdf289a4b88390f35efdecc4"
}
],
"title": "kernel/sys.c: fix the racy usage of task_lock(tsk-\u003egroup_leader) in sys_prlimit64() paths",
"x_generator": {
"engine": "bippy-1.2.0"
}
}
},
"cveMetadata": {
"assignerOrgId": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"assignerShortName": "Linux",
"cveId": "CVE-2025-40201",
"datePublished": "2025-11-12T21:56:34.063Z",
"dateReserved": "2025-04-16T07:20:57.178Z",
"dateUpdated": "2025-12-01T06:20:03.758Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.2",
"vulnerability-lookup:meta": {
"nvd": "{\"cve\":{\"id\":\"CVE-2025-40201\",\"sourceIdentifier\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\",\"published\":\"2025-11-12T22:15:47.283\",\"lastModified\":\"2025-11-14T16:42:30.503\",\"vulnStatus\":\"Awaiting Analysis\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"In the Linux kernel, the following vulnerability has been resolved:\\n\\nkernel/sys.c: fix the racy usage of task_lock(tsk-\u003egroup_leader) in sys_prlimit64() paths\\n\\nThe usage of task_lock(tsk-\u003egroup_leader) in sys_prlimit64()-\u003edo_prlimit()\\npath is very broken.\\n\\nsys_prlimit64() does get_task_struct(tsk) but this only protects task_struct\\nitself. If tsk != current and tsk is not a leader, this process can exit/exec\\nand task_lock(tsk-\u003egroup_leader) may use the already freed task_struct.\\n\\nAnother problem is that sys_prlimit64() can race with mt-exec which changes\\n-\u003egroup_leader. In this case do_prlimit() may take the wrong lock, or (worse)\\n-\u003egroup_leader may change between task_lock() and task_unlock().\\n\\nChange sys_prlimit64() to take tasklist_lock when necessary. This is not\\nnice, but I don\u0027t see a better fix for -stable.\"}],\"metrics\":{},\"references\":[{\"url\":\"https://git.kernel.org/stable/c/132f827e7bac7373e1522e89709d70b43cae5342\",\"source\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\"},{\"url\":\"https://git.kernel.org/stable/c/19b45c84bd9fd42fa97ff80c6350d604cb871c75\",\"source\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\"},{\"url\":\"https://git.kernel.org/stable/c/1bc0d9315ef5296abb2c9fd840336255850ded18\",\"source\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\"},{\"url\":\"https://git.kernel.org/stable/c/6796412decd2d8de8ec708213bbc958fab72f143\",\"source\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\"},{\"url\":\"https://git.kernel.org/stable/c/a15f37a40145c986cdf289a4b88390f35efdecc4\",\"source\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\"}]}}"
}
}
CERTFR-2026-AVI-0169
Vulnerability from certfr_avis - Published: 2026-02-13 - Updated: 2026-02-13
De multiples vulnérabilités ont été découvertes dans le noyau Linux d'Ubuntu. Certaines d'entre elles permettent à un attaquant de provoquer une atteinte à la confidentialité des données, une atteinte à l'intégrité des données et un contournement de la politique de sécurité.
Solutions
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
None{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "Ubuntu 16.04 ESM",
"product": {
"name": "Ubuntu",
"vendor": {
"name": "Ubuntu",
"scada": false
}
}
},
{
"description": "Ubuntu 20.04 ESM",
"product": {
"name": "Ubuntu",
"vendor": {
"name": "Ubuntu",
"scada": false
}
}
},
{
"description": "Ubuntu 24.04 LTS",
"product": {
"name": "Ubuntu",
"vendor": {
"name": "Ubuntu",
"scada": false
}
}
},
{
"description": "Ubuntu 18.04 ESM",
"product": {
"name": "Ubuntu",
"vendor": {
"name": "Ubuntu",
"scada": false
}
}
},
{
"description": "Ubuntu 25.10",
"product": {
"name": "Ubuntu",
"vendor": {
"name": "Ubuntu",
"scada": false
}
}
},
{
"description": "Ubuntu 22.04 LTS",
"product": {
"name": "Ubuntu",
"vendor": {
"name": "Ubuntu",
"scada": false
}
}
}
],
"affected_systems_content": null,
"content": "## Solutions\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des correctifs (cf. section Documentation).",
"cves": [
{
"name": "CVE-2025-40296",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40296"
},
{
"name": "CVE-2025-40225",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40225"
},
{
"name": "CVE-2025-40166",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40166"
},
{
"name": "CVE-2025-40273",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40273"
},
{
"name": "CVE-2025-40064",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40064"
},
{
"name": "CVE-2025-38490",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38490"
},
{
"name": "CVE-2025-37850",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37850"
},
{
"name": "CVE-2025-38485",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38485"
},
{
"name": "CVE-2025-22026",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22026"
},
{
"name": "CVE-2025-39987",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39987"
},
{
"name": "CVE-2025-38579",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38579"
},
{
"name": "CVE-2025-68196",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68196"
},
{
"name": "CVE-2025-37761",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37761"
},
{
"name": "CVE-2025-21861",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21861"
},
{
"name": "CVE-2025-37865",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37865"
},
{
"name": "CVE-2025-38328",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38328"
},
{
"name": "CVE-2025-40156",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40156"
},
{
"name": "CVE-2025-38711",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38711"
},
{
"name": "CVE-2025-38487",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38487"
},
{
"name": "CVE-2025-40137",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40137"
},
{
"name": "CVE-2025-37775",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37775"
},
{
"name": "CVE-2025-38335",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38335"
},
{
"name": "CVE-2025-38304",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38304"
},
{
"name": "CVE-2025-37892",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37892"
},
{
"name": "CVE-2025-38100",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38100"
},
{
"name": "CVE-2025-37859",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37859"
},
{
"name": "CVE-2025-40002",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40002"
},
{
"name": "CVE-2025-40057",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40057"
},
{
"name": "CVE-2025-38043",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38043"
},
{
"name": "CVE-2025-38471",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38471"
},
{
"name": "CVE-2025-38520",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38520"
},
{
"name": "CVE-2025-37792",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37792"
},
{
"name": "CVE-2025-68240",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68240"
},
{
"name": "CVE-2025-38108",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38108"
},
{
"name": "CVE-2025-38230",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38230"
},
{
"name": "CVE-2025-38229",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38229"
},
{
"name": "CVE-2025-40055",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40055"
},
{
"name": "CVE-2025-38158",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38158"
},
{
"name": "CVE-2025-37872",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37872"
},
{
"name": "CVE-2025-38588",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38588"
},
{
"name": "CVE-2025-39876",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39876"
},
{
"name": "CVE-2025-40314",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40314"
},
{
"name": "CVE-2025-40029",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40029"
},
{
"name": "CVE-2025-40037",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40037"
},
{
"name": "CVE-2025-38279",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38279"
},
{
"name": "CVE-2025-38561",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38561"
},
{
"name": "CVE-2025-38574",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38574"
},
{
"name": "CVE-2025-40306",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40306"
},
{
"name": "CVE-2025-68210",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68210"
},
{
"name": "CVE-2025-40239",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40239"
},
{
"name": "CVE-2025-40147",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40147"
},
{
"name": "CVE-2025-40048",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40048"
},
{
"name": "CVE-2025-38147",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38147"
},
{
"name": "CVE-2025-23155",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-23155"
},
{
"name": "CVE-2025-38286",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38286"
},
{
"name": "CVE-2025-40219",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40219"
},
{
"name": "CVE-2025-39757",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39757"
},
{
"name": "CVE-2025-68200",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68200"
},
{
"name": "CVE-2025-38501",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38501"
},
{
"name": "CVE-2025-38474",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38474"
},
{
"name": "CVE-2025-37979",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37979"
},
{
"name": "CVE-2025-40043",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40043"
},
{
"name": "CVE-2024-50195",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50195"
},
{
"name": "CVE-2025-68176",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68176"
},
{
"name": "CVE-2025-37777",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37777"
},
{
"name": "CVE-2025-39772",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39772"
},
{
"name": "CVE-2025-68199",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68199"
},
{
"name": "CVE-2025-37936",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37936"
},
{
"name": "CVE-2025-68204",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68204"
},
{
"name": "CVE-2025-38601",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38601"
},
{
"name": "CVE-2025-37766",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37766"
},
{
"name": "CVE-2025-38104",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38104"
},
{
"name": "CVE-2025-37844",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37844"
},
{
"name": "CVE-2025-21931",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21931"
},
{
"name": "CVE-2025-37871",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37871"
},
{
"name": "CVE-2025-37778",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37778"
},
{
"name": "CVE-2025-39716",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39716"
},
{
"name": "CVE-2025-39702",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39702"
},
{
"name": "CVE-2024-56606",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56606"
},
{
"name": "CVE-2025-39973",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39973"
},
{
"name": "CVE-2025-38515",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38515"
},
{
"name": "CVE-2025-38645",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38645"
},
{
"name": "CVE-2025-38163",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38163"
},
{
"name": "CVE-2025-22126",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22126"
},
{
"name": "CVE-2025-38444",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38444"
},
{
"name": "CVE-2025-38109",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38109"
},
{
"name": "CVE-2025-39779",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39779"
},
{
"name": "CVE-2025-37755",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37755"
},
{
"name": "CVE-2025-39685",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39685"
},
{
"name": "CVE-2025-38660",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38660"
},
{
"name": "CVE-2025-39761",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39761"
},
{
"name": "CVE-2025-68246",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68246"
},
{
"name": "CVE-2022-48986",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48986"
},
{
"name": "CVE-2025-40287",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40287"
},
{
"name": "CVE-2025-39943",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39943"
},
{
"name": "CVE-2025-39945",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39945"
},
{
"name": "CVE-2024-27078",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-27078"
},
{
"name": "CVE-2024-56756",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56756"
},
{
"name": "CVE-2025-39883",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39883"
},
{
"name": "CVE-2025-39720",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39720"
},
{
"name": "CVE-2025-38624",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38624"
},
{
"name": "CVE-2025-40100",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40100"
},
{
"name": "CVE-2025-40285",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40285"
},
{
"name": "CVE-2025-38388",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38388"
},
{
"name": "CVE-2025-38157",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38157"
},
{
"name": "CVE-2025-40063",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40063"
},
{
"name": "CVE-2025-37790",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37790"
},
{
"name": "CVE-2025-40208",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40208"
},
{
"name": "CVE-2025-39746",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39746"
},
{
"name": "CVE-2025-38323",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38323"
},
{
"name": "CVE-2025-40019",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40019"
},
{
"name": "CVE-2025-40039",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40039"
},
{
"name": "CVE-2025-38208",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38208"
},
{
"name": "CVE-2025-40240",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40240"
},
{
"name": "CVE-2025-38219",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38219"
},
{
"name": "CVE-2025-39889",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39889"
},
{
"name": "CVE-2025-38099",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38099"
},
{
"name": "CVE-2025-38524",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38524"
},
{
"name": "CVE-2025-38466",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38466"
},
{
"name": "CVE-2025-40117",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40117"
},
{
"name": "CVE-2025-37758",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37758"
},
{
"name": "CVE-2025-40081",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40081"
},
{
"name": "CVE-2025-38087",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38087"
},
{
"name": "CVE-2024-58011",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58011"
},
{
"name": "CVE-2025-38039",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38039"
},
{
"name": "CVE-2025-40026",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40026"
},
{
"name": "CVE-2025-40153",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40153"
},
{
"name": "CVE-2025-40103",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40103"
},
{
"name": "CVE-2025-40294",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40294"
},
{
"name": "CVE-2025-38595",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38595"
},
{
"name": "CVE-2025-38626",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38626"
},
{
"name": "CVE-2025-40356",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40356"
},
{
"name": "CVE-2025-40121",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40121"
},
{
"name": "CVE-2025-40312",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40312"
},
{
"name": "CVE-2025-40204",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40204"
},
{
"name": "CVE-2025-37852",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37852"
},
{
"name": "CVE-2025-37841",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37841"
},
{
"name": "CVE-2025-40171",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40171"
},
{
"name": "CVE-2025-37918",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37918"
},
{
"name": "CVE-2025-37917",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37917"
},
{
"name": "CVE-2025-38290",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38290"
},
{
"name": "CVE-2025-68243",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68243"
},
{
"name": "CVE-2025-38063",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38063"
},
{
"name": "CVE-2025-37770",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37770"
},
{
"name": "CVE-2025-37773",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37773"
},
{
"name": "CVE-2025-68175",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68175"
},
{
"name": "CVE-2025-40221",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40221"
},
{
"name": "CVE-2025-38578",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38578"
},
{
"name": "CVE-2025-40139",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40139"
},
{
"name": "CVE-2025-40056",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40056"
},
{
"name": "CVE-2025-38675",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38675"
},
{
"name": "CVE-2025-39911",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39911"
},
{
"name": "CVE-2025-38646",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38646"
},
{
"name": "CVE-2025-38491",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38491"
},
{
"name": "CVE-2025-38708",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38708"
},
{
"name": "CVE-2025-37961",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37961"
},
{
"name": "CVE-2025-68248",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68248"
},
{
"name": "CVE-2025-40125",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40125"
},
{
"name": "CVE-2025-40350",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40350"
},
{
"name": "CVE-2025-40309",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40309"
},
{
"name": "CVE-2025-38313",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38313"
},
{
"name": "CVE-2025-38336",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38336"
},
{
"name": "CVE-2025-40349",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40349"
},
{
"name": "CVE-2025-40052",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40052"
},
{
"name": "CVE-2025-38408",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38408"
},
{
"name": "CVE-2025-40343",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40343"
},
{
"name": "CVE-2025-38644",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38644"
},
{
"name": "CVE-2025-38692",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38692"
},
{
"name": "CVE-2025-38061",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38061"
},
{
"name": "CVE-2025-68173",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68173"
},
{
"name": "CVE-2025-37983",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37983"
},
{
"name": "CVE-2025-38127",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38127"
},
{
"name": "CVE-2025-38375",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38375"
},
{
"name": "CVE-2025-37784",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37784"
},
{
"name": "CVE-2025-39701",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39701"
},
{
"name": "CVE-2025-40308",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40308"
},
{
"name": "CVE-2025-40187",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40187"
},
{
"name": "CVE-2025-37920",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37920"
},
{
"name": "CVE-2025-40315",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40315"
},
{
"name": "CVE-2025-37815",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37815"
},
{
"name": "CVE-2025-38686",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38686"
},
{
"name": "CVE-2025-37819",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37819"
},
{
"name": "CVE-2025-39913",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39913"
},
{
"name": "CVE-2025-40092",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40092"
},
{
"name": "CVE-2025-40298",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40298"
},
{
"name": "CVE-2025-40355",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40355"
},
{
"name": "CVE-2025-38609",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38609"
},
{
"name": "CVE-2025-68186",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68186"
},
{
"name": "CVE-2025-39967",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39967"
},
{
"name": "CVE-2025-40054",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40054"
},
{
"name": "CVE-2025-68184",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68184"
},
{
"name": "CVE-2024-36357",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36357"
},
{
"name": "CVE-2025-38463",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38463"
},
{
"name": "CVE-2025-40115",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40115"
},
{
"name": "CVE-2025-38112",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38112"
},
{
"name": "CVE-2024-49959",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49959"
},
{
"name": "CVE-2025-38521",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38521"
},
{
"name": "CVE-2025-38023",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38023"
},
{
"name": "CVE-2025-39709",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39709"
},
{
"name": "CVE-2025-38282",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38282"
},
{
"name": "CVE-2025-39689",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39689"
},
{
"name": "CVE-2025-38215",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38215"
},
{
"name": "CVE-2025-39787",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39787"
},
{
"name": "CVE-2025-37943",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37943"
},
{
"name": "CVE-2025-37745",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37745"
},
{
"name": "CVE-2025-40058",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40058"
},
{
"name": "CVE-2025-39731",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39731"
},
{
"name": "CVE-2025-38734",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38734"
},
{
"name": "CVE-2025-38653",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38653"
},
{
"name": "CVE-2025-38571",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38571"
},
{
"name": "CVE-2025-37789",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37789"
},
{
"name": "CVE-2025-40347",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40347"
},
{
"name": "CVE-2025-38695",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38695"
},
{
"name": "CVE-2025-38004",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38004"
},
{
"name": "CVE-2025-39749",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39749"
},
{
"name": "CVE-2025-40198",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40198"
},
{
"name": "CVE-2025-68310",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68310"
},
{
"name": "CVE-2025-68179",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68179"
},
{
"name": "CVE-2025-40145",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40145"
},
{
"name": "CVE-2025-39949",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39949"
},
{
"name": "CVE-2025-38387",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38387"
},
{
"name": "CVE-2025-68169",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68169"
},
{
"name": "CVE-2025-38362",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38362"
},
{
"name": "CVE-2025-40173",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40173"
},
{
"name": "CVE-2025-68316",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68316"
},
{
"name": "CVE-2025-68321",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68321"
},
{
"name": "CVE-2025-37924",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37924"
},
{
"name": "CVE-2025-40004",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40004"
},
{
"name": "CVE-2025-38371",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38371"
},
{
"name": "CVE-2024-56538",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56538"
},
{
"name": "CVE-2025-39923",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39923"
},
{
"name": "CVE-2025-38445",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38445"
},
{
"name": "CVE-2025-38456",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38456"
},
{
"name": "CVE-2025-38538",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38538"
},
{
"name": "CVE-2025-37867",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37867"
},
{
"name": "CVE-2025-23160",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-23160"
},
{
"name": "CVE-2025-40311",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40311"
},
{
"name": "CVE-2025-38295",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38295"
},
{
"name": "CVE-2025-38461",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38461"
},
{
"name": "CVE-2025-37857",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37857"
},
{
"name": "CVE-2025-37842",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37842"
},
{
"name": "CVE-2025-40237",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40237"
},
{
"name": "CVE-2025-39953",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39953"
},
{
"name": "CVE-2025-38710",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38710"
},
{
"name": "CVE-2025-39681",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39681"
},
{
"name": "CVE-2025-38060",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38060"
},
{
"name": "CVE-2025-40167",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40167"
},
{
"name": "CVE-2025-38159",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38159"
},
{
"name": "CVE-2025-38066",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38066"
},
{
"name": "CVE-2025-39770",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39770"
},
{
"name": "CVE-2025-39969",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39969"
},
{
"name": "CVE-2025-37744",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37744"
},
{
"name": "CVE-2025-38705",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38705"
},
{
"name": "CVE-2025-40194",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40194"
},
{
"name": "CVE-2025-38706",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38706"
},
{
"name": "CVE-2025-40333",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40333"
},
{
"name": "CVE-2025-38305",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38305"
},
{
"name": "CVE-2025-37884",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37884"
},
{
"name": "CVE-2025-38067",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38067"
},
{
"name": "CVE-2025-39750",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39750"
},
{
"name": "CVE-2025-38699",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38699"
},
{
"name": "CVE-2025-37927",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37927"
},
{
"name": "CVE-2025-38707",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38707"
},
{
"name": "CVE-2025-38562",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38562"
},
{
"name": "CVE-2025-37897",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37897"
},
{
"name": "CVE-2025-40256",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40256"
},
{
"name": "CVE-2025-37911",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37911"
},
{
"name": "CVE-2025-40245",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40245"
},
{
"name": "CVE-2025-38587",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38587"
},
{
"name": "CVE-2025-37869",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37869"
},
{
"name": "CVE-2025-39692",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39692"
},
{
"name": "CVE-2025-40360",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40360"
},
{
"name": "CVE-2025-40332",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40332"
},
{
"name": "CVE-2025-40082",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40082"
},
{
"name": "CVE-2025-38068",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38068"
},
{
"name": "CVE-2025-38436",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38436"
},
{
"name": "CVE-2025-37930",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37930"
},
{
"name": "CVE-2025-40104",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40104"
},
{
"name": "CVE-2025-38401",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38401"
},
{
"name": "CVE-2025-38677",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38677"
},
{
"name": "CVE-2025-38097",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38097"
},
{
"name": "CVE-2025-37810",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37810"
},
{
"name": "CVE-2025-38253",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38253"
},
{
"name": "CVE-2025-40097",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40097"
},
{
"name": "CVE-2025-38123",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38123"
},
{
"name": "CVE-2025-38338",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38338"
},
{
"name": "CVE-2025-38555",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38555"
},
{
"name": "CVE-2025-38239",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38239"
},
{
"name": "CVE-2025-40001",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40001"
},
{
"name": "CVE-2025-38590",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38590"
},
{
"name": "CVE-2025-38027",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38027"
},
{
"name": "CVE-2025-38102",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38102"
},
{
"name": "CVE-2025-40035",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40035"
},
{
"name": "CVE-2025-68187",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68187"
},
{
"name": "CVE-2025-38283",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38283"
},
{
"name": "CVE-2025-40322",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40322"
},
{
"name": "CVE-2025-68209",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68209"
},
{
"name": "CVE-2025-40045",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40045"
},
{
"name": "CVE-2025-23159",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-23159"
},
{
"name": "CVE-2025-39988",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39988"
},
{
"name": "CVE-2025-38455",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38455"
},
{
"name": "CVE-2025-40313",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40313"
},
{
"name": "CVE-2025-40089",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40089"
},
{
"name": "CVE-2025-38584",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38584"
},
{
"name": "CVE-2025-38015",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38015"
},
{
"name": "CVE-2025-39675",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39675"
},
{
"name": "CVE-2025-39679",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39679"
},
{
"name": "CVE-2025-38527",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38527"
},
{
"name": "CVE-2025-38449",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38449"
},
{
"name": "CVE-2025-40233",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40233"
},
{
"name": "CVE-2025-40172",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40172"
},
{
"name": "CVE-2025-37853",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37853"
},
{
"name": "CVE-2025-38126",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38126"
},
{
"name": "CVE-2025-38149",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38149"
},
{
"name": "CVE-2025-39763",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39763"
},
{
"name": "CVE-2025-38399",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38399"
},
{
"name": "CVE-2025-40020",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40020"
},
{
"name": "CVE-2025-38065",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38065"
},
{
"name": "CVE-2025-38693",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38693"
},
{
"name": "CVE-2025-38679",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38679"
},
{
"name": "CVE-2025-38459",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38459"
},
{
"name": "CVE-2025-40188",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40188"
},
{
"name": "CVE-2025-40271",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40271"
},
{
"name": "CVE-2025-40291",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40291"
},
{
"name": "CVE-2025-38685",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38685"
},
{
"name": "CVE-2025-40359",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40359"
},
{
"name": "CVE-2025-38412",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38412"
},
{
"name": "CVE-2025-38031",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38031"
},
{
"name": "CVE-2025-40186",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40186"
},
{
"name": "CVE-2025-38293",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38293"
},
{
"name": "CVE-2025-40073",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40073"
},
{
"name": "CVE-2025-38648",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38648"
},
{
"name": "CVE-2025-38278",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38278"
},
{
"name": "CVE-2025-37764",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37764"
},
{
"name": "CVE-2025-38184",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38184"
},
{
"name": "CVE-2025-37741",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37741"
},
{
"name": "CVE-2025-38053",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38053"
},
{
"name": "CVE-2025-40242",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40242"
},
{
"name": "CVE-2025-37822",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37822"
},
{
"name": "CVE-2025-37912",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37912"
},
{
"name": "CVE-2025-38482",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38482"
},
{
"name": "CVE-2025-37820",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37820"
},
{
"name": "CVE-2025-68198",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68198"
},
{
"name": "CVE-2025-37985",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37985"
},
{
"name": "CVE-2025-68314",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68314"
},
{
"name": "CVE-2025-38634",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38634"
},
{
"name": "CVE-2025-40212",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40212"
},
{
"name": "CVE-2025-37787",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37787"
},
{
"name": "CVE-2025-38008",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38008"
},
{
"name": "CVE-2025-38458",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38458"
},
{
"name": "CVE-2025-39730",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39730"
},
{
"name": "CVE-2025-38011",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38011"
},
{
"name": "CVE-2025-68190",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68190"
},
{
"name": "CVE-2025-38034",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38034"
},
{
"name": "CVE-2025-40086",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40086"
},
{
"name": "CVE-2025-68242",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68242"
},
{
"name": "CVE-2025-38135",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38135"
},
{
"name": "CVE-2025-38619",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38619"
},
{
"name": "CVE-2025-40169",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40169"
},
{
"name": "CVE-2025-38312",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38312"
},
{
"name": "CVE-2025-38095",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38095"
},
{
"name": "CVE-2025-37878",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37878"
},
{
"name": "CVE-2025-39737",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39737"
},
{
"name": "CVE-2025-38464",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38464"
},
{
"name": "CVE-2025-40049",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40049"
},
{
"name": "CVE-2025-68322",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68322"
},
{
"name": "CVE-2025-38363",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38363"
},
{
"name": "CVE-2025-38702",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38702"
},
{
"name": "CVE-2025-38319",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38319"
},
{
"name": "CVE-2022-49698",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49698"
},
{
"name": "CVE-2025-40238",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40238"
},
{
"name": "CVE-2025-38724",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38724"
},
{
"name": "CVE-2025-68205",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68205"
},
{
"name": "CVE-2025-40277",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40277"
},
{
"name": "CVE-2025-40070",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40070"
},
{
"name": "CVE-2025-38250",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38250"
},
{
"name": "CVE-2025-38457",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38457"
},
{
"name": "CVE-2025-38582",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38582"
},
{
"name": "CVE-2025-37813",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37813"
},
{
"name": "CVE-2025-38543",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38543"
},
{
"name": "CVE-2025-38698",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38698"
},
{
"name": "CVE-2025-38212",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38212"
},
{
"name": "CVE-2025-40106",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40106"
},
{
"name": "CVE-2025-68174",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68174"
},
{
"name": "CVE-2025-38298",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38298"
},
{
"name": "CVE-2025-40272",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40272"
},
{
"name": "CVE-2025-39739",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39739"
},
{
"name": "CVE-2025-38024",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38024"
},
{
"name": "CVE-2025-40047",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40047"
},
{
"name": "CVE-2025-38496",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38496"
},
{
"name": "CVE-2025-38078",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38078"
},
{
"name": "CVE-2025-38419",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38419"
},
{
"name": "CVE-2025-40136",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40136"
},
{
"name": "CVE-2025-38533",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38533"
},
{
"name": "CVE-2025-40344",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40344"
},
{
"name": "CVE-2025-40205",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40205"
},
{
"name": "CVE-2025-40354",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40354"
},
{
"name": "CVE-2025-38169",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38169"
},
{
"name": "CVE-2025-37931",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37931"
},
{
"name": "CVE-2025-38511",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38511"
},
{
"name": "CVE-2025-38537",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38537"
},
{
"name": "CVE-2025-38546",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38546"
},
{
"name": "CVE-2025-38211",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38211"
},
{
"name": "CVE-2025-40033",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40033"
},
{
"name": "CVE-2025-38057",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38057"
},
{
"name": "CVE-2025-40122",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40122"
},
{
"name": "CVE-2025-68188",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68188"
},
{
"name": "CVE-2025-40269",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40269"
},
{
"name": "CVE-2025-37887",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37887"
},
{
"name": "CVE-2025-38077",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38077"
},
{
"name": "CVE-2025-38251",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38251"
},
{
"name": "CVE-2025-37861",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37861"
},
{
"name": "CVE-2025-68319",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68319"
},
{
"name": "CVE-2025-40119",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40119"
},
{
"name": "CVE-2025-38120",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38120"
},
{
"name": "CVE-2025-38285",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38285"
},
{
"name": "CVE-2025-39743",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39743"
},
{
"name": "CVE-2025-39718",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39718"
},
{
"name": "CVE-2025-37938",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37938"
},
{
"name": "CVE-2025-38005",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38005"
},
{
"name": "CVE-2025-38368",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38368"
},
{
"name": "CVE-2025-40075",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40075"
},
{
"name": "CVE-2025-38161",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38161"
},
{
"name": "CVE-2025-38331",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38331"
},
{
"name": "CVE-2025-38354",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38354"
},
{
"name": "CVE-2025-40138",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40138"
},
{
"name": "CVE-2025-38712",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38712"
},
{
"name": "CVE-2025-38732",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38732"
},
{
"name": "CVE-2025-39773",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39773"
},
{
"name": "CVE-2025-38696",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38696"
},
{
"name": "CVE-2025-40143",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40143"
},
{
"name": "CVE-2025-68189",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68189"
},
{
"name": "CVE-2025-38274",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38274"
},
{
"name": "CVE-2025-40076",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40076"
},
{
"name": "CVE-2025-40027",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40027"
},
{
"name": "CVE-2025-39885",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39885"
},
{
"name": "CVE-2025-68180",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68180"
},
{
"name": "CVE-2025-37874",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37874"
},
{
"name": "CVE-2025-38115",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38115"
},
{
"name": "CVE-2025-38632",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38632"
},
{
"name": "CVE-2025-37988",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37988"
},
{
"name": "CVE-2025-23158",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-23158"
},
{
"name": "CVE-2025-23144",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-23144"
},
{
"name": "CVE-2025-38153",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38153"
},
{
"name": "CVE-2025-37969",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37969"
},
{
"name": "CVE-2025-38548",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38548"
},
{
"name": "CVE-2025-37816",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37816"
},
{
"name": "CVE-2025-40362",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40362"
},
{
"name": "CVE-2025-37742",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37742"
},
{
"name": "CVE-2025-68201",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68201"
},
{
"name": "CVE-2025-40289",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40289"
},
{
"name": "CVE-2025-37765",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37765"
},
{
"name": "CVE-2025-38395",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38395"
},
{
"name": "CVE-2025-37921",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37921"
},
{
"name": "CVE-2025-38507",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38507"
},
{
"name": "CVE-2025-40230",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40230"
},
{
"name": "CVE-2025-39989",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39989"
},
{
"name": "CVE-2025-38337",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38337"
},
{
"name": "CVE-2025-38014",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38014"
},
{
"name": "CVE-2025-38258",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38258"
},
{
"name": "CVE-2025-37828",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37828"
},
{
"name": "CVE-2025-37769",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37769"
},
{
"name": "CVE-2025-38465",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38465"
},
{
"name": "CVE-2025-38513",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38513"
},
{
"name": "CVE-2025-39970",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39970"
},
{
"name": "CVE-2025-40292",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40292"
},
{
"name": "CVE-2025-38086",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38086"
},
{
"name": "CVE-2025-68181",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68181"
},
{
"name": "CVE-2025-37935",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37935"
},
{
"name": "CVE-2025-40032",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40032"
},
{
"name": "CVE-2025-38396",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38396"
},
{
"name": "CVE-2025-23161",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-23161"
},
{
"name": "CVE-2025-38407",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38407"
},
{
"name": "CVE-2025-39994",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39994"
},
{
"name": "CVE-2025-38493",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38493"
},
{
"name": "CVE-2025-37803",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37803"
},
{
"name": "CVE-2025-40228",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40228"
},
{
"name": "CVE-2025-40150",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40150"
},
{
"name": "CVE-2025-38670",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38670"
},
{
"name": "CVE-2025-39732",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39732"
},
{
"name": "CVE-2025-37824",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37824"
},
{
"name": "CVE-2025-40274",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40274"
},
{
"name": "CVE-2025-38602",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38602"
},
{
"name": "CVE-2025-38003",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38003"
},
{
"name": "CVE-2025-38441",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38441"
},
{
"name": "CVE-2025-40206",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40206"
},
{
"name": "CVE-2025-40218",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40218"
},
{
"name": "CVE-2025-38007",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38007"
},
{
"name": "CVE-2025-37923",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37923"
},
{
"name": "CVE-2025-40088",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40088"
},
{
"name": "CVE-2025-40220",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40220"
},
{
"name": "CVE-2025-38142",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38142"
},
{
"name": "CVE-2025-37739",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37739"
},
{
"name": "CVE-2025-38478",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38478"
},
{
"name": "CVE-2025-38568",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38568"
},
{
"name": "CVE-2025-38583",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38583"
},
{
"name": "CVE-2025-39788",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39788"
},
{
"name": "CVE-2025-22058",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22058"
},
{
"name": "CVE-2025-37831",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37831"
},
{
"name": "CVE-2025-38499",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38499"
},
{
"name": "CVE-2025-68312",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68312"
},
{
"name": "CVE-2025-40062",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40062"
},
{
"name": "CVE-2025-68194",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68194"
},
{
"name": "CVE-2025-38269",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38269"
},
{
"name": "CVE-2025-38079",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38079"
},
{
"name": "CVE-2025-37940",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37940"
},
{
"name": "CVE-2025-40336",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40336"
},
{
"name": "CVE-2025-37945",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37945"
},
{
"name": "CVE-2025-40067",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40067"
},
{
"name": "CVE-2025-40109",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40109"
},
{
"name": "CVE-2025-40101",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40101"
},
{
"name": "CVE-2025-38735",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38735"
},
{
"name": "CVE-2025-40006",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40006"
},
{
"name": "CVE-2025-68251",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68251"
},
{
"name": "CVE-2025-38652",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38652"
},
{
"name": "CVE-2025-38110",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38110"
},
{
"name": "CVE-2025-38422",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38422"
},
{
"name": "CVE-2025-38402",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38402"
},
{
"name": "CVE-2025-39698",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39698"
},
{
"name": "CVE-2025-40038",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40038"
},
{
"name": "CVE-2025-37915",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37915"
},
{
"name": "CVE-2025-68183",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68183"
},
{
"name": "CVE-2025-23146",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-23146"
},
{
"name": "CVE-2025-37903",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37903"
},
{
"name": "CVE-2025-40353",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40353"
},
{
"name": "CVE-2025-40222",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40222"
},
{
"name": "CVE-2025-23142",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-23142"
},
{
"name": "CVE-2025-37738",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37738"
},
{
"name": "CVE-2025-40011",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40011"
},
{
"name": "CVE-2025-38303",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38303"
},
{
"name": "CVE-2025-38074",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38074"
},
{
"name": "CVE-2025-40085",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40085"
},
{
"name": "CVE-2025-38119",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38119"
},
{
"name": "CVE-2025-38232",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38232"
},
{
"name": "CVE-2025-38245",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38245"
},
{
"name": "CVE-2025-40184",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40184"
},
{
"name": "CVE-2025-68244",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68244"
},
{
"name": "CVE-2025-40231",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40231"
},
{
"name": "CVE-2025-38324",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38324"
},
{
"name": "CVE-2025-40278",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40278"
},
{
"name": "CVE-2025-38018",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38018"
},
{
"name": "CVE-2025-40176",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40176"
},
{
"name": "CVE-2025-40342",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40342"
},
{
"name": "CVE-2025-37830",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37830"
},
{
"name": "CVE-2025-38614",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38614"
},
{
"name": "CVE-2025-37991",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37991"
},
{
"name": "CVE-2025-38425",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38425"
},
{
"name": "CVE-2025-40210",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40210"
},
{
"name": "CVE-2025-37978",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37978"
},
{
"name": "CVE-2025-37781",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37781"
},
{
"name": "CVE-2025-38210",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38210"
},
{
"name": "CVE-2025-38542",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38542"
},
{
"name": "CVE-2025-38664",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38664"
},
{
"name": "CVE-2025-38344",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38344"
},
{
"name": "CVE-2025-23145",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-23145"
},
{
"name": "CVE-2025-23143",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-23143"
},
{
"name": "CVE-2025-38322",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38322"
},
{
"name": "CVE-2025-38088",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38088"
},
{
"name": "CVE-2025-23141",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-23141"
},
{
"name": "CVE-2025-40193",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40193"
},
{
"name": "CVE-2025-37823",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37823"
},
{
"name": "CVE-2025-38332",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38332"
},
{
"name": "CVE-2025-40148",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40148"
},
{
"name": "CVE-2025-40326",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40326"
},
{
"name": "CVE-2025-38386",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38386"
},
{
"name": "CVE-2025-40279",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40279"
},
{
"name": "CVE-2025-38385",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38385"
},
{
"name": "CVE-2025-40201",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40201"
},
{
"name": "CVE-2025-37952",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37952"
},
{
"name": "CVE-2025-38694",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38694"
},
{
"name": "CVE-2025-37793",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37793"
},
{
"name": "CVE-2025-40084",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40084"
},
{
"name": "CVE-2025-68311",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68311"
},
{
"name": "CVE-2025-37740",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37740"
},
{
"name": "CVE-2025-38676",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38676"
},
{
"name": "CVE-2025-38530",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38530"
},
{
"name": "CVE-2025-38174",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38174"
},
{
"name": "CVE-2025-37826",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37826"
},
{
"name": "CVE-2025-37986",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37986"
},
{
"name": "CVE-2025-37829",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37829"
},
{
"name": "CVE-2025-68320",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68320"
},
{
"name": "CVE-2025-40341",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40341"
},
{
"name": "CVE-2025-38409",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38409"
},
{
"name": "CVE-2025-40199",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40199"
},
{
"name": "CVE-2025-40183",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40183"
},
{
"name": "CVE-2025-38019",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38019"
},
{
"name": "CVE-2025-38729",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38729"
},
{
"name": "CVE-2025-68172",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68172"
},
{
"name": "CVE-2025-23151",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-23151"
},
{
"name": "CVE-2025-38037",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38037"
},
{
"name": "CVE-2025-39998",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39998"
},
{
"name": "CVE-2025-40338",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40338"
},
{
"name": "CVE-2025-40195",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40195"
},
{
"name": "CVE-2025-37796",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37796"
},
{
"name": "CVE-2025-37962",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37962"
},
{
"name": "CVE-2025-40134",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40134"
},
{
"name": "CVE-2025-38681",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38681"
},
{
"name": "CVE-2025-37799",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37799"
},
{
"name": "CVE-2025-38593",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38593"
},
{
"name": "CVE-2025-39968",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39968"
},
{
"name": "CVE-2025-38342",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38342"
},
{
"name": "CVE-2025-39795",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39795"
},
{
"name": "CVE-2025-37801",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37801"
},
{
"name": "CVE-2025-38167",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38167"
},
{
"name": "CVE-2025-37883",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37883"
},
{
"name": "CVE-2025-40302",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40302"
},
{
"name": "CVE-2025-37863",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37863"
},
{
"name": "CVE-2025-37901",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37901"
},
{
"name": "CVE-2025-38687",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38687"
},
{
"name": "CVE-2025-40358",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40358"
},
{
"name": "CVE-2025-37811",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37811"
},
{
"name": "CVE-2025-40165",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40165"
},
{
"name": "CVE-2025-38257",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38257"
},
{
"name": "CVE-2025-68318",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68318"
},
{
"name": "CVE-2025-37864",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37864"
},
{
"name": "CVE-2025-38307",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38307"
},
{
"name": "CVE-2025-40161",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40161"
},
{
"name": "CVE-2025-40357",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40357"
},
{
"name": "CVE-2025-40328",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40328"
},
{
"name": "CVE-2025-37916",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37916"
},
{
"name": "CVE-2025-40340",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40340"
},
{
"name": "CVE-2025-38111",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38111"
},
{
"name": "CVE-2025-39986",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39986"
},
{
"name": "CVE-2025-37767",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37767"
},
{
"name": "CVE-2025-40283",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40283"
},
{
"name": "CVE-2025-39955",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39955"
},
{
"name": "CVE-2025-40324",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40324"
},
{
"name": "CVE-2025-37989",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37989"
},
{
"name": "CVE-2025-38529",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38529"
},
{
"name": "CVE-2025-40131",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40131"
},
{
"name": "CVE-2025-40146",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40146"
},
{
"name": "CVE-2025-38326",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38326"
},
{
"name": "CVE-2025-40177",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40177"
},
{
"name": "CVE-2025-38055",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38055"
},
{
"name": "CVE-2025-38129",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38129"
},
{
"name": "CVE-2025-38384",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38384"
},
{
"name": "CVE-2025-38334",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38334"
},
{
"name": "CVE-2025-38728",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38728"
},
{
"name": "CVE-2025-38424",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38424"
},
{
"name": "CVE-2025-38430",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38430"
},
{
"name": "CVE-2025-38715",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38715"
},
{
"name": "CVE-2025-39734",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39734"
},
{
"name": "CVE-2025-38089",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38089"
},
{
"name": "CVE-2025-40226",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40226"
},
{
"name": "CVE-2025-40078",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40078"
},
{
"name": "CVE-2025-38382",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38382"
},
{
"name": "CVE-2025-40074",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40074"
},
{
"name": "CVE-2025-38608",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38608"
},
{
"name": "CVE-2025-40321",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40321"
},
{
"name": "CVE-2025-38650",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38650"
},
{
"name": "CVE-2025-40069",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40069"
},
{
"name": "CVE-2025-39710",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39710"
},
{
"name": "CVE-2025-40116",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40116"
},
{
"name": "CVE-2025-68249",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68249"
},
{
"name": "CVE-2025-38124",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38124"
},
{
"name": "CVE-2025-39934",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39934"
},
{
"name": "CVE-2025-37925",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37925"
},
{
"name": "CVE-2025-40158",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40158"
},
{
"name": "CVE-2025-39683",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39683"
},
{
"name": "CVE-2025-38420",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38420"
},
{
"name": "CVE-2025-38071",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38071"
},
{
"name": "CVE-2025-40327",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40327"
},
{
"name": "CVE-2025-40130",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40130"
},
{
"name": "CVE-2025-40179",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40179"
},
{
"name": "CVE-2025-37972",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37972"
},
{
"name": "CVE-2025-38183",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38183"
},
{
"name": "CVE-2025-40127",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40127"
},
{
"name": "CVE-2025-37768",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37768"
},
{
"name": "CVE-2025-40282",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40282"
},
{
"name": "CVE-2025-39794",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39794"
},
{
"name": "CVE-2025-38160",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38160"
},
{
"name": "CVE-2025-37984",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37984"
},
{
"name": "CVE-2025-38528",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38528"
},
{
"name": "CVE-2025-39996",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39996"
},
{
"name": "CVE-2025-40168",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40168"
},
{
"name": "CVE-2025-37856",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37856"
},
{
"name": "CVE-2025-38107",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38107"
},
{
"name": "CVE-2025-38292",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38292"
},
{
"name": "CVE-2025-40053",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40053"
},
{
"name": "CVE-2025-38085",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38085"
},
{
"name": "CVE-2025-38222",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38222"
},
{
"name": "CVE-2025-38010",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38010"
},
{
"name": "CVE-2025-38197",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38197"
},
{
"name": "CVE-2025-39951",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39951"
},
{
"name": "CVE-2025-38468",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38468"
},
{
"name": "CVE-2025-40120",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40120"
},
{
"name": "CVE-2025-40185",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40185"
},
{
"name": "CVE-2025-38688",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38688"
},
{
"name": "CVE-2025-38333",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38333"
},
{
"name": "CVE-2025-40295",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40295"
},
{
"name": "CVE-2025-68192",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68192"
},
{
"name": "CVE-2025-37970",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37970"
},
{
"name": "CVE-2025-21884",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21884"
},
{
"name": "CVE-2025-37905",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37905"
},
{
"name": "CVE-2025-38390",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38390"
},
{
"name": "CVE-2025-38013",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38013"
},
{
"name": "CVE-2025-40098",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40098"
},
{
"name": "CVE-2025-38059",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38059"
},
{
"name": "CVE-2025-38713",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38713"
},
{
"name": "CVE-2025-37956",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37956"
},
{
"name": "CVE-2025-40243",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40243"
},
{
"name": "CVE-2025-40196",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40196"
},
{
"name": "CVE-2025-38148",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38148"
},
{
"name": "CVE-2025-40129",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40129"
},
{
"name": "CVE-2025-38467",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38467"
},
{
"name": "CVE-2025-38117",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38117"
},
{
"name": "CVE-2025-38094",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38094"
},
{
"name": "CVE-2025-68171",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68171"
},
{
"name": "CVE-2025-38072",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38072"
},
{
"name": "CVE-2025-37967",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37967"
},
{
"name": "CVE-2025-40301",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40301"
},
{
"name": "CVE-2025-38300",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38300"
},
{
"name": "CVE-2025-40040",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40040"
},
{
"name": "CVE-2025-38289",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38289"
},
{
"name": "CVE-2025-39782",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39782"
},
{
"name": "CVE-2025-68207",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68207"
},
{
"name": "CVE-2025-40066",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40066"
},
{
"name": "CVE-2025-38075",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38075"
},
{
"name": "CVE-2025-37885",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37885"
},
{
"name": "CVE-2025-38697",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38697"
},
{
"name": "CVE-2025-37949",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37949"
},
{
"name": "CVE-2025-68167",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68167"
},
{
"name": "CVE-2025-38691",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38691"
},
{
"name": "CVE-2025-40207",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40207"
},
{
"name": "CVE-2025-38373",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38373"
},
{
"name": "CVE-2025-38489",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38489"
},
{
"name": "CVE-2025-40095",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40095"
},
{
"name": "CVE-2025-37957",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37957"
},
{
"name": "CVE-2025-38058",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38058"
},
{
"name": "CVE-2025-38483",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38483"
},
{
"name": "CVE-2025-38369",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38369"
},
{
"name": "CVE-2025-39759",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39759"
},
{
"name": "CVE-2025-38639",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38639"
},
{
"name": "CVE-2025-38122",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38122"
},
{
"name": "CVE-2025-38612",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38612"
},
{
"name": "CVE-2025-40299",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40299"
},
{
"name": "CVE-2025-38173",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38173"
},
{
"name": "CVE-2025-40286",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40286"
},
{
"name": "CVE-2025-38143",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38143"
},
{
"name": "CVE-2025-38098",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38098"
},
{
"name": "CVE-2025-40091",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40091"
},
{
"name": "CVE-2025-40318",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40318"
},
{
"name": "CVE-2025-38566",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38566"
},
{
"name": "CVE-2025-39721",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39721"
},
{
"name": "CVE-2025-68241",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68241"
},
{
"name": "CVE-2025-39760",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39760"
},
{
"name": "CVE-2025-40118",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40118"
},
{
"name": "CVE-2025-38718",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38718"
},
{
"name": "CVE-2025-38392",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38392"
},
{
"name": "CVE-2025-39673",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39673"
},
{
"name": "CVE-2025-38259",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38259"
},
{
"name": "CVE-2025-38663",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38663"
},
{
"name": "CVE-2025-40021",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40021"
},
{
"name": "CVE-2025-40135",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40135"
},
{
"name": "CVE-2025-38156",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38156"
},
{
"name": "CVE-2025-37951",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37951"
},
{
"name": "CVE-2025-37840",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37840"
},
{
"name": "CVE-2025-68253",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68253"
},
{
"name": "CVE-2025-68734",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68734"
},
{
"name": "CVE-2025-39993",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39993"
},
{
"name": "CVE-2025-37947",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37947"
},
{
"name": "CVE-2025-38416",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38416"
},
{
"name": "CVE-2025-37846",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37846"
},
{
"name": "CVE-2025-38722",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38722"
},
{
"name": "CVE-2025-38192",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38192"
},
{
"name": "CVE-2025-39800",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39800"
},
{
"name": "CVE-2025-40044",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40044"
},
{
"name": "CVE-2025-38343",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38343"
},
{
"name": "CVE-2025-40105",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40105"
},
{
"name": "CVE-2025-38202",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38202"
},
{
"name": "CVE-2025-40050",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40050"
},
{
"name": "CVE-2025-40072",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40072"
},
{
"name": "CVE-2025-40112",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40112"
},
{
"name": "CVE-2025-40079",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40079"
},
{
"name": "CVE-2025-22101",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22101"
},
{
"name": "CVE-2025-38374",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38374"
},
{
"name": "CVE-2025-39703",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39703"
},
{
"name": "CVE-2025-38194",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38194"
},
{
"name": "CVE-2025-68182",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68182"
},
{
"name": "CVE-2025-38549",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38549"
},
{
"name": "CVE-2025-40310",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40310"
},
{
"name": "CVE-2025-38665",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38665"
},
{
"name": "CVE-2025-38101",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38101"
},
{
"name": "CVE-2025-37982",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37982"
},
{
"name": "CVE-2025-37992",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37992"
},
{
"name": "CVE-2025-38577",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38577"
},
{
"name": "CVE-2025-38671",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38671"
},
{
"name": "CVE-2025-68317",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68317"
},
{
"name": "CVE-2025-39971",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39971"
},
{
"name": "CVE-2025-38299",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38299"
},
{
"name": "CVE-2025-40154",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40154"
},
{
"name": "CVE-2025-40331",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40331"
},
{
"name": "CVE-2025-38635",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38635"
},
{
"name": "CVE-2025-38704",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38704"
},
{
"name": "CVE-2025-38348",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38348"
},
{
"name": "CVE-2025-40270",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40270"
},
{
"name": "CVE-2025-40191",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40191"
},
{
"name": "CVE-2025-38488",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38488"
},
{
"name": "CVE-2025-40189",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40189"
},
{
"name": "CVE-2025-40093",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40093"
},
{
"name": "CVE-2025-38540",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38540"
},
{
"name": "CVE-2025-38040",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38040"
},
{
"name": "CVE-2025-38265",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38265"
},
{
"name": "CVE-2025-23149",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-23149"
},
{
"name": "CVE-2025-38403",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38403"
},
{
"name": "CVE-2025-21726",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21726"
},
{
"name": "CVE-2025-38552",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38552"
},
{
"name": "CVE-2025-40335",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40335"
},
{
"name": "CVE-2025-40149",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40149"
},
{
"name": "CVE-2025-37914",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37914"
},
{
"name": "CVE-2025-40164",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40164"
},
{
"name": "CVE-2025-37873",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37873"
},
{
"name": "CVE-2025-37928",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37928"
},
{
"name": "CVE-2025-40267",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40267"
},
{
"name": "CVE-2025-40235",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40235"
},
{
"name": "CVE-2025-39766",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39766"
},
{
"name": "CVE-2025-39801",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39801"
},
{
"name": "CVE-2025-37922",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37922"
},
{
"name": "CVE-2025-38146",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38146"
},
{
"name": "CVE-2025-68208",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68208"
},
{
"name": "CVE-2025-39724",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39724"
},
{
"name": "CVE-2025-39687",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39687"
},
{
"name": "CVE-2025-37794",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37794"
},
{
"name": "CVE-2025-38510",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38510"
},
{
"name": "CVE-2025-38246",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38246"
},
{
"name": "CVE-2025-39758",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39758"
},
{
"name": "CVE-2025-39694",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39694"
},
{
"name": "CVE-2025-38220",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38220"
},
{
"name": "CVE-2025-38405",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38405"
},
{
"name": "CVE-2025-38418",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38418"
},
{
"name": "CVE-2025-40352",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40352"
},
{
"name": "CVE-2025-38090",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38090"
},
{
"name": "CVE-2025-38429",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38429"
},
{
"name": "CVE-2025-38225",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38225"
},
{
"name": "CVE-2025-40280",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40280"
},
{
"name": "CVE-2025-38155",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38155"
},
{
"name": "CVE-2025-40099",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40099"
},
{
"name": "CVE-2025-71162",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71162"
},
{
"name": "CVE-2025-37977",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37977"
},
{
"name": "CVE-2025-38365",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38365"
},
{
"name": "CVE-2025-38415",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38415"
},
{
"name": "CVE-2025-40031",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40031"
},
{
"name": "CVE-2025-40180",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40180"
},
{
"name": "CVE-2025-40293",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40293"
},
{
"name": "CVE-2025-38668",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38668"
},
{
"name": "CVE-2025-37973",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37973"
},
{
"name": "CVE-2025-40330",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40330"
},
{
"name": "CVE-2025-68750",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68750"
},
{
"name": "CVE-2025-38260",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38260"
},
{
"name": "CVE-2025-37827",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37827"
},
{
"name": "CVE-2025-38721",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38721"
},
{
"name": "CVE-2025-38244",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38244"
},
{
"name": "CVE-2025-38080",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38080"
},
{
"name": "CVE-2025-40126",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40126"
},
{
"name": "CVE-2025-39972",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39972"
},
{
"name": "CVE-2025-37748",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37748"
},
{
"name": "CVE-2025-38364",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38364"
},
{
"name": "CVE-2025-38615",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38615"
},
{
"name": "CVE-2025-39684",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39684"
},
{
"name": "CVE-2025-37836",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37836"
},
{
"name": "CVE-2025-38526",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38526"
},
{
"name": "CVE-2025-38472",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38472"
},
{
"name": "CVE-2025-37944",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37944"
},
{
"name": "CVE-2025-38506",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38506"
},
{
"name": "CVE-2025-40320",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40320"
},
{
"name": "CVE-2025-38703",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38703"
},
{
"name": "CVE-2025-38494",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38494"
},
{
"name": "CVE-2025-39753",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39753"
},
{
"name": "CVE-2025-38604",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38604"
},
{
"name": "CVE-2025-40203",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40203"
},
{
"name": "CVE-2025-38623",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38623"
},
{
"name": "CVE-2025-38193",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38193"
},
{
"name": "CVE-2025-38400",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38400"
},
{
"name": "CVE-2025-38136",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38136"
},
{
"name": "CVE-2025-40192",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40192"
},
{
"name": "CVE-2025-38544",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38544"
},
{
"name": "CVE-2025-37771",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37771"
},
{
"name": "CVE-2025-39797",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39797"
},
{
"name": "CVE-2025-40200",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40200"
},
{
"name": "CVE-2025-38236",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38236"
},
{
"name": "CVE-2025-38725",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38725"
},
{
"name": "CVE-2025-37975",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37975"
},
{
"name": "CVE-2025-40124",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40124"
},
{
"name": "CVE-2025-38347",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38347"
},
{
"name": "CVE-2025-39776",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39776"
},
{
"name": "CVE-2025-39880",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39880"
},
{
"name": "CVE-2025-37998",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37998"
},
{
"name": "CVE-2025-38198",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38198"
},
{
"name": "CVE-2025-23163",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-23163"
},
{
"name": "CVE-2025-40094",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40094"
},
{
"name": "CVE-2025-37968",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37968"
},
{
"name": "CVE-2025-38376",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38376"
},
{
"name": "CVE-2025-38006",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38006"
},
{
"name": "CVE-2025-40102",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40102"
},
{
"name": "CVE-2025-40170",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40170"
},
{
"name": "CVE-2025-38437",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38437"
},
{
"name": "CVE-2025-40160",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40160"
},
{
"name": "CVE-2025-40284",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40284"
},
{
"name": "CVE-2025-38125",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38125"
},
{
"name": "CVE-2025-40209",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40209"
},
{
"name": "CVE-2025-40077",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40077"
},
{
"name": "CVE-2025-38351",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38351"
},
{
"name": "CVE-2025-38048",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38048"
},
{
"name": "CVE-2025-40071",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40071"
},
{
"name": "CVE-2025-38683",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38683"
},
{
"name": "CVE-2025-40113",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40113"
},
{
"name": "CVE-2025-39736",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39736"
},
{
"name": "CVE-2025-40234",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40234"
},
{
"name": "CVE-2025-37757",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37757"
},
{
"name": "CVE-2025-68247",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68247"
},
{
"name": "CVE-2025-40305",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40305"
},
{
"name": "CVE-2025-40080",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40080"
},
{
"name": "CVE-2025-38009",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38009"
},
{
"name": "CVE-2025-40215",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40215"
},
{
"name": "CVE-2025-40307",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40307"
},
{
"name": "CVE-2025-40111",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40111"
},
{
"name": "CVE-2025-38081",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38081"
},
{
"name": "CVE-2025-37809",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37809"
},
{
"name": "CVE-2024-36350",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36350"
},
{
"name": "CVE-2025-40211",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40211"
},
{
"name": "CVE-2025-40068",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40068"
},
{
"name": "CVE-2025-38185",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38185"
},
{
"name": "CVE-2025-39691",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39691"
},
{
"name": "CVE-2025-38406",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38406"
},
{
"name": "CVE-2025-68315",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68315"
},
{
"name": "CVE-2025-40163",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40163"
},
{
"name": "CVE-2025-40042",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40042"
},
{
"name": "CVE-2025-37817",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37817"
},
{
"name": "CVE-2025-40155",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40155"
},
{
"name": "CVE-2025-39890",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39890"
},
{
"name": "CVE-2025-39742",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39742"
},
{
"name": "CVE-2025-40217",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40217"
},
{
"name": "CVE-2025-22102",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22102"
},
{
"name": "CVE-2025-37987",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37987"
},
{
"name": "CVE-2025-37749",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37749"
},
{
"name": "CVE-2024-36331",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36331"
},
{
"name": "CVE-2025-39748",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39748"
},
{
"name": "CVE-2025-40133",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40133"
},
{
"name": "CVE-2025-38263",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38263"
},
{
"name": "CVE-2025-38610",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38610"
},
{
"name": "CVE-2025-37772",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37772"
},
{
"name": "CVE-2025-38214",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38214"
},
{
"name": "CVE-2025-38560",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38560"
},
{
"name": "CVE-2025-37994",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37994"
},
{
"name": "CVE-2025-38551",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38551"
},
{
"name": "CVE-2025-38701",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38701"
},
{
"name": "CVE-2025-38218",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38218"
},
{
"name": "CVE-2025-40329",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40329"
},
{
"name": "CVE-2025-38349",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38349"
},
{
"name": "CVE-2025-39726",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39726"
},
{
"name": "CVE-2025-38393",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38393"
},
{
"name": "CVE-2025-37891",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37891"
},
{
"name": "CVE-2025-38249",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38249"
},
{
"name": "CVE-2025-38716",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38716"
},
{
"name": "CVE-2025-39937",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39937"
},
{
"name": "CVE-2025-37858",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37858"
},
{
"name": "CVE-2025-38154",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38154"
},
{
"name": "CVE-2025-38469",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38469"
},
{
"name": "CVE-2025-38581",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38581"
},
{
"name": "CVE-2025-40034",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40034"
},
{
"name": "CVE-2025-40060",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40060"
},
{
"name": "CVE-2025-39790",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39790"
},
{
"name": "CVE-2025-38389",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38389"
},
{
"name": "CVE-2025-38448",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38448"
},
{
"name": "CVE-2025-37780",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37780"
},
{
"name": "CVE-2025-37995",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37995"
},
{
"name": "CVE-2025-38680",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38680"
},
{
"name": "CVE-2025-37754",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37754"
},
{
"name": "CVE-2025-40059",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40059"
},
{
"name": "CVE-2025-38497",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38497"
},
{
"name": "CVE-2025-68168",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68168"
},
{
"name": "CVE-2025-23156",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-23156"
},
{
"name": "CVE-2025-23157",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-23157"
},
{
"name": "CVE-2025-68206",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68206"
},
{
"name": "CVE-2025-68309",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68309"
},
{
"name": "CVE-2025-38684",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38684"
},
{
"name": "CVE-2025-38165",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38165"
},
{
"name": "CVE-2025-40003",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40003"
},
{
"name": "CVE-2025-39686",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39686"
},
{
"name": "CVE-2025-39798",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39798"
},
{
"name": "CVE-2025-38495",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38495"
},
{
"name": "CVE-2025-37808",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37808"
},
{
"name": "CVE-2025-38730",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38730"
},
{
"name": "CVE-2025-38052",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38052"
},
{
"name": "CVE-2025-38377",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38377"
},
{
"name": "CVE-2025-40175",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40175"
},
{
"name": "CVE-2025-68170",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68170"
},
{
"name": "CVE-2025-39747",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39747"
},
{
"name": "CVE-2025-68313",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68313"
},
{
"name": "CVE-2025-38516",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38516"
},
{
"name": "CVE-2025-38462",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38462"
},
{
"name": "CVE-2025-38428",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38428"
},
{
"name": "CVE-2025-39714",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39714"
},
{
"name": "CVE-2025-38262",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38262"
},
{
"name": "CVE-2025-38138",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38138"
},
{
"name": "CVE-2025-38035",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38035"
},
{
"name": "CVE-2025-37759",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37759"
},
{
"name": "CVE-2025-38414",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38414"
},
{
"name": "CVE-2025-68197",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68197"
},
{
"name": "CVE-2025-40123",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40123"
},
{
"name": "CVE-2025-37933",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37933"
},
{
"name": "CVE-2025-38310",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38310"
},
{
"name": "CVE-2025-37886",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37886"
},
{
"name": "CVE-2025-37963",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37963"
},
{
"name": "CVE-2025-40297",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40297"
},
{
"name": "CVE-2025-38226",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38226"
},
{
"name": "CVE-2025-39706",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39706"
},
{
"name": "CVE-2025-40178",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40178"
},
{
"name": "CVE-2025-40363",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40363"
},
{
"name": "CVE-2025-38443",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38443"
},
{
"name": "CVE-2025-38576",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38576"
},
{
"name": "CVE-2025-39869",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39869"
},
{
"name": "CVE-2025-37800",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37800"
},
{
"name": "CVE-2025-39985",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39985"
},
{
"name": "CVE-2025-40276",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40276"
},
{
"name": "CVE-2025-37900",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37900"
},
{
"name": "CVE-2025-40224",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40224"
},
{
"name": "CVE-2025-38439",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38439"
},
{
"name": "CVE-2025-37805",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37805"
},
{
"name": "CVE-2025-68245",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68245"
},
{
"name": "CVE-2025-39719",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39719"
},
{
"name": "CVE-2025-40317",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40317"
},
{
"name": "CVE-2025-40236",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40236"
},
{
"name": "CVE-2025-37990",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37990"
},
{
"name": "CVE-2025-38553",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38553"
},
{
"name": "CVE-2025-38190",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38190"
},
{
"name": "CVE-2025-38180",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38180"
},
{
"name": "CVE-2025-39738",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39738"
},
{
"name": "CVE-2025-68202",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68202"
},
{
"name": "CVE-2025-38145",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38145"
},
{
"name": "CVE-2025-40174",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40174"
},
{
"name": "CVE-2025-37948",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37948"
},
{
"name": "CVE-2025-38166",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38166"
},
{
"name": "CVE-2025-40227",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40227"
},
{
"name": "CVE-2025-37862",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37862"
},
{
"name": "CVE-2025-38321",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38321"
},
{
"name": "CVE-2025-39705",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39705"
},
{
"name": "CVE-2025-40316",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40316"
},
{
"name": "CVE-2025-37960",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37960"
},
{
"name": "CVE-2025-38045",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38045"
},
{
"name": "CVE-2025-38051",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38051"
},
{
"name": "CVE-2025-39713",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39713"
},
{
"name": "CVE-2025-37763",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37763"
},
{
"name": "CVE-2025-37954",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37954"
},
{
"name": "CVE-2025-22128",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22128"
},
{
"name": "CVE-2025-40065",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40065"
},
{
"name": "CVE-2025-37839",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37839"
},
{
"name": "CVE-2025-39744",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39744"
},
{
"name": "CVE-2025-38277",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38277"
},
{
"name": "CVE-2025-37913",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37913"
},
{
"name": "CVE-2025-68177",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68177"
},
{
"name": "CVE-2025-39756",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39756"
},
{
"name": "CVE-2025-38539",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38539"
},
{
"name": "CVE-2025-40181",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40181"
},
{
"name": "CVE-2025-68191",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68191"
},
{
"name": "CVE-2025-38044",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38044"
},
{
"name": "CVE-2025-68250",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68250"
},
{
"name": "CVE-2025-37786",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37786"
},
{
"name": "CVE-2025-40141",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40141"
},
{
"name": "CVE-2025-38200",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38200"
},
{
"name": "CVE-2025-38480",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38480"
},
{
"name": "CVE-2025-40132",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40132"
},
{
"name": "CVE-2025-38346",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38346"
},
{
"name": "CVE-2025-40152",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40152"
},
{
"name": "CVE-2025-37959",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37959"
},
{
"name": "CVE-2025-38191",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38191"
},
{
"name": "CVE-2025-39946",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39946"
},
{
"name": "CVE-2025-38062",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38062"
},
{
"name": "CVE-2025-38531",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38531"
},
{
"name": "CVE-2025-40288",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40288"
},
{
"name": "CVE-2025-68239",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68239"
},
{
"name": "CVE-2025-39693",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39693"
},
{
"name": "CVE-2025-40281",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40281"
},
{
"name": "CVE-2025-68185",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68185"
},
{
"name": "CVE-2025-40304",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40304"
},
{
"name": "CVE-2025-38503",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38503"
},
{
"name": "CVE-2025-40110",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40110"
},
{
"name": "CVE-2025-40162",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40162"
},
{
"name": "CVE-2025-38630",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38630"
},
{
"name": "CVE-2025-38131",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38131"
},
{
"name": "CVE-2025-40268",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40268"
},
{
"name": "CVE-2025-39980",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39980"
},
{
"name": "CVE-2025-37851",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37851"
},
{
"name": "CVE-2025-38481",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38481"
},
{
"name": "CVE-2025-38585",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38585"
},
{
"name": "CVE-2025-38320",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38320"
},
{
"name": "CVE-2025-38625",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38625"
},
{
"name": "CVE-2025-38164",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38164"
},
{
"name": "CVE-2025-40303",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40303"
},
{
"name": "CVE-2025-68178",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68178"
},
{
"name": "CVE-2025-40337",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40337"
},
{
"name": "CVE-2025-40346",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40346"
},
{
"name": "CVE-2025-38264",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38264"
},
{
"name": "CVE-2025-40036",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40036"
},
{
"name": "CVE-2025-39676",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39676"
},
{
"name": "CVE-2025-40241",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40241"
},
{
"name": "CVE-2025-37980",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37980"
},
{
"name": "CVE-2025-38280",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38280"
},
{
"name": "CVE-2025-37788",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37788"
},
{
"name": "CVE-2025-38427",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38427"
},
{
"name": "CVE-2025-38084",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38084"
},
{
"name": "CVE-2025-40046",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40046"
},
{
"name": "CVE-2025-37879",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37879"
},
{
"name": "CVE-2025-38217",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38217"
},
{
"name": "CVE-2025-40030",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40030"
},
{
"name": "CVE-2025-40244",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40244"
},
{
"name": "CVE-2025-37881",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37881"
},
{
"name": "CVE-2025-39995",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39995"
},
{
"name": "CVE-2025-38103",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38103"
},
{
"name": "CVE-2025-38514",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38514"
},
{
"name": "CVE-2025-39783",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39783"
},
{
"name": "CVE-2025-39715",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39715"
},
{
"name": "CVE-2025-40323",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40323"
},
{
"name": "CVE-2025-38569",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38569"
},
{
"name": "CVE-2025-38255",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38255"
},
{
"name": "CVE-2025-38512",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38512"
},
{
"name": "CVE-2025-40096",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40096"
},
{
"name": "CVE-2025-38622",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38622"
},
{
"name": "CVE-2025-37909",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37909"
},
{
"name": "CVE-2025-38700",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38700"
},
{
"name": "CVE-2025-37849",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37849"
},
{
"name": "CVE-2025-38162",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38162"
},
{
"name": "CVE-2025-38532",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38532"
},
{
"name": "CVE-2025-39712",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39712"
},
{
"name": "CVE-2025-37812",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37812"
},
{
"name": "CVE-2025-39707",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39707"
},
{
"name": "CVE-2025-40275",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40275"
},
{
"name": "CVE-2025-37875",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37875"
},
{
"name": "CVE-2025-38410",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38410"
},
{
"name": "CVE-2025-39907",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39907"
},
{
"name": "CVE-2025-40182",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40182"
},
{
"name": "CVE-2025-68211",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68211"
},
{
"name": "CVE-2025-39781",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39781"
},
{
"name": "CVE-2025-38640",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38640"
},
{
"name": "CVE-2025-38476",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38476"
},
{
"name": "CVE-2025-38659",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38659"
},
{
"name": "CVE-2025-40339",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40339"
},
{
"name": "CVE-2025-40140",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40140"
},
{
"name": "CVE-2025-38020",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38020"
},
{
"name": "CVE-2025-40223",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40223"
},
{
"name": "CVE-2025-38572",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38572"
},
{
"name": "CVE-2025-23140",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-23140"
},
{
"name": "CVE-2025-23150",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-23150"
},
{
"name": "CVE-2025-38460",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38460"
},
{
"name": "CVE-2025-40061",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40061"
},
{
"name": "CVE-2025-38182",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38182"
},
{
"name": "CVE-2025-38550",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38550"
},
{
"name": "CVE-2024-53114",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53114"
},
{
"name": "CVE-2025-38275",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38275"
},
{
"name": "CVE-2025-40213",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40213"
},
{
"name": "CVE-2025-38345",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38345"
},
{
"name": "CVE-2025-40334",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40334"
},
{
"name": "CVE-2025-38170",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38170"
},
{
"name": "CVE-2025-39711",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39711"
},
{
"name": "CVE-2025-22115",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22115"
},
{
"name": "CVE-2025-22120",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22120"
},
{
"name": "CVE-2025-38535",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38535"
},
{
"name": "CVE-2025-38231",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38231"
},
{
"name": "CVE-2025-37854",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37854"
},
{
"name": "CVE-2025-40142",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40142"
},
{
"name": "CVE-2025-39873",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39873"
},
{
"name": "CVE-2025-40159",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40159"
},
{
"name": "CVE-2025-40319",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40319"
},
{
"name": "CVE-2025-68193",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68193"
},
{
"name": "CVE-2025-38473",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38473"
},
{
"name": "CVE-2025-38113",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38113"
},
{
"name": "CVE-2025-38714",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38714"
},
{
"name": "CVE-2025-23148",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-23148"
},
{
"name": "CVE-2025-38361",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38361"
},
{
"name": "CVE-2025-38470",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38470"
},
{
"name": "CVE-2025-38181",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38181"
},
{
"name": "CVE-2025-40051",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40051"
},
{
"name": "CVE-2025-38391",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38391"
},
{
"name": "CVE-2025-38248",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38248"
},
{
"name": "CVE-2025-40351",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40351"
},
{
"name": "CVE-2025-40087",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40087"
},
{
"name": "CVE-2025-40229",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40229"
},
{
"name": "CVE-2025-23147",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-23147"
},
{
"name": "CVE-2025-39752",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39752"
}
],
"initial_release_date": "2026-02-13T00:00:00",
"last_revision_date": "2026-02-13T00:00:00",
"links": [],
"reference": "CERTFR-2026-AVI-0169",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2026-02-13T00:00:00.000000"
}
],
"risks": [
{
"description": "Atteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es"
},
{
"description": "Non sp\u00e9cifi\u00e9 par l\u0027\u00e9diteur"
},
{
"description": "D\u00e9ni de service"
},
{
"description": "Contournement de la politique de s\u00e9curit\u00e9"
},
{
"description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans le noyau Linux d\u0027Ubuntu. Certaines d\u0027entre elles permettent \u00e0 un attaquant de provoquer une atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es, une atteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es et un contournement de la politique de s\u00e9curit\u00e9.",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans le noyau Linux d\u0027Ubuntu",
"vendor_advisories": [
{
"published_at": "2026-02-06",
"title": "Bulletin de s\u00e9curit\u00e9 Ubuntu USN-8015-3",
"url": "https://ubuntu.com/security/notices/USN-8015-3"
},
{
"published_at": "2026-02-12",
"title": "Bulletin de s\u00e9curit\u00e9 Ubuntu USN-8031-1",
"url": "https://ubuntu.com/security/notices/USN-8031-1"
},
{
"published_at": "2026-02-13",
"title": "Bulletin de s\u00e9curit\u00e9 Ubuntu USN-8033-4",
"url": "https://ubuntu.com/security/notices/USN-8033-4"
},
{
"published_at": "2026-02-12",
"title": "Bulletin de s\u00e9curit\u00e9 Ubuntu USN-8034-1",
"url": "https://ubuntu.com/security/notices/USN-8034-1"
},
{
"published_at": "2026-02-12",
"title": "Bulletin de s\u00e9curit\u00e9 Ubuntu USN-7988-5",
"url": "https://ubuntu.com/security/notices/USN-7988-5"
},
{
"published_at": "2026-02-11",
"title": "Bulletin de s\u00e9curit\u00e9 Ubuntu USN-7990-3",
"url": "https://ubuntu.com/security/notices/USN-7990-3"
},
{
"published_at": "2026-02-12",
"title": "Bulletin de s\u00e9curit\u00e9 Ubuntu USN-8033-2",
"url": "https://ubuntu.com/security/notices/USN-8033-2"
},
{
"published_at": "2026-02-11",
"title": "Bulletin de s\u00e9curit\u00e9 Ubuntu USN-8015-4",
"url": "https://ubuntu.com/security/notices/USN-8015-4"
},
{
"published_at": "2026-02-12",
"title": "Bulletin de s\u00e9curit\u00e9 Ubuntu USN-8029-1",
"url": "https://ubuntu.com/security/notices/USN-8029-1"
},
{
"published_at": "2026-02-12",
"title": "Bulletin de s\u00e9curit\u00e9 Ubuntu USN-8028-2",
"url": "https://ubuntu.com/security/notices/USN-8028-2"
},
{
"published_at": "2026-02-12",
"title": "Bulletin de s\u00e9curit\u00e9 Ubuntu USN-8033-3",
"url": "https://ubuntu.com/security/notices/USN-8033-3"
},
{
"published_at": "2026-02-11",
"title": "Bulletin de s\u00e9curit\u00e9 Ubuntu USN-8013-4",
"url": "https://ubuntu.com/security/notices/USN-8013-4"
},
{
"published_at": "2026-02-12",
"title": "Bulletin de s\u00e9curit\u00e9 Ubuntu USN-7990-4",
"url": "https://ubuntu.com/security/notices/USN-7990-4"
},
{
"published_at": "2026-02-11",
"title": "Bulletin de s\u00e9curit\u00e9 Ubuntu USN-7988-4",
"url": "https://ubuntu.com/security/notices/USN-7988-4"
},
{
"published_at": "2026-02-12",
"title": "Bulletin de s\u00e9curit\u00e9 Ubuntu USN-8033-1",
"url": "https://ubuntu.com/security/notices/USN-8033-1"
},
{
"published_at": "2026-02-12",
"title": "Bulletin de s\u00e9curit\u00e9 Ubuntu USN-8030-1",
"url": "https://ubuntu.com/security/notices/USN-8030-1"
},
{
"published_at": "2026-02-11",
"title": "Bulletin de s\u00e9curit\u00e9 Ubuntu USN-8028-1",
"url": "https://ubuntu.com/security/notices/USN-8028-1"
}
]
}
CERTFR-2026-AVI-0227
Vulnerability from certfr_avis - Published: 2026-02-27 - Updated: 2026-02-27
De multiples vulnérabilités ont été découvertes dans le noyau Linux d'Ubuntu. Certaines d'entre elles permettent à un attaquant de provoquer une atteinte à la confidentialité des données, une atteinte à l'intégrité des données et un contournement de la politique de sécurité.
Solutions
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
None| Title | Publication Time | Tags | |||||||||||||||||||||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
|||||||||||||||||||||||||||||||||||||||||||||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "Ubuntu 20.04 ESM",
"product": {
"name": "Ubuntu",
"vendor": {
"name": "Ubuntu",
"scada": false
}
}
},
{
"description": "Ubuntu 24.04 LTS",
"product": {
"name": "Ubuntu",
"vendor": {
"name": "Ubuntu",
"scada": false
}
}
},
{
"description": "Ubuntu 25.10",
"product": {
"name": "Ubuntu",
"vendor": {
"name": "Ubuntu",
"scada": false
}
}
},
{
"description": "Ubuntu 14.04 ESM",
"product": {
"name": "Ubuntu",
"vendor": {
"name": "Ubuntu",
"scada": false
}
}
},
{
"description": "Ubuntu 22.04 LTS",
"product": {
"name": "Ubuntu",
"vendor": {
"name": "Ubuntu",
"scada": false
}
}
}
],
"affected_systems_content": null,
"content": "## Solutions\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des correctifs (cf. section Documentation).",
"cves": [
{
"name": "CVE-2025-40296",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40296"
},
{
"name": "CVE-2025-40225",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40225"
},
{
"name": "CVE-2025-40166",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40166"
},
{
"name": "CVE-2025-40273",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40273"
},
{
"name": "CVE-2025-40064",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40064"
},
{
"name": "CVE-2025-38490",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38490"
},
{
"name": "CVE-2025-37850",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37850"
},
{
"name": "CVE-2025-38485",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38485"
},
{
"name": "CVE-2025-22026",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22026"
},
{
"name": "CVE-2025-38579",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38579"
},
{
"name": "CVE-2025-68196",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68196"
},
{
"name": "CVE-2025-37761",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37761"
},
{
"name": "CVE-2025-37865",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37865"
},
{
"name": "CVE-2025-38328",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38328"
},
{
"name": "CVE-2025-40156",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40156"
},
{
"name": "CVE-2025-38711",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38711"
},
{
"name": "CVE-2025-38487",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38487"
},
{
"name": "CVE-2025-40137",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40137"
},
{
"name": "CVE-2025-37775",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37775"
},
{
"name": "CVE-2025-38335",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38335"
},
{
"name": "CVE-2025-38304",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38304"
},
{
"name": "CVE-2025-37892",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37892"
},
{
"name": "CVE-2025-38100",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38100"
},
{
"name": "CVE-2025-37859",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37859"
},
{
"name": "CVE-2025-40002",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40002"
},
{
"name": "CVE-2025-40057",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40057"
},
{
"name": "CVE-2025-38043",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38043"
},
{
"name": "CVE-2025-38471",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38471"
},
{
"name": "CVE-2025-38520",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38520"
},
{
"name": "CVE-2025-37792",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37792"
},
{
"name": "CVE-2025-68240",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68240"
},
{
"name": "CVE-2025-38108",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38108"
},
{
"name": "CVE-2025-38230",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38230"
},
{
"name": "CVE-2025-38229",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38229"
},
{
"name": "CVE-2025-40055",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40055"
},
{
"name": "CVE-2025-38158",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38158"
},
{
"name": "CVE-2025-37872",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37872"
},
{
"name": "CVE-2025-38588",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38588"
},
{
"name": "CVE-2025-40314",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40314"
},
{
"name": "CVE-2025-40029",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40029"
},
{
"name": "CVE-2025-40037",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40037"
},
{
"name": "CVE-2025-38279",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38279"
},
{
"name": "CVE-2025-38561",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38561"
},
{
"name": "CVE-2025-38574",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38574"
},
{
"name": "CVE-2025-40306",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40306"
},
{
"name": "CVE-2025-68210",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68210"
},
{
"name": "CVE-2025-40239",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40239"
},
{
"name": "CVE-2025-40147",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40147"
},
{
"name": "CVE-2025-40048",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40048"
},
{
"name": "CVE-2025-38147",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38147"
},
{
"name": "CVE-2025-23155",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-23155"
},
{
"name": "CVE-2025-38286",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38286"
},
{
"name": "CVE-2025-40219",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40219"
},
{
"name": "CVE-2025-39757",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39757"
},
{
"name": "CVE-2025-68200",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68200"
},
{
"name": "CVE-2025-38501",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38501"
},
{
"name": "CVE-2025-38474",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38474"
},
{
"name": "CVE-2025-37979",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37979"
},
{
"name": "CVE-2025-40043",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40043"
},
{
"name": "CVE-2025-68176",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68176"
},
{
"name": "CVE-2025-37777",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37777"
},
{
"name": "CVE-2025-39772",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39772"
},
{
"name": "CVE-2025-68199",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68199"
},
{
"name": "CVE-2025-37936",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37936"
},
{
"name": "CVE-2025-68204",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68204"
},
{
"name": "CVE-2025-38601",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38601"
},
{
"name": "CVE-2025-37766",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37766"
},
{
"name": "CVE-2025-38104",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38104"
},
{
"name": "CVE-2025-37844",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37844"
},
{
"name": "CVE-2025-21931",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21931"
},
{
"name": "CVE-2025-37871",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37871"
},
{
"name": "CVE-2025-37778",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37778"
},
{
"name": "CVE-2025-39716",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39716"
},
{
"name": "CVE-2025-39702",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39702"
},
{
"name": "CVE-2025-38515",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38515"
},
{
"name": "CVE-2025-38645",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38645"
},
{
"name": "CVE-2025-38163",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38163"
},
{
"name": "CVE-2025-22126",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22126"
},
{
"name": "CVE-2025-38444",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38444"
},
{
"name": "CVE-2025-38109",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38109"
},
{
"name": "CVE-2025-39779",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39779"
},
{
"name": "CVE-2025-37755",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37755"
},
{
"name": "CVE-2025-39685",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39685"
},
{
"name": "CVE-2025-38660",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38660"
},
{
"name": "CVE-2025-39761",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39761"
},
{
"name": "CVE-2025-68246",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68246"
},
{
"name": "CVE-2025-40287",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40287"
},
{
"name": "CVE-2025-39720",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39720"
},
{
"name": "CVE-2025-38624",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38624"
},
{
"name": "CVE-2025-40100",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40100"
},
{
"name": "CVE-2025-40285",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40285"
},
{
"name": "CVE-2025-38388",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38388"
},
{
"name": "CVE-2025-38157",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38157"
},
{
"name": "CVE-2025-40063",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40063"
},
{
"name": "CVE-2025-37790",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37790"
},
{
"name": "CVE-2025-40208",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40208"
},
{
"name": "CVE-2025-39746",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39746"
},
{
"name": "CVE-2025-38323",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38323"
},
{
"name": "CVE-2025-40019",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40019"
},
{
"name": "CVE-2025-40039",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40039"
},
{
"name": "CVE-2025-38208",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38208"
},
{
"name": "CVE-2025-40240",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40240"
},
{
"name": "CVE-2025-38219",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38219"
},
{
"name": "CVE-2025-39889",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39889"
},
{
"name": "CVE-2025-38099",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38099"
},
{
"name": "CVE-2025-38524",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38524"
},
{
"name": "CVE-2025-38466",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38466"
},
{
"name": "CVE-2025-40117",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40117"
},
{
"name": "CVE-2025-37758",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37758"
},
{
"name": "CVE-2025-40081",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40081"
},
{
"name": "CVE-2025-38087",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38087"
},
{
"name": "CVE-2025-38039",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38039"
},
{
"name": "CVE-2025-40153",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40153"
},
{
"name": "CVE-2025-40103",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40103"
},
{
"name": "CVE-2025-40294",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40294"
},
{
"name": "CVE-2025-38595",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38595"
},
{
"name": "CVE-2025-38626",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38626"
},
{
"name": "CVE-2025-40356",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40356"
},
{
"name": "CVE-2025-40121",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40121"
},
{
"name": "CVE-2025-40312",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40312"
},
{
"name": "CVE-2025-40204",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40204"
},
{
"name": "CVE-2025-37852",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37852"
},
{
"name": "CVE-2025-37841",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37841"
},
{
"name": "CVE-2025-40171",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40171"
},
{
"name": "CVE-2025-37918",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37918"
},
{
"name": "CVE-2025-37917",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37917"
},
{
"name": "CVE-2025-38290",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38290"
},
{
"name": "CVE-2025-68243",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68243"
},
{
"name": "CVE-2025-38063",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38063"
},
{
"name": "CVE-2025-37770",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37770"
},
{
"name": "CVE-2025-37773",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37773"
},
{
"name": "CVE-2025-68175",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68175"
},
{
"name": "CVE-2025-40221",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40221"
},
{
"name": "CVE-2025-38578",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38578"
},
{
"name": "CVE-2025-40139",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40139"
},
{
"name": "CVE-2025-40056",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40056"
},
{
"name": "CVE-2025-38675",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38675"
},
{
"name": "CVE-2025-38646",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38646"
},
{
"name": "CVE-2025-38491",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38491"
},
{
"name": "CVE-2025-38708",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38708"
},
{
"name": "CVE-2025-37961",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37961"
},
{
"name": "CVE-2025-68248",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68248"
},
{
"name": "CVE-2025-40125",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40125"
},
{
"name": "CVE-2025-40350",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40350"
},
{
"name": "CVE-2025-40309",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40309"
},
{
"name": "CVE-2025-38313",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38313"
},
{
"name": "CVE-2025-38336",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38336"
},
{
"name": "CVE-2025-40349",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40349"
},
{
"name": "CVE-2025-40052",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40052"
},
{
"name": "CVE-2025-38408",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38408"
},
{
"name": "CVE-2025-40343",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40343"
},
{
"name": "CVE-2025-38644",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38644"
},
{
"name": "CVE-2025-38692",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38692"
},
{
"name": "CVE-2025-38061",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38061"
},
{
"name": "CVE-2025-68173",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68173"
},
{
"name": "CVE-2025-37983",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37983"
},
{
"name": "CVE-2025-38127",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38127"
},
{
"name": "CVE-2025-38375",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38375"
},
{
"name": "CVE-2025-37784",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37784"
},
{
"name": "CVE-2025-39701",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39701"
},
{
"name": "CVE-2025-40308",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40308"
},
{
"name": "CVE-2025-40187",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40187"
},
{
"name": "CVE-2025-37920",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37920"
},
{
"name": "CVE-2025-40315",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40315"
},
{
"name": "CVE-2025-37815",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37815"
},
{
"name": "CVE-2025-38686",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38686"
},
{
"name": "CVE-2025-37819",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37819"
},
{
"name": "CVE-2025-40092",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40092"
},
{
"name": "CVE-2025-40298",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40298"
},
{
"name": "CVE-2025-40355",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40355"
},
{
"name": "CVE-2025-38609",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38609"
},
{
"name": "CVE-2025-68186",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68186"
},
{
"name": "CVE-2025-40054",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40054"
},
{
"name": "CVE-2025-68184",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68184"
},
{
"name": "CVE-2024-36357",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36357"
},
{
"name": "CVE-2025-38463",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38463"
},
{
"name": "CVE-2025-40115",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40115"
},
{
"name": "CVE-2025-38112",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38112"
},
{
"name": "CVE-2025-38521",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38521"
},
{
"name": "CVE-2025-38023",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38023"
},
{
"name": "CVE-2025-39709",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39709"
},
{
"name": "CVE-2025-38282",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38282"
},
{
"name": "CVE-2025-39689",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39689"
},
{
"name": "CVE-2025-38215",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38215"
},
{
"name": "CVE-2025-39787",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39787"
},
{
"name": "CVE-2025-37943",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37943"
},
{
"name": "CVE-2025-37745",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37745"
},
{
"name": "CVE-2025-40058",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40058"
},
{
"name": "CVE-2025-39731",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39731"
},
{
"name": "CVE-2025-38734",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38734"
},
{
"name": "CVE-2025-38653",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38653"
},
{
"name": "CVE-2025-38571",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38571"
},
{
"name": "CVE-2025-37789",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37789"
},
{
"name": "CVE-2025-40347",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40347"
},
{
"name": "CVE-2025-38695",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38695"
},
{
"name": "CVE-2025-38004",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38004"
},
{
"name": "CVE-2025-39749",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39749"
},
{
"name": "CVE-2025-40198",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40198"
},
{
"name": "CVE-2025-68310",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68310"
},
{
"name": "CVE-2025-68179",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68179"
},
{
"name": "CVE-2025-40145",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40145"
},
{
"name": "CVE-2025-38387",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38387"
},
{
"name": "CVE-2025-68169",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68169"
},
{
"name": "CVE-2025-38362",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38362"
},
{
"name": "CVE-2025-40173",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40173"
},
{
"name": "CVE-2025-68316",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68316"
},
{
"name": "CVE-2025-68321",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68321"
},
{
"name": "CVE-2025-37924",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37924"
},
{
"name": "CVE-2025-40004",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40004"
},
{
"name": "CVE-2025-38371",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38371"
},
{
"name": "CVE-2025-38445",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38445"
},
{
"name": "CVE-2025-38456",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38456"
},
{
"name": "CVE-2025-38538",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38538"
},
{
"name": "CVE-2025-37867",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37867"
},
{
"name": "CVE-2025-23160",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-23160"
},
{
"name": "CVE-2025-40311",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40311"
},
{
"name": "CVE-2025-38295",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38295"
},
{
"name": "CVE-2025-38461",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38461"
},
{
"name": "CVE-2025-37857",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37857"
},
{
"name": "CVE-2025-37842",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37842"
},
{
"name": "CVE-2025-40237",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40237"
},
{
"name": "CVE-2025-38710",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38710"
},
{
"name": "CVE-2025-39681",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39681"
},
{
"name": "CVE-2025-38060",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38060"
},
{
"name": "CVE-2025-40167",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40167"
},
{
"name": "CVE-2025-38159",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38159"
},
{
"name": "CVE-2025-38066",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38066"
},
{
"name": "CVE-2025-39770",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39770"
},
{
"name": "CVE-2025-37744",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37744"
},
{
"name": "CVE-2025-38705",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38705"
},
{
"name": "CVE-2025-40194",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40194"
},
{
"name": "CVE-2025-38706",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38706"
},
{
"name": "CVE-2025-40333",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40333"
},
{
"name": "CVE-2025-38305",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38305"
},
{
"name": "CVE-2025-37884",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37884"
},
{
"name": "CVE-2025-38067",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38067"
},
{
"name": "CVE-2025-39750",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39750"
},
{
"name": "CVE-2025-38699",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38699"
},
{
"name": "CVE-2025-37927",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37927"
},
{
"name": "CVE-2025-38707",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38707"
},
{
"name": "CVE-2025-38562",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38562"
},
{
"name": "CVE-2025-37897",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37897"
},
{
"name": "CVE-2025-40256",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40256"
},
{
"name": "CVE-2025-37911",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37911"
},
{
"name": "CVE-2025-40245",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40245"
},
{
"name": "CVE-2025-38587",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38587"
},
{
"name": "CVE-2025-37869",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37869"
},
{
"name": "CVE-2025-39692",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39692"
},
{
"name": "CVE-2025-40360",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40360"
},
{
"name": "CVE-2025-40332",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40332"
},
{
"name": "CVE-2025-40082",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40082"
},
{
"name": "CVE-2025-38068",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38068"
},
{
"name": "CVE-2025-38436",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38436"
},
{
"name": "CVE-2025-37930",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37930"
},
{
"name": "CVE-2025-40104",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40104"
},
{
"name": "CVE-2025-38401",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38401"
},
{
"name": "CVE-2025-38677",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38677"
},
{
"name": "CVE-2025-38097",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38097"
},
{
"name": "CVE-2025-37810",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37810"
},
{
"name": "CVE-2025-38253",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38253"
},
{
"name": "CVE-2025-40097",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40097"
},
{
"name": "CVE-2025-38123",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38123"
},
{
"name": "CVE-2025-38338",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38338"
},
{
"name": "CVE-2025-38555",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38555"
},
{
"name": "CVE-2025-38239",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38239"
},
{
"name": "CVE-2025-40001",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40001"
},
{
"name": "CVE-2025-38590",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38590"
},
{
"name": "CVE-2025-38027",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38027"
},
{
"name": "CVE-2025-38102",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38102"
},
{
"name": "CVE-2025-40035",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40035"
},
{
"name": "CVE-2025-68187",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68187"
},
{
"name": "CVE-2025-38283",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38283"
},
{
"name": "CVE-2025-40322",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40322"
},
{
"name": "CVE-2025-68209",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68209"
},
{
"name": "CVE-2025-40045",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40045"
},
{
"name": "CVE-2025-23159",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-23159"
},
{
"name": "CVE-2025-38455",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38455"
},
{
"name": "CVE-2025-40313",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40313"
},
{
"name": "CVE-2025-40089",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40089"
},
{
"name": "CVE-2025-38584",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38584"
},
{
"name": "CVE-2025-38015",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38015"
},
{
"name": "CVE-2025-39675",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39675"
},
{
"name": "CVE-2025-39679",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39679"
},
{
"name": "CVE-2025-38527",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38527"
},
{
"name": "CVE-2025-38449",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38449"
},
{
"name": "CVE-2025-40233",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40233"
},
{
"name": "CVE-2025-40172",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40172"
},
{
"name": "CVE-2025-37853",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37853"
},
{
"name": "CVE-2025-38126",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38126"
},
{
"name": "CVE-2025-38149",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38149"
},
{
"name": "CVE-2025-39763",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39763"
},
{
"name": "CVE-2025-38399",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38399"
},
{
"name": "CVE-2025-38065",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38065"
},
{
"name": "CVE-2025-38693",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38693"
},
{
"name": "CVE-2025-38679",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38679"
},
{
"name": "CVE-2025-38459",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38459"
},
{
"name": "CVE-2025-40188",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40188"
},
{
"name": "CVE-2025-40271",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40271"
},
{
"name": "CVE-2025-40291",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40291"
},
{
"name": "CVE-2025-38685",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38685"
},
{
"name": "CVE-2025-40359",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40359"
},
{
"name": "CVE-2025-38412",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38412"
},
{
"name": "CVE-2025-38031",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38031"
},
{
"name": "CVE-2025-40186",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40186"
},
{
"name": "CVE-2025-38293",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38293"
},
{
"name": "CVE-2025-40073",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40073"
},
{
"name": "CVE-2025-38648",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38648"
},
{
"name": "CVE-2025-38278",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38278"
},
{
"name": "CVE-2025-37764",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37764"
},
{
"name": "CVE-2025-38184",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38184"
},
{
"name": "CVE-2025-37741",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37741"
},
{
"name": "CVE-2025-38053",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38053"
},
{
"name": "CVE-2025-40242",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40242"
},
{
"name": "CVE-2025-37822",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37822"
},
{
"name": "CVE-2025-37912",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37912"
},
{
"name": "CVE-2025-38482",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38482"
},
{
"name": "CVE-2025-37820",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37820"
},
{
"name": "CVE-2025-68198",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68198"
},
{
"name": "CVE-2025-37985",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37985"
},
{
"name": "CVE-2025-68314",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68314"
},
{
"name": "CVE-2025-38634",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38634"
},
{
"name": "CVE-2025-40212",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40212"
},
{
"name": "CVE-2025-37787",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37787"
},
{
"name": "CVE-2025-38008",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38008"
},
{
"name": "CVE-2025-38458",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38458"
},
{
"name": "CVE-2025-39730",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39730"
},
{
"name": "CVE-2025-38011",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38011"
},
{
"name": "CVE-2025-68190",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68190"
},
{
"name": "CVE-2025-38034",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38034"
},
{
"name": "CVE-2025-40086",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40086"
},
{
"name": "CVE-2025-68242",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68242"
},
{
"name": "CVE-2025-38135",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38135"
},
{
"name": "CVE-2025-38619",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38619"
},
{
"name": "CVE-2025-40169",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40169"
},
{
"name": "CVE-2025-38312",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38312"
},
{
"name": "CVE-2025-38095",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38095"
},
{
"name": "CVE-2025-37878",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37878"
},
{
"name": "CVE-2025-39737",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39737"
},
{
"name": "CVE-2025-38464",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38464"
},
{
"name": "CVE-2025-40049",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40049"
},
{
"name": "CVE-2025-68322",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68322"
},
{
"name": "CVE-2025-38363",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38363"
},
{
"name": "CVE-2025-38702",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38702"
},
{
"name": "CVE-2025-38319",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38319"
},
{
"name": "CVE-2025-40238",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40238"
},
{
"name": "CVE-2025-38724",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38724"
},
{
"name": "CVE-2025-68205",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68205"
},
{
"name": "CVE-2025-40277",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40277"
},
{
"name": "CVE-2025-40070",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40070"
},
{
"name": "CVE-2025-38250",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38250"
},
{
"name": "CVE-2025-38457",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38457"
},
{
"name": "CVE-2025-38582",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38582"
},
{
"name": "CVE-2025-37813",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37813"
},
{
"name": "CVE-2025-38543",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38543"
},
{
"name": "CVE-2025-38698",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38698"
},
{
"name": "CVE-2025-38212",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38212"
},
{
"name": "CVE-2025-40106",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40106"
},
{
"name": "CVE-2025-68174",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68174"
},
{
"name": "CVE-2025-38298",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38298"
},
{
"name": "CVE-2025-40272",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40272"
},
{
"name": "CVE-2025-39739",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39739"
},
{
"name": "CVE-2025-38024",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38024"
},
{
"name": "CVE-2025-40047",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40047"
},
{
"name": "CVE-2025-38496",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38496"
},
{
"name": "CVE-2025-38078",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38078"
},
{
"name": "CVE-2025-38419",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38419"
},
{
"name": "CVE-2025-40136",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40136"
},
{
"name": "CVE-2025-38533",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38533"
},
{
"name": "CVE-2025-40344",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40344"
},
{
"name": "CVE-2025-40205",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40205"
},
{
"name": "CVE-2025-40354",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40354"
},
{
"name": "CVE-2025-38169",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38169"
},
{
"name": "CVE-2025-37931",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37931"
},
{
"name": "CVE-2025-38511",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38511"
},
{
"name": "CVE-2025-38537",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38537"
},
{
"name": "CVE-2025-38546",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38546"
},
{
"name": "CVE-2025-38211",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38211"
},
{
"name": "CVE-2025-40033",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40033"
},
{
"name": "CVE-2025-38057",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38057"
},
{
"name": "CVE-2025-40122",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40122"
},
{
"name": "CVE-2025-68188",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68188"
},
{
"name": "CVE-2025-40269",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40269"
},
{
"name": "CVE-2025-37887",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37887"
},
{
"name": "CVE-2025-38077",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38077"
},
{
"name": "CVE-2025-38251",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38251"
},
{
"name": "CVE-2025-37861",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37861"
},
{
"name": "CVE-2025-68319",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68319"
},
{
"name": "CVE-2025-40119",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40119"
},
{
"name": "CVE-2025-38120",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38120"
},
{
"name": "CVE-2025-38285",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38285"
},
{
"name": "CVE-2025-39743",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39743"
},
{
"name": "CVE-2025-39718",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39718"
},
{
"name": "CVE-2025-37938",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37938"
},
{
"name": "CVE-2025-38005",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38005"
},
{
"name": "CVE-2025-38368",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38368"
},
{
"name": "CVE-2025-40075",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40075"
},
{
"name": "CVE-2025-38161",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38161"
},
{
"name": "CVE-2025-38331",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38331"
},
{
"name": "CVE-2025-38354",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38354"
},
{
"name": "CVE-2025-40138",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40138"
},
{
"name": "CVE-2025-38712",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38712"
},
{
"name": "CVE-2025-38732",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38732"
},
{
"name": "CVE-2025-39773",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39773"
},
{
"name": "CVE-2025-38696",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38696"
},
{
"name": "CVE-2025-40143",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40143"
},
{
"name": "CVE-2025-68189",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68189"
},
{
"name": "CVE-2025-38274",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38274"
},
{
"name": "CVE-2025-40076",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40076"
},
{
"name": "CVE-2025-68180",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68180"
},
{
"name": "CVE-2025-37874",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37874"
},
{
"name": "CVE-2025-38115",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38115"
},
{
"name": "CVE-2025-38632",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38632"
},
{
"name": "CVE-2025-37988",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37988"
},
{
"name": "CVE-2025-23158",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-23158"
},
{
"name": "CVE-2025-21780",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21780"
},
{
"name": "CVE-2025-23144",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-23144"
},
{
"name": "CVE-2025-38153",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38153"
},
{
"name": "CVE-2025-37969",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37969"
},
{
"name": "CVE-2025-38548",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38548"
},
{
"name": "CVE-2025-37816",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37816"
},
{
"name": "CVE-2025-37899",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37899"
},
{
"name": "CVE-2025-40362",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40362"
},
{
"name": "CVE-2025-37742",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37742"
},
{
"name": "CVE-2025-68201",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68201"
},
{
"name": "CVE-2025-40289",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40289"
},
{
"name": "CVE-2025-37765",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37765"
},
{
"name": "CVE-2025-38395",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38395"
},
{
"name": "CVE-2025-37921",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37921"
},
{
"name": "CVE-2025-38507",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38507"
},
{
"name": "CVE-2025-40230",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40230"
},
{
"name": "CVE-2025-39989",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39989"
},
{
"name": "CVE-2025-38337",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38337"
},
{
"name": "CVE-2025-38014",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38014"
},
{
"name": "CVE-2025-38258",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38258"
},
{
"name": "CVE-2025-37828",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37828"
},
{
"name": "CVE-2025-37769",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37769"
},
{
"name": "CVE-2025-38465",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38465"
},
{
"name": "CVE-2025-38513",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38513"
},
{
"name": "CVE-2025-40292",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40292"
},
{
"name": "CVE-2025-38086",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38086"
},
{
"name": "CVE-2025-68181",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68181"
},
{
"name": "CVE-2025-37935",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37935"
},
{
"name": "CVE-2025-40032",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40032"
},
{
"name": "CVE-2025-38396",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38396"
},
{
"name": "CVE-2025-23161",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-23161"
},
{
"name": "CVE-2025-38407",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38407"
},
{
"name": "CVE-2025-38493",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38493"
},
{
"name": "CVE-2025-37803",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37803"
},
{
"name": "CVE-2025-40228",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40228"
},
{
"name": "CVE-2025-40150",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40150"
},
{
"name": "CVE-2025-38670",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38670"
},
{
"name": "CVE-2025-39732",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39732"
},
{
"name": "CVE-2025-37824",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37824"
},
{
"name": "CVE-2025-40274",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40274"
},
{
"name": "CVE-2025-38602",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38602"
},
{
"name": "CVE-2025-38003",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38003"
},
{
"name": "CVE-2025-38441",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38441"
},
{
"name": "CVE-2025-40206",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40206"
},
{
"name": "CVE-2025-40218",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40218"
},
{
"name": "CVE-2025-38007",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38007"
},
{
"name": "CVE-2025-37923",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37923"
},
{
"name": "CVE-2025-40088",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40088"
},
{
"name": "CVE-2025-40220",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40220"
},
{
"name": "CVE-2025-38142",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38142"
},
{
"name": "CVE-2025-37739",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37739"
},
{
"name": "CVE-2025-38478",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38478"
},
{
"name": "CVE-2025-38568",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38568"
},
{
"name": "CVE-2025-38583",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38583"
},
{
"name": "CVE-2025-39788",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39788"
},
{
"name": "CVE-2025-37831",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37831"
},
{
"name": "CVE-2025-38499",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38499"
},
{
"name": "CVE-2025-68312",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68312"
},
{
"name": "CVE-2025-40062",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40062"
},
{
"name": "CVE-2025-68194",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68194"
},
{
"name": "CVE-2025-38269",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38269"
},
{
"name": "CVE-2025-38079",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38079"
},
{
"name": "CVE-2025-37940",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37940"
},
{
"name": "CVE-2025-40336",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40336"
},
{
"name": "CVE-2025-37945",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37945"
},
{
"name": "CVE-2025-40067",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40067"
},
{
"name": "CVE-2025-40101",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40101"
},
{
"name": "CVE-2025-38735",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38735"
},
{
"name": "CVE-2025-68251",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68251"
},
{
"name": "CVE-2025-38652",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38652"
},
{
"name": "CVE-2025-38110",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38110"
},
{
"name": "CVE-2025-38422",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38422"
},
{
"name": "CVE-2025-38402",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38402"
},
{
"name": "CVE-2025-39698",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39698"
},
{
"name": "CVE-2025-40038",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40038"
},
{
"name": "CVE-2025-37915",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37915"
},
{
"name": "CVE-2025-68183",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68183"
},
{
"name": "CVE-2025-23146",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-23146"
},
{
"name": "CVE-2025-37903",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37903"
},
{
"name": "CVE-2025-40353",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40353"
},
{
"name": "CVE-2025-40222",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40222"
},
{
"name": "CVE-2025-23142",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-23142"
},
{
"name": "CVE-2025-37738",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37738"
},
{
"name": "CVE-2025-38303",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38303"
},
{
"name": "CVE-2025-38074",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38074"
},
{
"name": "CVE-2025-40085",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40085"
},
{
"name": "CVE-2025-38119",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38119"
},
{
"name": "CVE-2025-38232",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38232"
},
{
"name": "CVE-2025-38245",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38245"
},
{
"name": "CVE-2025-40184",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40184"
},
{
"name": "CVE-2025-68244",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68244"
},
{
"name": "CVE-2025-40231",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40231"
},
{
"name": "CVE-2025-38324",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38324"
},
{
"name": "CVE-2025-40278",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40278"
},
{
"name": "CVE-2025-38018",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38018"
},
{
"name": "CVE-2025-40176",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40176"
},
{
"name": "CVE-2025-40342",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40342"
},
{
"name": "CVE-2025-37830",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37830"
},
{
"name": "CVE-2025-38614",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38614"
},
{
"name": "CVE-2025-37991",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37991"
},
{
"name": "CVE-2025-38425",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38425"
},
{
"name": "CVE-2025-40210",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40210"
},
{
"name": "CVE-2025-37978",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37978"
},
{
"name": "CVE-2025-37781",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37781"
},
{
"name": "CVE-2025-38210",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38210"
},
{
"name": "CVE-2025-38542",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38542"
},
{
"name": "CVE-2025-38664",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38664"
},
{
"name": "CVE-2025-38344",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38344"
},
{
"name": "CVE-2025-23145",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-23145"
},
{
"name": "CVE-2025-38322",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38322"
},
{
"name": "CVE-2025-38088",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38088"
},
{
"name": "CVE-2025-23141",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-23141"
},
{
"name": "CVE-2025-40193",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40193"
},
{
"name": "CVE-2025-37823",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37823"
},
{
"name": "CVE-2025-38332",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38332"
},
{
"name": "CVE-2025-40148",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40148"
},
{
"name": "CVE-2025-40326",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40326"
},
{
"name": "CVE-2025-38386",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38386"
},
{
"name": "CVE-2025-40279",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40279"
},
{
"name": "CVE-2025-38385",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38385"
},
{
"name": "CVE-2025-40201",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40201"
},
{
"name": "CVE-2024-53217",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53217"
},
{
"name": "CVE-2025-37952",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37952"
},
{
"name": "CVE-2025-38694",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38694"
},
{
"name": "CVE-2025-37793",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37793"
},
{
"name": "CVE-2025-40084",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40084"
},
{
"name": "CVE-2025-68311",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68311"
},
{
"name": "CVE-2025-37740",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37740"
},
{
"name": "CVE-2025-38676",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38676"
},
{
"name": "CVE-2025-38530",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38530"
},
{
"name": "CVE-2025-38174",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38174"
},
{
"name": "CVE-2025-37826",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37826"
},
{
"name": "CVE-2025-37986",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37986"
},
{
"name": "CVE-2025-37829",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37829"
},
{
"name": "CVE-2025-68320",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68320"
},
{
"name": "CVE-2025-40341",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40341"
},
{
"name": "CVE-2025-38409",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38409"
},
{
"name": "CVE-2025-40199",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40199"
},
{
"name": "CVE-2025-40183",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40183"
},
{
"name": "CVE-2025-38019",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38019"
},
{
"name": "CVE-2025-38729",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38729"
},
{
"name": "CVE-2025-68172",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68172"
},
{
"name": "CVE-2025-23151",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-23151"
},
{
"name": "CVE-2025-38037",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38037"
},
{
"name": "CVE-2025-40338",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40338"
},
{
"name": "CVE-2025-40195",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40195"
},
{
"name": "CVE-2025-37796",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37796"
},
{
"name": "CVE-2025-37962",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37962"
},
{
"name": "CVE-2025-40134",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40134"
},
{
"name": "CVE-2025-38681",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38681"
},
{
"name": "CVE-2025-37799",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37799"
},
{
"name": "CVE-2025-38593",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38593"
},
{
"name": "CVE-2025-38342",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38342"
},
{
"name": "CVE-2025-39795",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39795"
},
{
"name": "CVE-2025-37801",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37801"
},
{
"name": "CVE-2025-38167",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38167"
},
{
"name": "CVE-2025-37883",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37883"
},
{
"name": "CVE-2025-40302",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40302"
},
{
"name": "CVE-2025-37863",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37863"
},
{
"name": "CVE-2025-37901",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37901"
},
{
"name": "CVE-2025-38687",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38687"
},
{
"name": "CVE-2025-40358",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40358"
},
{
"name": "CVE-2025-37811",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37811"
},
{
"name": "CVE-2025-40165",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40165"
},
{
"name": "CVE-2025-38257",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38257"
},
{
"name": "CVE-2025-68318",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68318"
},
{
"name": "CVE-2025-37864",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37864"
},
{
"name": "CVE-2025-38307",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38307"
},
{
"name": "CVE-2025-40161",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40161"
},
{
"name": "CVE-2025-40357",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40357"
},
{
"name": "CVE-2025-40328",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40328"
},
{
"name": "CVE-2025-37916",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37916"
},
{
"name": "CVE-2025-40340",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40340"
},
{
"name": "CVE-2025-38111",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38111"
},
{
"name": "CVE-2025-37767",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37767"
},
{
"name": "CVE-2025-40283",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40283"
},
{
"name": "CVE-2025-40324",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40324"
},
{
"name": "CVE-2025-37989",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37989"
},
{
"name": "CVE-2025-38529",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38529"
},
{
"name": "CVE-2025-40131",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40131"
},
{
"name": "CVE-2025-40146",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40146"
},
{
"name": "CVE-2025-38326",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38326"
},
{
"name": "CVE-2025-40177",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40177"
},
{
"name": "CVE-2025-38055",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38055"
},
{
"name": "CVE-2025-38129",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38129"
},
{
"name": "CVE-2025-38384",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38384"
},
{
"name": "CVE-2025-38334",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38334"
},
{
"name": "CVE-2025-38728",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38728"
},
{
"name": "CVE-2025-38424",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38424"
},
{
"name": "CVE-2025-38430",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38430"
},
{
"name": "CVE-2025-38715",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38715"
},
{
"name": "CVE-2025-39734",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39734"
},
{
"name": "CVE-2025-38089",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38089"
},
{
"name": "CVE-2025-40226",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40226"
},
{
"name": "CVE-2025-40078",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40078"
},
{
"name": "CVE-2025-38382",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38382"
},
{
"name": "CVE-2025-40074",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40074"
},
{
"name": "CVE-2025-38608",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38608"
},
{
"name": "CVE-2025-40321",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40321"
},
{
"name": "CVE-2025-38650",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38650"
},
{
"name": "CVE-2025-40069",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40069"
},
{
"name": "CVE-2025-39710",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39710"
},
{
"name": "CVE-2025-40116",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40116"
},
{
"name": "CVE-2025-68249",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68249"
},
{
"name": "CVE-2025-38124",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38124"
},
{
"name": "CVE-2025-37925",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37925"
},
{
"name": "CVE-2025-40158",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40158"
},
{
"name": "CVE-2025-39683",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39683"
},
{
"name": "CVE-2025-38420",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38420"
},
{
"name": "CVE-2025-38071",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38071"
},
{
"name": "CVE-2025-40327",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40327"
},
{
"name": "CVE-2025-40130",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40130"
},
{
"name": "CVE-2025-40179",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40179"
},
{
"name": "CVE-2025-37972",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37972"
},
{
"name": "CVE-2025-38183",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38183"
},
{
"name": "CVE-2025-40127",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40127"
},
{
"name": "CVE-2025-37768",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37768"
},
{
"name": "CVE-2025-40282",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40282"
},
{
"name": "CVE-2025-39794",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39794"
},
{
"name": "CVE-2025-38160",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38160"
},
{
"name": "CVE-2025-37984",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37984"
},
{
"name": "CVE-2025-38528",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38528"
},
{
"name": "CVE-2025-40168",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40168"
},
{
"name": "CVE-2025-37856",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37856"
},
{
"name": "CVE-2025-38107",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38107"
},
{
"name": "CVE-2025-38292",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38292"
},
{
"name": "CVE-2025-40053",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40053"
},
{
"name": "CVE-2025-38085",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38085"
},
{
"name": "CVE-2025-38222",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38222"
},
{
"name": "CVE-2025-38010",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38010"
},
{
"name": "CVE-2025-38197",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38197"
},
{
"name": "CVE-2025-38468",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38468"
},
{
"name": "CVE-2025-40120",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40120"
},
{
"name": "CVE-2025-40185",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40185"
},
{
"name": "CVE-2025-38688",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38688"
},
{
"name": "CVE-2025-38333",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38333"
},
{
"name": "CVE-2025-40295",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40295"
},
{
"name": "CVE-2025-68192",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68192"
},
{
"name": "CVE-2025-37970",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37970"
},
{
"name": "CVE-2025-21884",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21884"
},
{
"name": "CVE-2025-37905",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37905"
},
{
"name": "CVE-2025-38390",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38390"
},
{
"name": "CVE-2025-38013",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38013"
},
{
"name": "CVE-2025-40098",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40098"
},
{
"name": "CVE-2025-38059",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38059"
},
{
"name": "CVE-2025-38713",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38713"
},
{
"name": "CVE-2025-37956",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37956"
},
{
"name": "CVE-2025-40243",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40243"
},
{
"name": "CVE-2025-40196",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40196"
},
{
"name": "CVE-2025-38148",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38148"
},
{
"name": "CVE-2025-40129",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40129"
},
{
"name": "CVE-2025-38467",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38467"
},
{
"name": "CVE-2025-38117",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38117"
},
{
"name": "CVE-2025-38094",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38094"
},
{
"name": "CVE-2025-68171",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68171"
},
{
"name": "CVE-2025-38072",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38072"
},
{
"name": "CVE-2025-37967",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37967"
},
{
"name": "CVE-2025-40301",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40301"
},
{
"name": "CVE-2025-38300",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38300"
},
{
"name": "CVE-2025-40040",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40040"
},
{
"name": "CVE-2025-38289",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38289"
},
{
"name": "CVE-2025-39782",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39782"
},
{
"name": "CVE-2025-68207",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68207"
},
{
"name": "CVE-2025-40066",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40066"
},
{
"name": "CVE-2025-38075",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38075"
},
{
"name": "CVE-2025-37885",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37885"
},
{
"name": "CVE-2025-38697",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38697"
},
{
"name": "CVE-2025-37949",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37949"
},
{
"name": "CVE-2025-68167",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68167"
},
{
"name": "CVE-2025-38691",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38691"
},
{
"name": "CVE-2025-40207",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40207"
},
{
"name": "CVE-2025-38373",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38373"
},
{
"name": "CVE-2025-38489",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38489"
},
{
"name": "CVE-2025-40095",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40095"
},
{
"name": "CVE-2025-37957",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37957"
},
{
"name": "CVE-2025-38058",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38058"
},
{
"name": "CVE-2025-38483",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38483"
},
{
"name": "CVE-2025-38369",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38369"
},
{
"name": "CVE-2025-39759",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39759"
},
{
"name": "CVE-2025-38639",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38639"
},
{
"name": "CVE-2025-38122",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38122"
},
{
"name": "CVE-2025-38612",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38612"
},
{
"name": "CVE-2025-40299",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40299"
},
{
"name": "CVE-2025-38173",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38173"
},
{
"name": "CVE-2025-40286",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40286"
},
{
"name": "CVE-2025-38143",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38143"
},
{
"name": "CVE-2025-38098",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38098"
},
{
"name": "CVE-2025-40091",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40091"
},
{
"name": "CVE-2025-40318",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40318"
},
{
"name": "CVE-2025-38566",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38566"
},
{
"name": "CVE-2025-39721",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39721"
},
{
"name": "CVE-2025-68241",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68241"
},
{
"name": "CVE-2025-39760",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39760"
},
{
"name": "CVE-2025-40118",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40118"
},
{
"name": "CVE-2025-38718",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38718"
},
{
"name": "CVE-2025-38392",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38392"
},
{
"name": "CVE-2025-39673",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39673"
},
{
"name": "CVE-2025-38259",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38259"
},
{
"name": "CVE-2025-38663",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38663"
},
{
"name": "CVE-2025-40135",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40135"
},
{
"name": "CVE-2025-38156",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38156"
},
{
"name": "CVE-2025-37951",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37951"
},
{
"name": "CVE-2025-37840",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37840"
},
{
"name": "CVE-2025-68253",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68253"
},
{
"name": "CVE-2025-68734",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68734"
},
{
"name": "CVE-2025-37947",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37947"
},
{
"name": "CVE-2025-38416",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38416"
},
{
"name": "CVE-2025-37846",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37846"
},
{
"name": "CVE-2025-38722",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38722"
},
{
"name": "CVE-2025-38192",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38192"
},
{
"name": "CVE-2025-39800",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39800"
},
{
"name": "CVE-2025-40044",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40044"
},
{
"name": "CVE-2025-38343",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38343"
},
{
"name": "CVE-2025-40105",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40105"
},
{
"name": "CVE-2025-38202",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38202"
},
{
"name": "CVE-2025-40050",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40050"
},
{
"name": "CVE-2025-40072",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40072"
},
{
"name": "CVE-2025-40112",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40112"
},
{
"name": "CVE-2025-40079",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40079"
},
{
"name": "CVE-2025-22101",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22101"
},
{
"name": "CVE-2025-38374",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38374"
},
{
"name": "CVE-2025-39703",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39703"
},
{
"name": "CVE-2025-38194",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38194"
},
{
"name": "CVE-2025-68182",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68182"
},
{
"name": "CVE-2025-38549",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38549"
},
{
"name": "CVE-2025-40310",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40310"
},
{
"name": "CVE-2025-38665",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38665"
},
{
"name": "CVE-2025-38101",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38101"
},
{
"name": "CVE-2025-37982",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37982"
},
{
"name": "CVE-2025-37992",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37992"
},
{
"name": "CVE-2025-38577",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38577"
},
{
"name": "CVE-2025-38671",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38671"
},
{
"name": "CVE-2025-68317",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68317"
},
{
"name": "CVE-2025-38299",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38299"
},
{
"name": "CVE-2025-40154",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40154"
},
{
"name": "CVE-2025-40331",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40331"
},
{
"name": "CVE-2025-38635",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38635"
},
{
"name": "CVE-2025-38704",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38704"
},
{
"name": "CVE-2025-38348",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38348"
},
{
"name": "CVE-2025-40270",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40270"
},
{
"name": "CVE-2025-40191",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40191"
},
{
"name": "CVE-2025-38488",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38488"
},
{
"name": "CVE-2025-40189",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40189"
},
{
"name": "CVE-2025-40093",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40093"
},
{
"name": "CVE-2025-38540",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38540"
},
{
"name": "CVE-2025-38040",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38040"
},
{
"name": "CVE-2025-38265",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38265"
},
{
"name": "CVE-2025-23149",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-23149"
},
{
"name": "CVE-2025-38403",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38403"
},
{
"name": "CVE-2025-38552",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38552"
},
{
"name": "CVE-2025-40335",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40335"
},
{
"name": "CVE-2025-40149",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40149"
},
{
"name": "CVE-2025-37914",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37914"
},
{
"name": "CVE-2025-40164",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40164"
},
{
"name": "CVE-2025-37873",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37873"
},
{
"name": "CVE-2025-37928",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37928"
},
{
"name": "CVE-2025-40267",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40267"
},
{
"name": "CVE-2025-40235",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40235"
},
{
"name": "CVE-2025-39766",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39766"
},
{
"name": "CVE-2025-39801",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39801"
},
{
"name": "CVE-2025-37922",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37922"
},
{
"name": "CVE-2025-38146",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38146"
},
{
"name": "CVE-2025-68208",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68208"
},
{
"name": "CVE-2025-39724",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39724"
},
{
"name": "CVE-2025-39687",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39687"
},
{
"name": "CVE-2025-37794",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37794"
},
{
"name": "CVE-2025-38510",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38510"
},
{
"name": "CVE-2025-38246",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38246"
},
{
"name": "CVE-2025-39758",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39758"
},
{
"name": "CVE-2025-39694",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39694"
},
{
"name": "CVE-2025-38220",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38220"
},
{
"name": "CVE-2025-38405",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38405"
},
{
"name": "CVE-2025-38418",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38418"
},
{
"name": "CVE-2025-40352",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40352"
},
{
"name": "CVE-2025-38090",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38090"
},
{
"name": "CVE-2025-38429",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38429"
},
{
"name": "CVE-2025-38225",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38225"
},
{
"name": "CVE-2025-22037",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22037"
},
{
"name": "CVE-2025-40280",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40280"
},
{
"name": "CVE-2025-38155",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38155"
},
{
"name": "CVE-2025-40099",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40099"
},
{
"name": "CVE-2025-37977",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37977"
},
{
"name": "CVE-2025-38365",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38365"
},
{
"name": "CVE-2025-38415",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38415"
},
{
"name": "CVE-2025-40031",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40031"
},
{
"name": "CVE-2025-40180",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40180"
},
{
"name": "CVE-2025-40293",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40293"
},
{
"name": "CVE-2025-38668",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38668"
},
{
"name": "CVE-2025-37973",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37973"
},
{
"name": "CVE-2025-40330",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40330"
},
{
"name": "CVE-2025-68750",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68750"
},
{
"name": "CVE-2025-38260",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38260"
},
{
"name": "CVE-2025-37827",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37827"
},
{
"name": "CVE-2025-38721",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38721"
},
{
"name": "CVE-2025-38244",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38244"
},
{
"name": "CVE-2025-38080",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38080"
},
{
"name": "CVE-2025-40126",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40126"
},
{
"name": "CVE-2025-37748",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37748"
},
{
"name": "CVE-2025-38364",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38364"
},
{
"name": "CVE-2025-38615",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38615"
},
{
"name": "CVE-2025-39684",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39684"
},
{
"name": "CVE-2025-37836",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37836"
},
{
"name": "CVE-2025-38526",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38526"
},
{
"name": "CVE-2025-38472",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38472"
},
{
"name": "CVE-2025-37944",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37944"
},
{
"name": "CVE-2025-38506",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38506"
},
{
"name": "CVE-2025-40320",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40320"
},
{
"name": "CVE-2025-38703",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38703"
},
{
"name": "CVE-2025-38494",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38494"
},
{
"name": "CVE-2025-39753",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39753"
},
{
"name": "CVE-2025-38604",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38604"
},
{
"name": "CVE-2025-40203",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40203"
},
{
"name": "CVE-2025-38623",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38623"
},
{
"name": "CVE-2025-38193",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38193"
},
{
"name": "CVE-2025-38400",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38400"
},
{
"name": "CVE-2025-38136",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38136"
},
{
"name": "CVE-2025-40192",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40192"
},
{
"name": "CVE-2025-38544",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38544"
},
{
"name": "CVE-2025-37771",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37771"
},
{
"name": "CVE-2025-39797",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39797"
},
{
"name": "CVE-2025-40200",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40200"
},
{
"name": "CVE-2025-38236",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38236"
},
{
"name": "CVE-2025-38725",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38725"
},
{
"name": "CVE-2025-37975",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37975"
},
{
"name": "CVE-2025-40124",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40124"
},
{
"name": "CVE-2025-38347",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38347"
},
{
"name": "CVE-2025-39776",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39776"
},
{
"name": "CVE-2025-37998",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37998"
},
{
"name": "CVE-2025-38198",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38198"
},
{
"name": "CVE-2025-23163",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-23163"
},
{
"name": "CVE-2025-40094",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40094"
},
{
"name": "CVE-2025-37968",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37968"
},
{
"name": "CVE-2025-38376",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38376"
},
{
"name": "CVE-2025-38006",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38006"
},
{
"name": "CVE-2025-40102",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40102"
},
{
"name": "CVE-2025-40170",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40170"
},
{
"name": "CVE-2025-38437",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38437"
},
{
"name": "CVE-2025-40160",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40160"
},
{
"name": "CVE-2025-40284",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40284"
},
{
"name": "CVE-2025-38125",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38125"
},
{
"name": "CVE-2025-40209",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40209"
},
{
"name": "CVE-2025-40077",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40077"
},
{
"name": "CVE-2025-38351",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38351"
},
{
"name": "CVE-2025-38048",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38048"
},
{
"name": "CVE-2025-40071",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40071"
},
{
"name": "CVE-2025-38683",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38683"
},
{
"name": "CVE-2025-40113",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40113"
},
{
"name": "CVE-2025-39736",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39736"
},
{
"name": "CVE-2025-40234",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40234"
},
{
"name": "CVE-2025-37757",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37757"
},
{
"name": "CVE-2025-68247",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68247"
},
{
"name": "CVE-2025-40305",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40305"
},
{
"name": "CVE-2025-40080",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40080"
},
{
"name": "CVE-2025-38009",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38009"
},
{
"name": "CVE-2025-40215",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40215"
},
{
"name": "CVE-2025-40307",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40307"
},
{
"name": "CVE-2025-40111",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40111"
},
{
"name": "CVE-2025-38081",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38081"
},
{
"name": "CVE-2025-37809",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37809"
},
{
"name": "CVE-2024-36350",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36350"
},
{
"name": "CVE-2025-40211",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40211"
},
{
"name": "CVE-2025-40068",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40068"
},
{
"name": "CVE-2025-38185",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38185"
},
{
"name": "CVE-2025-39691",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39691"
},
{
"name": "CVE-2025-38406",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38406"
},
{
"name": "CVE-2025-68315",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68315"
},
{
"name": "CVE-2025-40163",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40163"
},
{
"name": "CVE-2025-40042",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40042"
},
{
"name": "CVE-2025-37817",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37817"
},
{
"name": "CVE-2025-40155",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40155"
},
{
"name": "CVE-2025-39890",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39890"
},
{
"name": "CVE-2025-39742",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39742"
},
{
"name": "CVE-2025-40217",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40217"
},
{
"name": "CVE-2025-22102",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22102"
},
{
"name": "CVE-2025-37987",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37987"
},
{
"name": "CVE-2025-37749",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37749"
},
{
"name": "CVE-2024-36331",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36331"
},
{
"name": "CVE-2025-39748",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39748"
},
{
"name": "CVE-2025-40133",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40133"
},
{
"name": "CVE-2025-38263",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38263"
},
{
"name": "CVE-2025-38610",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38610"
},
{
"name": "CVE-2025-37772",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37772"
},
{
"name": "CVE-2025-38214",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38214"
},
{
"name": "CVE-2025-38560",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38560"
},
{
"name": "CVE-2025-37994",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37994"
},
{
"name": "CVE-2025-38551",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38551"
},
{
"name": "CVE-2025-38701",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38701"
},
{
"name": "CVE-2025-38218",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38218"
},
{
"name": "CVE-2025-40329",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40329"
},
{
"name": "CVE-2025-38349",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38349"
},
{
"name": "CVE-2025-39726",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39726"
},
{
"name": "CVE-2025-38393",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38393"
},
{
"name": "CVE-2025-37891",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37891"
},
{
"name": "CVE-2025-38249",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38249"
},
{
"name": "CVE-2025-38716",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38716"
},
{
"name": "CVE-2025-37858",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37858"
},
{
"name": "CVE-2025-38154",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38154"
},
{
"name": "CVE-2025-38469",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38469"
},
{
"name": "CVE-2025-38581",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38581"
},
{
"name": "CVE-2025-40034",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40034"
},
{
"name": "CVE-2025-40060",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40060"
},
{
"name": "CVE-2025-39790",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39790"
},
{
"name": "CVE-2025-38389",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38389"
},
{
"name": "CVE-2025-38448",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38448"
},
{
"name": "CVE-2025-37780",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37780"
},
{
"name": "CVE-2025-37995",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37995"
},
{
"name": "CVE-2025-38680",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38680"
},
{
"name": "CVE-2025-37754",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37754"
},
{
"name": "CVE-2025-40059",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40059"
},
{
"name": "CVE-2025-38497",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38497"
},
{
"name": "CVE-2025-68168",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68168"
},
{
"name": "CVE-2025-23156",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-23156"
},
{
"name": "CVE-2025-23157",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-23157"
},
{
"name": "CVE-2025-68206",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68206"
},
{
"name": "CVE-2025-68309",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68309"
},
{
"name": "CVE-2025-38684",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38684"
},
{
"name": "CVE-2025-38165",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38165"
},
{
"name": "CVE-2025-40003",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40003"
},
{
"name": "CVE-2025-39686",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39686"
},
{
"name": "CVE-2025-39798",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39798"
},
{
"name": "CVE-2025-38495",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38495"
},
{
"name": "CVE-2025-37808",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37808"
},
{
"name": "CVE-2025-38730",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38730"
},
{
"name": "CVE-2025-38052",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38052"
},
{
"name": "CVE-2025-38377",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38377"
},
{
"name": "CVE-2025-40175",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40175"
},
{
"name": "CVE-2025-68170",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68170"
},
{
"name": "CVE-2025-39747",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39747"
},
{
"name": "CVE-2025-68313",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68313"
},
{
"name": "CVE-2025-38516",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38516"
},
{
"name": "CVE-2025-38462",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38462"
},
{
"name": "CVE-2025-38428",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38428"
},
{
"name": "CVE-2025-39714",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39714"
},
{
"name": "CVE-2025-38262",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38262"
},
{
"name": "CVE-2025-38138",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38138"
},
{
"name": "CVE-2025-38035",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38035"
},
{
"name": "CVE-2025-37759",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37759"
},
{
"name": "CVE-2025-38414",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38414"
},
{
"name": "CVE-2025-68197",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68197"
},
{
"name": "CVE-2025-40123",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40123"
},
{
"name": "CVE-2025-37933",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37933"
},
{
"name": "CVE-2025-38310",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38310"
},
{
"name": "CVE-2025-37886",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37886"
},
{
"name": "CVE-2025-37963",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37963"
},
{
"name": "CVE-2025-40297",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40297"
},
{
"name": "CVE-2025-38226",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38226"
},
{
"name": "CVE-2025-39706",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39706"
},
{
"name": "CVE-2025-40178",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40178"
},
{
"name": "CVE-2025-40363",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40363"
},
{
"name": "CVE-2025-38443",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38443"
},
{
"name": "CVE-2025-38576",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38576"
},
{
"name": "CVE-2025-37800",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37800"
},
{
"name": "CVE-2025-40276",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40276"
},
{
"name": "CVE-2025-37900",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37900"
},
{
"name": "CVE-2025-40224",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40224"
},
{
"name": "CVE-2025-38439",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38439"
},
{
"name": "CVE-2025-37805",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37805"
},
{
"name": "CVE-2025-68245",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68245"
},
{
"name": "CVE-2025-39719",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39719"
},
{
"name": "CVE-2025-40317",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40317"
},
{
"name": "CVE-2025-40236",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40236"
},
{
"name": "CVE-2025-37990",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37990"
},
{
"name": "CVE-2025-38553",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38553"
},
{
"name": "CVE-2025-38190",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38190"
},
{
"name": "CVE-2025-38180",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38180"
},
{
"name": "CVE-2025-39738",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39738"
},
{
"name": "CVE-2025-68202",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68202"
},
{
"name": "CVE-2025-38145",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38145"
},
{
"name": "CVE-2025-40174",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40174"
},
{
"name": "CVE-2025-37948",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37948"
},
{
"name": "CVE-2025-38166",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38166"
},
{
"name": "CVE-2025-40227",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40227"
},
{
"name": "CVE-2025-37862",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37862"
},
{
"name": "CVE-2025-38321",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38321"
},
{
"name": "CVE-2025-39705",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39705"
},
{
"name": "CVE-2025-40316",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40316"
},
{
"name": "CVE-2025-37960",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37960"
},
{
"name": "CVE-2025-38045",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38045"
},
{
"name": "CVE-2025-38051",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38051"
},
{
"name": "CVE-2025-39713",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39713"
},
{
"name": "CVE-2025-37763",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37763"
},
{
"name": "CVE-2025-37954",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37954"
},
{
"name": "CVE-2025-22128",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22128"
},
{
"name": "CVE-2025-40065",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40065"
},
{
"name": "CVE-2025-37839",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37839"
},
{
"name": "CVE-2025-39744",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39744"
},
{
"name": "CVE-2025-38277",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38277"
},
{
"name": "CVE-2025-37913",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37913"
},
{
"name": "CVE-2025-68177",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68177"
},
{
"name": "CVE-2025-39756",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39756"
},
{
"name": "CVE-2025-38539",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38539"
},
{
"name": "CVE-2025-40181",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40181"
},
{
"name": "CVE-2025-68191",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68191"
},
{
"name": "CVE-2025-38044",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38044"
},
{
"name": "CVE-2025-68250",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68250"
},
{
"name": "CVE-2025-37786",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37786"
},
{
"name": "CVE-2025-40141",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40141"
},
{
"name": "CVE-2025-38200",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38200"
},
{
"name": "CVE-2025-38480",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38480"
},
{
"name": "CVE-2025-40132",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40132"
},
{
"name": "CVE-2025-38346",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38346"
},
{
"name": "CVE-2025-40152",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40152"
},
{
"name": "CVE-2025-37959",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37959"
},
{
"name": "CVE-2025-38191",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38191"
},
{
"name": "CVE-2025-39946",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39946"
},
{
"name": "CVE-2024-50299",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50299"
},
{
"name": "CVE-2025-38062",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38062"
},
{
"name": "CVE-2025-38531",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38531"
},
{
"name": "CVE-2025-40288",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40288"
},
{
"name": "CVE-2025-68239",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68239"
},
{
"name": "CVE-2025-39693",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39693"
},
{
"name": "CVE-2025-40281",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40281"
},
{
"name": "CVE-2025-68185",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68185"
},
{
"name": "CVE-2025-40304",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40304"
},
{
"name": "CVE-2025-38503",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38503"
},
{
"name": "CVE-2025-40110",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40110"
},
{
"name": "CVE-2025-40162",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40162"
},
{
"name": "CVE-2025-38630",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38630"
},
{
"name": "CVE-2025-38131",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38131"
},
{
"name": "CVE-2025-40268",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40268"
},
{
"name": "CVE-2025-37851",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37851"
},
{
"name": "CVE-2025-38481",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38481"
},
{
"name": "CVE-2025-38585",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38585"
},
{
"name": "CVE-2025-38320",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38320"
},
{
"name": "CVE-2025-38625",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38625"
},
{
"name": "CVE-2025-38164",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38164"
},
{
"name": "CVE-2025-40303",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40303"
},
{
"name": "CVE-2025-68178",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68178"
},
{
"name": "CVE-2025-40337",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40337"
},
{
"name": "CVE-2025-40346",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40346"
},
{
"name": "CVE-2025-38264",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38264"
},
{
"name": "CVE-2025-40036",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40036"
},
{
"name": "CVE-2025-39676",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39676"
},
{
"name": "CVE-2025-40241",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40241"
},
{
"name": "CVE-2025-37980",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37980"
},
{
"name": "CVE-2025-38280",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38280"
},
{
"name": "CVE-2025-37788",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37788"
},
{
"name": "CVE-2025-38427",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38427"
},
{
"name": "CVE-2025-38084",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38084"
},
{
"name": "CVE-2025-40046",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40046"
},
{
"name": "CVE-2025-37879",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37879"
},
{
"name": "CVE-2025-38217",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38217"
},
{
"name": "CVE-2025-40030",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40030"
},
{
"name": "CVE-2025-40244",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40244"
},
{
"name": "CVE-2025-37881",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37881"
},
{
"name": "CVE-2025-38103",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38103"
},
{
"name": "CVE-2025-38514",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38514"
},
{
"name": "CVE-2025-39783",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39783"
},
{
"name": "CVE-2025-39715",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39715"
},
{
"name": "CVE-2025-40323",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40323"
},
{
"name": "CVE-2025-38569",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38569"
},
{
"name": "CVE-2025-38255",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38255"
},
{
"name": "CVE-2025-38512",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38512"
},
{
"name": "CVE-2025-40096",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40096"
},
{
"name": "CVE-2025-38622",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38622"
},
{
"name": "CVE-2025-37909",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37909"
},
{
"name": "CVE-2025-38700",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38700"
},
{
"name": "CVE-2025-37849",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37849"
},
{
"name": "CVE-2025-38162",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38162"
},
{
"name": "CVE-2025-38532",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38532"
},
{
"name": "CVE-2025-39712",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39712"
},
{
"name": "CVE-2025-37812",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37812"
},
{
"name": "CVE-2025-39707",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39707"
},
{
"name": "CVE-2025-40275",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40275"
},
{
"name": "CVE-2025-37875",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37875"
},
{
"name": "CVE-2025-38410",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38410"
},
{
"name": "CVE-2025-40182",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40182"
},
{
"name": "CVE-2025-68211",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68211"
},
{
"name": "CVE-2025-39781",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39781"
},
{
"name": "CVE-2025-38640",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38640"
},
{
"name": "CVE-2025-38476",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38476"
},
{
"name": "CVE-2025-38659",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38659"
},
{
"name": "CVE-2025-40339",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40339"
},
{
"name": "CVE-2025-40140",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40140"
},
{
"name": "CVE-2025-38020",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38020"
},
{
"name": "CVE-2025-40223",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40223"
},
{
"name": "CVE-2025-38572",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38572"
},
{
"name": "CVE-2025-23140",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-23140"
},
{
"name": "CVE-2025-23150",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-23150"
},
{
"name": "CVE-2025-38460",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38460"
},
{
"name": "CVE-2025-40061",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40061"
},
{
"name": "CVE-2025-38182",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38182"
},
{
"name": "CVE-2025-38550",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38550"
},
{
"name": "CVE-2025-38275",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38275"
},
{
"name": "CVE-2025-40213",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40213"
},
{
"name": "CVE-2025-38345",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38345"
},
{
"name": "CVE-2025-40334",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40334"
},
{
"name": "CVE-2025-38170",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38170"
},
{
"name": "CVE-2025-39711",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39711"
},
{
"name": "CVE-2025-22115",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22115"
},
{
"name": "CVE-2025-22120",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22120"
},
{
"name": "CVE-2025-38535",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38535"
},
{
"name": "CVE-2022-49267",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49267"
},
{
"name": "CVE-2025-38231",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38231"
},
{
"name": "CVE-2025-37854",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37854"
},
{
"name": "CVE-2025-40142",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40142"
},
{
"name": "CVE-2025-40159",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40159"
},
{
"name": "CVE-2025-40319",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40319"
},
{
"name": "CVE-2025-68193",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68193"
},
{
"name": "CVE-2025-38473",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38473"
},
{
"name": "CVE-2025-38113",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38113"
},
{
"name": "CVE-2025-38714",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38714"
},
{
"name": "CVE-2025-23148",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-23148"
},
{
"name": "CVE-2025-38361",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38361"
},
{
"name": "CVE-2025-38470",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38470"
},
{
"name": "CVE-2025-38181",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38181"
},
{
"name": "CVE-2025-40051",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40051"
},
{
"name": "CVE-2025-38391",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38391"
},
{
"name": "CVE-2025-38248",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38248"
},
{
"name": "CVE-2025-40351",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40351"
},
{
"name": "CVE-2025-40087",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40087"
},
{
"name": "CVE-2025-40229",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40229"
},
{
"name": "CVE-2025-23147",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-23147"
},
{
"name": "CVE-2025-39752",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39752"
}
],
"initial_release_date": "2026-02-27T00:00:00",
"last_revision_date": "2026-02-27T00:00:00",
"links": [],
"reference": "CERTFR-2026-AVI-0227",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2026-02-27T00:00:00.000000"
}
],
"risks": [
{
"description": "Atteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es"
},
{
"description": "Non sp\u00e9cifi\u00e9 par l\u0027\u00e9diteur"
},
{
"description": "D\u00e9ni de service"
},
{
"description": "Contournement de la politique de s\u00e9curit\u00e9"
},
{
"description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans le noyau Linux d\u0027Ubuntu. Certaines d\u0027entre elles permettent \u00e0 un attaquant de provoquer une atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es, une atteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es et un contournement de la politique de s\u00e9curit\u00e9.",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans le noyau Linux d\u0027Ubuntu",
"vendor_advisories": [
{
"published_at": "2026-02-24",
"title": "Bulletin de s\u00e9curit\u00e9 Ubuntu USN-8060-1",
"url": "https://ubuntu.com/security/notices/USN-8060-1"
},
{
"published_at": "2026-02-24",
"title": "Bulletin de s\u00e9curit\u00e9 Ubuntu USN-8059-2",
"url": "https://ubuntu.com/security/notices/USN-8059-2"
},
{
"published_at": "2026-02-24",
"title": "Bulletin de s\u00e9curit\u00e9 Ubuntu USN-8028-8",
"url": "https://ubuntu.com/security/notices/USN-8028-8"
},
{
"published_at": "2026-02-25",
"title": "Bulletin de s\u00e9curit\u00e9 Ubuntu USN-8060-4",
"url": "https://ubuntu.com/security/notices/USN-8060-4"
},
{
"published_at": "2026-02-24",
"title": "Bulletin de s\u00e9curit\u00e9 Ubuntu USN-8052-2",
"url": "https://ubuntu.com/security/notices/USN-8052-2"
},
{
"published_at": "2026-02-24",
"title": "Bulletin de s\u00e9curit\u00e9 Ubuntu USN-8060-2",
"url": "https://ubuntu.com/security/notices/USN-8060-2"
},
{
"published_at": "2026-02-25",
"title": "Bulletin de s\u00e9curit\u00e9 Ubuntu USN-8059-4",
"url": "https://ubuntu.com/security/notices/USN-8059-4"
},
{
"published_at": "2026-02-26",
"title": "Bulletin de s\u00e9curit\u00e9 Ubuntu USN-8059-6",
"url": "https://ubuntu.com/security/notices/USN-8059-6"
},
{
"published_at": "2026-02-24",
"title": "Bulletin de s\u00e9curit\u00e9 Ubuntu USN-8061-1",
"url": "https://ubuntu.com/security/notices/USN-8061-1"
},
{
"published_at": "2026-02-24",
"title": "Bulletin de s\u00e9curit\u00e9 Ubuntu USN-8060-3",
"url": "https://ubuntu.com/security/notices/USN-8060-3"
},
{
"published_at": "2026-02-24",
"title": "Bulletin de s\u00e9curit\u00e9 Ubuntu USN-8059-1",
"url": "https://ubuntu.com/security/notices/USN-8059-1"
},
{
"published_at": "2026-02-24",
"title": "Bulletin de s\u00e9curit\u00e9 Ubuntu USN-8029-3",
"url": "https://ubuntu.com/security/notices/USN-8029-3"
},
{
"published_at": "2026-02-25",
"title": "Bulletin de s\u00e9curit\u00e9 Ubuntu USN-8059-5",
"url": "https://ubuntu.com/security/notices/USN-8059-5"
},
{
"published_at": "2026-02-25",
"title": "Bulletin de s\u00e9curit\u00e9 Ubuntu USN-8059-3",
"url": "https://ubuntu.com/security/notices/USN-8059-3"
},
{
"published_at": "2026-02-20",
"title": "Bulletin de s\u00e9curit\u00e9 Ubuntu USN-8015-5",
"url": "https://ubuntu.com/security/notices/USN-8015-5"
}
]
}
CERTFR-2025-AVI-1048
Vulnerability from certfr_avis - Published: 2025-11-28 - Updated: 2025-11-28
De multiples vulnérabilités ont été découvertes dans le noyau Linux de Debian LTS. Certaines d'entre elles permettent à un attaquant de provoquer une élévation de privilèges, une atteinte à la confidentialité des données et une atteinte à l'intégrité des données.
Solutions
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
| Title | Publication Time | Tags | |||
|---|---|---|---|---|---|
|
|||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "Debian LTS bullseye versions ant\u00e9rieures \u00e0 6.1.158-1~deb11u1",
"product": {
"name": "Debian",
"vendor": {
"name": "Debian",
"scada": false
}
}
}
],
"affected_systems_content": "",
"content": "## Solutions\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des correctifs (cf. section Documentation).",
"cves": [
{
"name": "CVE-2025-39987",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39987"
},
{
"name": "CVE-2025-21861",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21861"
},
{
"name": "CVE-2025-40156",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40156"
},
{
"name": "CVE-2025-40055",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40055"
},
{
"name": "CVE-2025-40029",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40029"
},
{
"name": "CVE-2025-40008",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40008"
},
{
"name": "CVE-2025-40048",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40048"
},
{
"name": "CVE-2025-40043",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40043"
},
{
"name": "CVE-2025-39973",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39973"
},
{
"name": "CVE-2025-39943",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39943"
},
{
"name": "CVE-2025-39945",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39945"
},
{
"name": "CVE-2025-40100",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40100"
},
{
"name": "CVE-2025-40019",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40019"
},
{
"name": "CVE-2025-40081",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40081"
},
{
"name": "CVE-2025-40026",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40026"
},
{
"name": "CVE-2025-40153",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40153"
},
{
"name": "CVE-2025-40103",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40103"
},
{
"name": "CVE-2025-40121",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40121"
},
{
"name": "CVE-2025-40204",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40204"
},
{
"name": "CVE-2025-40171",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40171"
},
{
"name": "CVE-2025-40056",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40056"
},
{
"name": "CVE-2025-40125",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40125"
},
{
"name": "CVE-2025-40187",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40187"
},
{
"name": "CVE-2025-40092",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40092"
},
{
"name": "CVE-2025-39967",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39967"
},
{
"name": "CVE-2025-40107",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40107"
},
{
"name": "CVE-2025-40115",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40115"
},
{
"name": "CVE-2025-40198",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40198"
},
{
"name": "CVE-2025-39942",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39942"
},
{
"name": "CVE-2025-39929",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39929"
},
{
"name": "CVE-2025-39949",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39949"
},
{
"name": "CVE-2025-40173",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40173"
},
{
"name": "CVE-2025-40190",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40190"
},
{
"name": "CVE-2025-40010",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40010"
},
{
"name": "CVE-2025-39944",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39944"
},
{
"name": "CVE-2025-40202",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40202"
},
{
"name": "CVE-2025-39953",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39953"
},
{
"name": "CVE-2025-40167",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40167"
},
{
"name": "CVE-2025-39969",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39969"
},
{
"name": "CVE-2025-40194",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40194"
},
{
"name": "CVE-2025-40104",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40104"
},
{
"name": "CVE-2025-40001",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40001"
},
{
"name": "CVE-2025-40035",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40035"
},
{
"name": "CVE-2025-39988",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39988"
},
{
"name": "CVE-2025-40020",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40020"
},
{
"name": "CVE-2025-40188",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40188"
},
{
"name": "CVE-2025-40186",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40186"
},
{
"name": "CVE-2025-40013",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40013"
},
{
"name": "CVE-2025-40049",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40049"
},
{
"name": "CVE-2025-40070",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40070"
},
{
"name": "CVE-2025-40106",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40106"
},
{
"name": "CVE-2025-40205",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40205"
},
{
"name": "CVE-2025-39977",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39977"
},
{
"name": "CVE-2025-40027",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40027"
},
{
"name": "CVE-2025-39970",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39970"
},
{
"name": "CVE-2025-40032",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40032"
},
{
"name": "CVE-2025-39994",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39994"
},
{
"name": "CVE-2025-40088",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40088"
},
{
"name": "CVE-2025-40062",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40062"
},
{
"name": "CVE-2025-40197",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40197"
},
{
"name": "CVE-2025-40109",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40109"
},
{
"name": "CVE-2025-40006",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40006"
},
{
"name": "CVE-2025-40011",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40011"
},
{
"name": "CVE-2025-40085",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40085"
},
{
"name": "CVE-2025-40176",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40176"
},
{
"name": "CVE-2025-40193",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40193"
},
{
"name": "CVE-2025-40201",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40201"
},
{
"name": "CVE-2025-40084",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40084"
},
{
"name": "CVE-2025-40183",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40183"
},
{
"name": "CVE-2025-39998",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39998"
},
{
"name": "CVE-2025-40134",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40134"
},
{
"name": "CVE-2025-39968",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39968"
},
{
"name": "CVE-2025-39986",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39986"
},
{
"name": "CVE-2025-39955",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39955"
},
{
"name": "CVE-2025-40078",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40078"
},
{
"name": "CVE-2025-40116",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40116"
},
{
"name": "CVE-2025-39934",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39934"
},
{
"name": "CVE-2025-39978",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39978"
},
{
"name": "CVE-2025-40179",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40179"
},
{
"name": "CVE-2025-40127",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40127"
},
{
"name": "CVE-2025-39996",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39996"
},
{
"name": "CVE-2025-40053",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40053"
},
{
"name": "CVE-2025-39951",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39951"
},
{
"name": "CVE-2025-40120",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40120"
},
{
"name": "CVE-2025-39938",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39938"
},
{
"name": "CVE-2025-39982",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39982"
},
{
"name": "CVE-2025-40040",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40040"
},
{
"name": "CVE-2025-40207",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40207"
},
{
"name": "CVE-2025-40095",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40095"
},
{
"name": "CVE-2025-40118",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40118"
},
{
"name": "CVE-2025-40021",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40021"
},
{
"name": "CVE-2025-39964",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39964"
},
{
"name": "CVE-2025-39993",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39993"
},
{
"name": "CVE-2025-40044",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40044"
},
{
"name": "CVE-2025-40105",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40105"
},
{
"name": "CVE-2025-40112",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40112"
},
{
"name": "CVE-2025-39971",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39971"
},
{
"name": "CVE-2025-40154",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40154"
},
{
"name": "CVE-2025-40093",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40093"
},
{
"name": "CVE-2025-40099",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40099"
},
{
"name": "CVE-2025-40126",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40126"
},
{
"name": "CVE-2025-39972",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39972"
},
{
"name": "CVE-2025-40018",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40018"
},
{
"name": "CVE-2025-40200",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40200"
},
{
"name": "CVE-2025-40124",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40124"
},
{
"name": "CVE-2025-40094",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40094"
},
{
"name": "CVE-2025-40080",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40080"
},
{
"name": "CVE-2025-40111",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40111"
},
{
"name": "CVE-2025-40068",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40068"
},
{
"name": "CVE-2025-40042",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40042"
},
{
"name": "CVE-2025-39957",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39957"
},
{
"name": "CVE-2025-39931",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39931"
},
{
"name": "CVE-2025-39937",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39937"
},
{
"name": "CVE-2025-40060",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40060"
},
{
"name": "CVE-2025-40123",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40123"
},
{
"name": "CVE-2025-40178",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40178"
},
{
"name": "CVE-2025-39985",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39985"
},
{
"name": "CVE-2025-40141",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40141"
},
{
"name": "CVE-2025-39946",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39946"
},
{
"name": "CVE-2025-39980",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39980"
},
{
"name": "CVE-2025-40036",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40036"
},
{
"name": "CVE-2025-40030",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40030"
},
{
"name": "CVE-2025-39995",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39995"
},
{
"name": "CVE-2025-40096",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40096"
},
{
"name": "CVE-2025-40022",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40022"
},
{
"name": "CVE-2025-40140",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40140"
},
{
"name": "CVE-2025-40051",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40051"
},
{
"name": "CVE-2025-40087",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40087"
}
],
"initial_release_date": "2025-11-28T00:00:00",
"last_revision_date": "2025-11-28T00:00:00",
"links": [],
"reference": "CERTFR-2025-AVI-1048",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2025-11-28T00:00:00.000000"
}
],
"risks": [
{
"description": "Atteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es"
},
{
"description": "D\u00e9ni de service"
},
{
"description": "Contournement de la politique de s\u00e9curit\u00e9"
},
{
"description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
},
{
"description": "\u00c9l\u00e9vation de privil\u00e8ges"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans le noyau Linux de Debian LTS. Certaines d\u0027entre elles permettent \u00e0 un attaquant de provoquer une \u00e9l\u00e9vation de privil\u00e8ges, une atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es et une atteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es.",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans le noyau Linux de Debian LTS",
"vendor_advisories": [
{
"published_at": "2025-11-25",
"title": "Bulletin de s\u00e9curit\u00e9 Debian LTS DLA-4379-1",
"url": "https://lists.debian.org/debian-lts-announce/2025/11/msg00022.html"
}
]
}
CERTFR-2026-AVI-0059
Vulnerability from certfr_avis - Published: 2026-01-16 - Updated: 2026-01-16
De multiples vulnérabilités ont été découvertes dans le noyau Linux de SUSE. Certaines d'entre elles permettent à un attaquant de provoquer une atteinte à la confidentialité des données, un contournement de la politique de sécurité et un déni de service.
Solutions
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
| Vendor | Product | Description | ||
|---|---|---|---|---|
| SUSE | SUSE Linux Enterprise High Performance Computing | SUSE Linux Enterprise High Performance Computing 15 SP5 | ||
| SUSE | N/A | SUSE Linux Micro Extras 6.0 | ||
| SUSE | openSUSE Leap | openSUSE Leap 15.5 | ||
| SUSE | SUSE Linux Enterprise Live Patching | SUSE Linux Enterprise Live Patching 15-SP5 | ||
| SUSE | SUSE Linux Enterprise Server | SUSE Linux Enterprise Server 16.0 | ||
| SUSE | SUSE Linux Enterprise High Performance Computing | SUSE Linux Enterprise High Performance Computing 15 SP4 | ||
| SUSE | openSUSE Leap | openSUSE Leap 15.4 | ||
| SUSE | SUSE Linux Enterprise High Availability Extension | SUSE Linux Enterprise Server High Availability Extension 16.0 | ||
| SUSE | SUSE Linux Enterprise Server | SUSE Linux Enterprise Server 15 SP5 | ||
| SUSE | SUSE Linux Enterprise Server | SUSE Linux Enterprise Server for SAP Applications 15 SP5 | ||
| SUSE | SUSE Linux Enterprise Micro | SUSE Linux Enterprise Micro 5.3 | ||
| SUSE | SUSE Linux Enterprise Real Time | SUSE Linux Enterprise Real Time 15 SP5 | ||
| SUSE | N/A | SUSE Linux Micro Extras 6.2 | ||
| SUSE | SUSE Linux Enterprise Real Time | SUSE Linux Enterprise Real Time 15 SP4 | ||
| SUSE | SUSE Linux Enterprise Server | SUSE Linux Enterprise Server for SAP Applications 15 SP4 | ||
| SUSE | SUSE Linux Enterprise Server | SUSE Linux Enterprise Server for SAP Applications 16.0 | ||
| SUSE | SUSE Linux Micro | SUSE Linux Micro 6.2 | ||
| SUSE | SUSE Linux Enterprise Micro | SUSE Linux Enterprise Micro 5.5 | ||
| SUSE | SUSE Linux Enterprise Server | SUSE Linux Enterprise Server 15 SP4 | ||
| SUSE | SUSE Linux Micro | SUSE Linux Micro 6.1 | ||
| SUSE | SUSE Linux Micro | SUSE Linux Micro 6.0 | ||
| SUSE | SUSE Linux Enterprise Micro | SUSE Linux Enterprise Micro 5.4 | ||
| SUSE | SUSE Linux Enterprise Live Patching | SUSE Linux Enterprise Live Patching 15-SP4 |
| Title | Publication Time | Tags | |||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
|||||||||||||||||||||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "SUSE Linux Enterprise High Performance Computing 15 SP5",
"product": {
"name": "SUSE Linux Enterprise High Performance Computing",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Micro Extras 6.0",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "openSUSE Leap 15.5",
"product": {
"name": "openSUSE Leap",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Live Patching 15-SP5",
"product": {
"name": "SUSE Linux Enterprise Live Patching",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Server 16.0",
"product": {
"name": "SUSE Linux Enterprise Server",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise High Performance Computing 15 SP4",
"product": {
"name": "SUSE Linux Enterprise High Performance Computing",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "openSUSE Leap 15.4",
"product": {
"name": "openSUSE Leap",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Server High Availability Extension 16.0",
"product": {
"name": "SUSE Linux Enterprise High Availability Extension",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Server 15 SP5",
"product": {
"name": "SUSE Linux Enterprise Server",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Server for SAP Applications 15 SP5",
"product": {
"name": "SUSE Linux Enterprise Server",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Micro 5.3",
"product": {
"name": "SUSE Linux Enterprise Micro",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Real Time 15 SP5",
"product": {
"name": "SUSE Linux Enterprise Real Time",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Micro Extras 6.2",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Real Time 15 SP4",
"product": {
"name": "SUSE Linux Enterprise Real Time",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Server for SAP Applications 15 SP4",
"product": {
"name": "SUSE Linux Enterprise Server",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Server for SAP Applications 16.0",
"product": {
"name": "SUSE Linux Enterprise Server",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Micro 6.2",
"product": {
"name": "SUSE Linux Micro",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Micro 5.5",
"product": {
"name": "SUSE Linux Enterprise Micro",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Server 15 SP4",
"product": {
"name": "SUSE Linux Enterprise Server",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Micro 6.1",
"product": {
"name": "SUSE Linux Micro",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Micro 6.0",
"product": {
"name": "SUSE Linux Micro",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Micro 5.4",
"product": {
"name": "SUSE Linux Enterprise Micro",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Live Patching 15-SP4",
"product": {
"name": "SUSE Linux Enterprise Live Patching",
"vendor": {
"name": "SUSE",
"scada": false
}
}
}
],
"affected_systems_content": "",
"content": "## Solutions\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des correctifs (cf. section Documentation).",
"cves": [
{
"name": "CVE-2025-40166",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40166"
},
{
"name": "CVE-2025-40064",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40064"
},
{
"name": "CVE-2025-40156",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40156"
},
{
"name": "CVE-2025-40055",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40055"
},
{
"name": "CVE-2025-40048",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40048"
},
{
"name": "CVE-2025-40081",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40081"
},
{
"name": "CVE-2025-40153",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40153"
},
{
"name": "CVE-2025-40121",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40121"
},
{
"name": "CVE-2025-40204",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40204"
},
{
"name": "CVE-2025-40171",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40171"
},
{
"name": "CVE-2025-40139",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40139"
},
{
"name": "CVE-2025-40187",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40187"
},
{
"name": "CVE-2025-40107",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40107"
},
{
"name": "CVE-2025-40115",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40115"
},
{
"name": "CVE-2025-40198",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40198"
},
{
"name": "CVE-2025-40173",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40173"
},
{
"name": "CVE-2025-39944",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39944"
},
{
"name": "CVE-2025-40202",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40202"
},
{
"name": "CVE-2025-39990",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39990"
},
{
"name": "CVE-2025-40194",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40194"
},
{
"name": "CVE-2025-40001",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40001"
},
{
"name": "CVE-2025-39859",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39859"
},
{
"name": "CVE-2025-40172",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40172"
},
{
"name": "CVE-2025-40188",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40188"
},
{
"name": "CVE-2025-40186",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40186"
},
{
"name": "CVE-2025-40086",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40086"
},
{
"name": "CVE-2025-40169",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40169"
},
{
"name": "CVE-2025-40024",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40024"
},
{
"name": "CVE-2025-40070",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40070"
},
{
"name": "CVE-2025-40047",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40047"
},
{
"name": "CVE-2025-40205",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40205"
},
{
"name": "CVE-2025-40033",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40033"
},
{
"name": "CVE-2022-50253",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50253"
},
{
"name": "CVE-2025-40075",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40075"
},
{
"name": "CVE-2025-40027",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40027"
},
{
"name": "CVE-2025-40206",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40206"
},
{
"name": "CVE-2025-39788",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39788"
},
{
"name": "CVE-2025-40197",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40197"
},
{
"name": "CVE-2025-40109",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40109"
},
{
"name": "CVE-2025-40101",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40101"
},
{
"name": "CVE-2025-40006",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40006"
},
{
"name": "CVE-2025-40038",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40038"
},
{
"name": "CVE-2025-39805",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39805"
},
{
"name": "CVE-2025-40176",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40176"
},
{
"name": "CVE-2025-40201",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40201"
},
{
"name": "CVE-2025-40183",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40183"
},
{
"name": "CVE-2025-40134",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40134"
},
{
"name": "CVE-2023-53574",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53574"
},
{
"name": "CVE-2025-40165",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40165"
},
{
"name": "CVE-2025-38257",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38257"
},
{
"name": "CVE-2025-40161",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40161"
},
{
"name": "CVE-2025-37916",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37916"
},
{
"name": "CVE-2025-38359",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38359"
},
{
"name": "CVE-2025-40177",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40177"
},
{
"name": "CVE-2025-38728",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38728"
},
{
"name": "CVE-2025-40074",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40074"
},
{
"name": "CVE-2025-40116",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40116"
},
{
"name": "CVE-2025-40158",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40158"
},
{
"name": "CVE-2025-40127",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40127"
},
{
"name": "CVE-2025-40168",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40168"
},
{
"name": "CVE-2025-40053",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40053"
},
{
"name": "CVE-2025-38085",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38085"
},
{
"name": "CVE-2025-40120",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40120"
},
{
"name": "CVE-2025-40185",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40185"
},
{
"name": "CVE-2025-40098",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40098"
},
{
"name": "CVE-2025-40196",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40196"
},
{
"name": "CVE-2025-40129",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40129"
},
{
"name": "CVE-2025-40040",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40040"
},
{
"name": "CVE-2025-40207",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40207"
},
{
"name": "CVE-2025-40118",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40118"
},
{
"name": "CVE-2025-40157",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40157"
},
{
"name": "CVE-2025-40021",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40021"
},
{
"name": "CVE-2025-40135",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40135"
},
{
"name": "CVE-2025-40105",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40105"
},
{
"name": "CVE-2025-40083",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40083"
},
{
"name": "CVE-2025-40154",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40154"
},
{
"name": "CVE-2025-40149",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40149"
},
{
"name": "CVE-2025-40164",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40164"
},
{
"name": "CVE-2025-40031",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40031"
},
{
"name": "CVE-2025-40180",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40180"
},
{
"name": "CVE-2025-40203",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40203"
},
{
"name": "CVE-2025-40192",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40192"
},
{
"name": "CVE-2025-40200",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40200"
},
{
"name": "CVE-2025-40102",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40102"
},
{
"name": "CVE-2025-40111",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40111"
},
{
"name": "CVE-2025-39961",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39961"
},
{
"name": "CVE-2025-40133",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40133"
},
{
"name": "CVE-2025-40059",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40059"
},
{
"name": "CVE-2025-39897",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39897"
},
{
"name": "CVE-2025-40003",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40003"
},
{
"name": "CVE-2025-40175",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40175"
},
{
"name": "CVE-2023-53676",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53676"
},
{
"name": "CVE-2025-40178",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40178"
},
{
"name": "CVE-2025-38321",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38321"
},
{
"name": "CVE-2025-39917",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39917"
},
{
"name": "CVE-2025-39831",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39831"
},
{
"name": "CVE-2025-39822",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39822"
},
{
"name": "CVE-2025-40141",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40141"
},
{
"name": "CVE-2025-40132",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40132"
},
{
"name": "CVE-2025-40110",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40110"
},
{
"name": "CVE-2025-40162",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40162"
},
{
"name": "CVE-2025-39980",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39980"
},
{
"name": "CVE-2025-38084",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38084"
},
{
"name": "CVE-2025-40030",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40030"
},
{
"name": "CVE-2025-39819",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39819"
},
{
"name": "CVE-2025-40140",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40140"
},
{
"name": "CVE-2025-21710",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21710"
},
{
"name": "CVE-2025-40142",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40142"
},
{
"name": "CVE-2025-40159",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40159"
},
{
"name": "CVE-2025-38361",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38361"
}
],
"initial_release_date": "2026-01-16T00:00:00",
"last_revision_date": "2026-01-16T00:00:00",
"links": [],
"reference": "CERTFR-2026-AVI-0059",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2026-01-16T00:00:00.000000"
}
],
"risks": [
{
"description": "Non sp\u00e9cifi\u00e9 par l\u0027\u00e9diteur"
},
{
"description": "D\u00e9ni de service"
},
{
"description": "Contournement de la politique de s\u00e9curit\u00e9"
},
{
"description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans le noyau Linux de SUSE. Certaines d\u0027entre elles permettent \u00e0 un attaquant de provoquer une atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es, un contournement de la politique de s\u00e9curit\u00e9 et un d\u00e9ni de service.",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans le noyau Linux de SUSE",
"vendor_advisories": [
{
"published_at": "2025-12-19",
"title": "Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-2026:20015-1",
"url": "https://www.suse.com/support/update/announcement/2026/suse-su-202620015-1"
},
{
"published_at": "2026-01-12",
"title": "Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-2026:0090-1",
"url": "https://www.suse.com/support/update/announcement/2026/suse-su-20260090-1"
},
{
"published_at": "2026-01-07",
"title": "Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-2026:20039-1",
"url": "https://www.suse.com/support/update/announcement/2026/suse-su-202620039-1"
},
{
"published_at": "2026-01-07",
"title": "Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-2026:20059-1",
"url": "https://www.suse.com/support/update/announcement/2026/suse-su-202620059-1"
},
{
"published_at": "2025-12-19",
"title": "Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-2026:20012-1",
"url": "https://www.suse.com/support/update/announcement/2026/suse-su-202620012-1"
},
{
"published_at": "2025-12-19",
"title": "Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-2026:20021-1",
"url": "https://www.suse.com/support/update/announcement/2026/suse-su-202620021-1"
},
{
"published_at": "2026-01-12",
"title": "Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-2026:0107-1",
"url": "https://www.suse.com/support/update/announcement/2026/suse-su-20260107-1"
}
]
}
CERTFR-2026-AVI-0059
Vulnerability from certfr_avis - Published: 2026-01-16 - Updated: 2026-01-16
De multiples vulnérabilités ont été découvertes dans le noyau Linux de SUSE. Certaines d'entre elles permettent à un attaquant de provoquer une atteinte à la confidentialité des données, un contournement de la politique de sécurité et un déni de service.
Solutions
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
| Vendor | Product | Description | ||
|---|---|---|---|---|
| SUSE | SUSE Linux Enterprise High Performance Computing | SUSE Linux Enterprise High Performance Computing 15 SP5 | ||
| SUSE | N/A | SUSE Linux Micro Extras 6.0 | ||
| SUSE | openSUSE Leap | openSUSE Leap 15.5 | ||
| SUSE | SUSE Linux Enterprise Live Patching | SUSE Linux Enterprise Live Patching 15-SP5 | ||
| SUSE | SUSE Linux Enterprise Server | SUSE Linux Enterprise Server 16.0 | ||
| SUSE | SUSE Linux Enterprise High Performance Computing | SUSE Linux Enterprise High Performance Computing 15 SP4 | ||
| SUSE | openSUSE Leap | openSUSE Leap 15.4 | ||
| SUSE | SUSE Linux Enterprise High Availability Extension | SUSE Linux Enterprise Server High Availability Extension 16.0 | ||
| SUSE | SUSE Linux Enterprise Server | SUSE Linux Enterprise Server 15 SP5 | ||
| SUSE | SUSE Linux Enterprise Server | SUSE Linux Enterprise Server for SAP Applications 15 SP5 | ||
| SUSE | SUSE Linux Enterprise Micro | SUSE Linux Enterprise Micro 5.3 | ||
| SUSE | SUSE Linux Enterprise Real Time | SUSE Linux Enterprise Real Time 15 SP5 | ||
| SUSE | N/A | SUSE Linux Micro Extras 6.2 | ||
| SUSE | SUSE Linux Enterprise Real Time | SUSE Linux Enterprise Real Time 15 SP4 | ||
| SUSE | SUSE Linux Enterprise Server | SUSE Linux Enterprise Server for SAP Applications 15 SP4 | ||
| SUSE | SUSE Linux Enterprise Server | SUSE Linux Enterprise Server for SAP Applications 16.0 | ||
| SUSE | SUSE Linux Micro | SUSE Linux Micro 6.2 | ||
| SUSE | SUSE Linux Enterprise Micro | SUSE Linux Enterprise Micro 5.5 | ||
| SUSE | SUSE Linux Enterprise Server | SUSE Linux Enterprise Server 15 SP4 | ||
| SUSE | SUSE Linux Micro | SUSE Linux Micro 6.1 | ||
| SUSE | SUSE Linux Micro | SUSE Linux Micro 6.0 | ||
| SUSE | SUSE Linux Enterprise Micro | SUSE Linux Enterprise Micro 5.4 | ||
| SUSE | SUSE Linux Enterprise Live Patching | SUSE Linux Enterprise Live Patching 15-SP4 |
| Title | Publication Time | Tags | |||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
|||||||||||||||||||||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "SUSE Linux Enterprise High Performance Computing 15 SP5",
"product": {
"name": "SUSE Linux Enterprise High Performance Computing",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Micro Extras 6.0",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "openSUSE Leap 15.5",
"product": {
"name": "openSUSE Leap",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Live Patching 15-SP5",
"product": {
"name": "SUSE Linux Enterprise Live Patching",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Server 16.0",
"product": {
"name": "SUSE Linux Enterprise Server",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise High Performance Computing 15 SP4",
"product": {
"name": "SUSE Linux Enterprise High Performance Computing",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "openSUSE Leap 15.4",
"product": {
"name": "openSUSE Leap",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Server High Availability Extension 16.0",
"product": {
"name": "SUSE Linux Enterprise High Availability Extension",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Server 15 SP5",
"product": {
"name": "SUSE Linux Enterprise Server",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Server for SAP Applications 15 SP5",
"product": {
"name": "SUSE Linux Enterprise Server",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Micro 5.3",
"product": {
"name": "SUSE Linux Enterprise Micro",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Real Time 15 SP5",
"product": {
"name": "SUSE Linux Enterprise Real Time",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Micro Extras 6.2",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Real Time 15 SP4",
"product": {
"name": "SUSE Linux Enterprise Real Time",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Server for SAP Applications 15 SP4",
"product": {
"name": "SUSE Linux Enterprise Server",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Server for SAP Applications 16.0",
"product": {
"name": "SUSE Linux Enterprise Server",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Micro 6.2",
"product": {
"name": "SUSE Linux Micro",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Micro 5.5",
"product": {
"name": "SUSE Linux Enterprise Micro",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Server 15 SP4",
"product": {
"name": "SUSE Linux Enterprise Server",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Micro 6.1",
"product": {
"name": "SUSE Linux Micro",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Micro 6.0",
"product": {
"name": "SUSE Linux Micro",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Micro 5.4",
"product": {
"name": "SUSE Linux Enterprise Micro",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Live Patching 15-SP4",
"product": {
"name": "SUSE Linux Enterprise Live Patching",
"vendor": {
"name": "SUSE",
"scada": false
}
}
}
],
"affected_systems_content": "",
"content": "## Solutions\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des correctifs (cf. section Documentation).",
"cves": [
{
"name": "CVE-2025-40166",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40166"
},
{
"name": "CVE-2025-40064",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40064"
},
{
"name": "CVE-2025-40156",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40156"
},
{
"name": "CVE-2025-40055",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40055"
},
{
"name": "CVE-2025-40048",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40048"
},
{
"name": "CVE-2025-40081",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40081"
},
{
"name": "CVE-2025-40153",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40153"
},
{
"name": "CVE-2025-40121",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40121"
},
{
"name": "CVE-2025-40204",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40204"
},
{
"name": "CVE-2025-40171",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40171"
},
{
"name": "CVE-2025-40139",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40139"
},
{
"name": "CVE-2025-40187",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40187"
},
{
"name": "CVE-2025-40107",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40107"
},
{
"name": "CVE-2025-40115",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40115"
},
{
"name": "CVE-2025-40198",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40198"
},
{
"name": "CVE-2025-40173",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40173"
},
{
"name": "CVE-2025-39944",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39944"
},
{
"name": "CVE-2025-40202",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40202"
},
{
"name": "CVE-2025-39990",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39990"
},
{
"name": "CVE-2025-40194",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40194"
},
{
"name": "CVE-2025-40001",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40001"
},
{
"name": "CVE-2025-39859",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39859"
},
{
"name": "CVE-2025-40172",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40172"
},
{
"name": "CVE-2025-40188",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40188"
},
{
"name": "CVE-2025-40186",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40186"
},
{
"name": "CVE-2025-40086",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40086"
},
{
"name": "CVE-2025-40169",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40169"
},
{
"name": "CVE-2025-40024",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40024"
},
{
"name": "CVE-2025-40070",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40070"
},
{
"name": "CVE-2025-40047",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40047"
},
{
"name": "CVE-2025-40205",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40205"
},
{
"name": "CVE-2025-40033",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40033"
},
{
"name": "CVE-2022-50253",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50253"
},
{
"name": "CVE-2025-40075",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40075"
},
{
"name": "CVE-2025-40027",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40027"
},
{
"name": "CVE-2025-40206",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40206"
},
{
"name": "CVE-2025-39788",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39788"
},
{
"name": "CVE-2025-40197",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40197"
},
{
"name": "CVE-2025-40109",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40109"
},
{
"name": "CVE-2025-40101",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40101"
},
{
"name": "CVE-2025-40006",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40006"
},
{
"name": "CVE-2025-40038",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40038"
},
{
"name": "CVE-2025-39805",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39805"
},
{
"name": "CVE-2025-40176",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40176"
},
{
"name": "CVE-2025-40201",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40201"
},
{
"name": "CVE-2025-40183",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40183"
},
{
"name": "CVE-2025-40134",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40134"
},
{
"name": "CVE-2023-53574",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53574"
},
{
"name": "CVE-2025-40165",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40165"
},
{
"name": "CVE-2025-38257",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38257"
},
{
"name": "CVE-2025-40161",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40161"
},
{
"name": "CVE-2025-37916",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37916"
},
{
"name": "CVE-2025-38359",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38359"
},
{
"name": "CVE-2025-40177",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40177"
},
{
"name": "CVE-2025-38728",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38728"
},
{
"name": "CVE-2025-40074",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40074"
},
{
"name": "CVE-2025-40116",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40116"
},
{
"name": "CVE-2025-40158",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40158"
},
{
"name": "CVE-2025-40127",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40127"
},
{
"name": "CVE-2025-40168",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40168"
},
{
"name": "CVE-2025-40053",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40053"
},
{
"name": "CVE-2025-38085",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38085"
},
{
"name": "CVE-2025-40120",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40120"
},
{
"name": "CVE-2025-40185",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40185"
},
{
"name": "CVE-2025-40098",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40098"
},
{
"name": "CVE-2025-40196",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40196"
},
{
"name": "CVE-2025-40129",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40129"
},
{
"name": "CVE-2025-40040",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40040"
},
{
"name": "CVE-2025-40207",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40207"
},
{
"name": "CVE-2025-40118",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40118"
},
{
"name": "CVE-2025-40157",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40157"
},
{
"name": "CVE-2025-40021",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40021"
},
{
"name": "CVE-2025-40135",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40135"
},
{
"name": "CVE-2025-40105",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40105"
},
{
"name": "CVE-2025-40083",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40083"
},
{
"name": "CVE-2025-40154",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40154"
},
{
"name": "CVE-2025-40149",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40149"
},
{
"name": "CVE-2025-40164",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40164"
},
{
"name": "CVE-2025-40031",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40031"
},
{
"name": "CVE-2025-40180",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40180"
},
{
"name": "CVE-2025-40203",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40203"
},
{
"name": "CVE-2025-40192",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40192"
},
{
"name": "CVE-2025-40200",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40200"
},
{
"name": "CVE-2025-40102",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40102"
},
{
"name": "CVE-2025-40111",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40111"
},
{
"name": "CVE-2025-39961",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39961"
},
{
"name": "CVE-2025-40133",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40133"
},
{
"name": "CVE-2025-40059",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40059"
},
{
"name": "CVE-2025-39897",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39897"
},
{
"name": "CVE-2025-40003",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40003"
},
{
"name": "CVE-2025-40175",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40175"
},
{
"name": "CVE-2023-53676",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53676"
},
{
"name": "CVE-2025-40178",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40178"
},
{
"name": "CVE-2025-38321",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38321"
},
{
"name": "CVE-2025-39917",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39917"
},
{
"name": "CVE-2025-39831",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39831"
},
{
"name": "CVE-2025-39822",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39822"
},
{
"name": "CVE-2025-40141",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40141"
},
{
"name": "CVE-2025-40132",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40132"
},
{
"name": "CVE-2025-40110",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40110"
},
{
"name": "CVE-2025-40162",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40162"
},
{
"name": "CVE-2025-39980",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39980"
},
{
"name": "CVE-2025-38084",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38084"
},
{
"name": "CVE-2025-40030",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40030"
},
{
"name": "CVE-2025-39819",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39819"
},
{
"name": "CVE-2025-40140",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40140"
},
{
"name": "CVE-2025-21710",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21710"
},
{
"name": "CVE-2025-40142",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40142"
},
{
"name": "CVE-2025-40159",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40159"
},
{
"name": "CVE-2025-38361",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38361"
}
],
"initial_release_date": "2026-01-16T00:00:00",
"last_revision_date": "2026-01-16T00:00:00",
"links": [],
"reference": "CERTFR-2026-AVI-0059",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2026-01-16T00:00:00.000000"
}
],
"risks": [
{
"description": "Non sp\u00e9cifi\u00e9 par l\u0027\u00e9diteur"
},
{
"description": "D\u00e9ni de service"
},
{
"description": "Contournement de la politique de s\u00e9curit\u00e9"
},
{
"description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans le noyau Linux de SUSE. Certaines d\u0027entre elles permettent \u00e0 un attaquant de provoquer une atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es, un contournement de la politique de s\u00e9curit\u00e9 et un d\u00e9ni de service.",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans le noyau Linux de SUSE",
"vendor_advisories": [
{
"published_at": "2025-12-19",
"title": "Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-2026:20015-1",
"url": "https://www.suse.com/support/update/announcement/2026/suse-su-202620015-1"
},
{
"published_at": "2026-01-12",
"title": "Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-2026:0090-1",
"url": "https://www.suse.com/support/update/announcement/2026/suse-su-20260090-1"
},
{
"published_at": "2026-01-07",
"title": "Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-2026:20039-1",
"url": "https://www.suse.com/support/update/announcement/2026/suse-su-202620039-1"
},
{
"published_at": "2026-01-07",
"title": "Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-2026:20059-1",
"url": "https://www.suse.com/support/update/announcement/2026/suse-su-202620059-1"
},
{
"published_at": "2025-12-19",
"title": "Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-2026:20012-1",
"url": "https://www.suse.com/support/update/announcement/2026/suse-su-202620012-1"
},
{
"published_at": "2025-12-19",
"title": "Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-2026:20021-1",
"url": "https://www.suse.com/support/update/announcement/2026/suse-su-202620021-1"
},
{
"published_at": "2026-01-12",
"title": "Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-2026:0107-1",
"url": "https://www.suse.com/support/update/announcement/2026/suse-su-20260107-1"
}
]
}
CERTFR-2026-AVI-0371
Vulnerability from certfr_avis - Published: 2026-03-27 - Updated: 2026-03-27
De multiples vulnérabilités ont été découvertes dans le noyau Linux d'Ubuntu. Certaines d'entre elles permettent à un attaquant de provoquer une exécution de code arbitraire, une élévation de privilèges et une atteinte à la confidentialité des données.
Solutions
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
| Title | Publication Time | Tags | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "Ubuntu 16.04 ESM",
"product": {
"name": "Ubuntu",
"vendor": {
"name": "Ubuntu",
"scada": false
}
}
},
{
"description": "Ubuntu 20.04 ESM",
"product": {
"name": "Ubuntu",
"vendor": {
"name": "Ubuntu",
"scada": false
}
}
},
{
"description": "Ubuntu 24.04 LTS",
"product": {
"name": "Ubuntu",
"vendor": {
"name": "Ubuntu",
"scada": false
}
}
},
{
"description": "Ubuntu 18.04 ESM",
"product": {
"name": "Ubuntu",
"vendor": {
"name": "Ubuntu",
"scada": false
}
}
},
{
"description": "Ubuntu 25.10",
"product": {
"name": "Ubuntu",
"vendor": {
"name": "Ubuntu",
"scada": false
}
}
},
{
"description": "Ubuntu 14.04 ESM",
"product": {
"name": "Ubuntu",
"vendor": {
"name": "Ubuntu",
"scada": false
}
}
},
{
"description": "Ubuntu 22.04 LTS",
"product": {
"name": "Ubuntu",
"vendor": {
"name": "Ubuntu",
"scada": false
}
}
}
],
"affected_systems_content": "",
"content": "## Solutions\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des correctifs (cf. section Documentation).",
"cves": [
{
"name": "CVE-2024-36903",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36903"
},
{
"name": "CVE-2025-68234",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68234"
},
{
"name": "CVE-2025-40166",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40166"
},
{
"name": "CVE-2025-71075",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71075"
},
{
"name": "CVE-2025-40273",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40273"
},
{
"name": "CVE-2025-68230",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68230"
},
{
"name": "CVE-2025-39992",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39992"
},
{
"name": "CVE-2025-68324",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68324"
},
{
"name": "CVE-2025-39987",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39987"
},
{
"name": "CVE-2025-71086",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71086"
},
{
"name": "CVE-2025-39812",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39812"
},
{
"name": "CVE-2025-40156",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40156"
},
{
"name": "CVE-2025-68342",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68342"
},
{
"name": "CVE-2025-68374",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68374"
},
{
"name": "CVE-2025-40137",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40137"
},
{
"name": "CVE-2025-22107",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22107"
},
{
"name": "CVE-2025-68373",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68373"
},
{
"name": "CVE-2025-39808",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39808"
},
{
"name": "CVE-2025-68286",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68286"
},
{
"name": "CVE-2025-68749",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68749"
},
{
"name": "CVE-2025-40057",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40057"
},
{
"name": "CVE-2025-71094",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71094"
},
{
"name": "CVE-2025-68788",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68788"
},
{
"name": "CVE-2025-40055",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40055"
},
{
"name": "CVE-2025-39876",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39876"
},
{
"name": "CVE-2025-40314",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40314"
},
{
"name": "CVE-2025-40029",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40029"
},
{
"name": "CVE-2025-40037",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40037"
},
{
"name": "CVE-2025-40306",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40306"
},
{
"name": "CVE-2025-40008",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40008"
},
{
"name": "CVE-2025-39947",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39947"
},
{
"name": "CVE-2025-40048",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40048"
},
{
"name": "CVE-2025-68292",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68292"
},
{
"name": "CVE-2025-40254",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40254"
},
{
"name": "CVE-2025-71064",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71064"
},
{
"name": "CVE-2025-40219",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40219"
},
{
"name": "CVE-2025-68200",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68200"
},
{
"name": "CVE-2025-39902",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39902"
},
{
"name": "CVE-2025-40043",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40043"
},
{
"name": "CVE-2025-68176",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68176"
},
{
"name": "CVE-2025-68741",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68741"
},
{
"name": "CVE-2025-68204",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68204"
},
{
"name": "CVE-2025-68795",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68795"
},
{
"name": "CVE-2025-68349",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68349"
},
{
"name": "CVE-2025-39948",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39948"
},
{
"name": "CVE-2025-39826",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39826"
},
{
"name": "CVE-2025-68380",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68380"
},
{
"name": "CVE-2025-68359",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68359"
},
{
"name": "CVE-2025-39973",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39973"
},
{
"name": "CVE-2025-39881",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39881"
},
{
"name": "CVE-2025-68283",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68283"
},
{
"name": "CVE-2021-47599",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47599"
},
{
"name": "CVE-2025-68246",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68246"
},
{
"name": "CVE-2025-68339",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68339"
},
{
"name": "CVE-2025-40287",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40287"
},
{
"name": "CVE-2025-39943",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39943"
},
{
"name": "CVE-2025-39945",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39945"
},
{
"name": "CVE-2026-22992",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-22992"
},
{
"name": "CVE-2022-49465",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49465"
},
{
"name": "CVE-2025-39883",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39883"
},
{
"name": "CVE-2025-68295",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68295"
},
{
"name": "CVE-2025-23129",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-23129"
},
{
"name": "CVE-2025-68728",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68728"
},
{
"name": "CVE-2025-68364",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68364"
},
{
"name": "CVE-2025-40100",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40100"
},
{
"name": "CVE-2025-71087",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71087"
},
{
"name": "CVE-2025-40285",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40285"
},
{
"name": "CVE-2025-39827",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39827"
},
{
"name": "CVE-2025-22106",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22106"
},
{
"name": "CVE-2025-68287",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68287"
},
{
"name": "CVE-2025-40240",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40240"
},
{
"name": "CVE-2025-39828",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39828"
},
{
"name": "CVE-2025-40081",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40081"
},
{
"name": "CVE-2025-68746",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68746"
},
{
"name": "CVE-2025-71133",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71133"
},
{
"name": "CVE-2025-40026",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40026"
},
{
"name": "CVE-2025-40153",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40153"
},
{
"name": "CVE-2025-40103",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40103"
},
{
"name": "CVE-2026-23020",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23020"
},
{
"name": "CVE-2025-40294",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40294"
},
{
"name": "CVE-2024-56548",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56548"
},
{
"name": "CVE-2025-68796",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68796"
},
{
"name": "CVE-2025-40016",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40016"
},
{
"name": "CVE-2025-40121",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40121"
},
{
"name": "CVE-2025-40265",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40265"
},
{
"name": "CVE-2025-40312",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40312"
},
{
"name": "CVE-2025-40204",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40204"
},
{
"name": "CVE-2025-68220",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68220"
},
{
"name": "CVE-2025-22125",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22125"
},
{
"name": "CVE-2025-40171",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40171"
},
{
"name": "CVE-2025-68302",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68302"
},
{
"name": "CVE-2025-68238",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68238"
},
{
"name": "CVE-2025-68297",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68297"
},
{
"name": "CVE-2025-68299",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68299"
},
{
"name": "CVE-2025-40221",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40221"
},
{
"name": "CVE-2025-68804",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68804"
},
{
"name": "CVE-2025-68769",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68769"
},
{
"name": "CVE-2025-39811",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39811"
},
{
"name": "CVE-2025-40056",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40056"
},
{
"name": "CVE-2025-39911",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39911"
},
{
"name": "CVE-2025-40125",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40125"
},
{
"name": "CVE-2025-40350",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40350"
},
{
"name": "CVE-2025-40309",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40309"
},
{
"name": "CVE-2025-40349",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40349"
},
{
"name": "CVE-2025-40052",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40052"
},
{
"name": "CVE-2025-68334",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68334"
},
{
"name": "CVE-2025-40343",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40343"
},
{
"name": "CVE-2025-68173",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68173"
},
{
"name": "CVE-2025-22103",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22103"
},
{
"name": "CVE-2025-68307",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68307"
},
{
"name": "CVE-2025-40308",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40308"
},
{
"name": "CVE-2025-40187",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40187"
},
{
"name": "CVE-2025-40315",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40315"
},
{
"name": "CVE-2025-37860",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37860"
},
{
"name": "CVE-2025-39913",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39913"
},
{
"name": "CVE-2025-68231",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68231"
},
{
"name": "CVE-2025-39950",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39950"
},
{
"name": "CVE-2025-40092",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40092"
},
{
"name": "CVE-2025-71098",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71098"
},
{
"name": "CVE-2025-40251",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40251"
},
{
"name": "CVE-2025-71078",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71078"
},
{
"name": "CVE-2025-39967",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39967"
},
{
"name": "CVE-2025-68184",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68184"
},
{
"name": "CVE-2025-40107",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40107"
},
{
"name": "CVE-2025-71083",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71083"
},
{
"name": "CVE-2025-40115",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40115"
},
{
"name": "CVE-2025-68813",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68813"
},
{
"name": "CVE-2026-23047",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23047"
},
{
"name": "CVE-2025-22121",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22121"
},
{
"name": "CVE-2025-68265",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68265"
},
{
"name": "CVE-2025-71085",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71085"
},
{
"name": "CVE-2026-29111",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-29111"
},
{
"name": "CVE-2025-39920",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39920"
},
{
"name": "CVE-2025-40058",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40058"
},
{
"name": "CVE-2025-68344",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68344"
},
{
"name": "CVE-2025-40347",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40347"
},
{
"name": "CVE-2025-71154",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71154"
},
{
"name": "CVE-2025-40198",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40198"
},
{
"name": "CVE-2025-39942",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39942"
},
{
"name": "CVE-2025-68310",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68310"
},
{
"name": "CVE-2025-68179",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68179"
},
{
"name": "CVE-2025-68229",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68229"
},
{
"name": "CVE-2025-68257",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68257"
},
{
"name": "CVE-2025-39929",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39929"
},
{
"name": "CVE-2025-39949",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39949"
},
{
"name": "CVE-2025-71084",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71084"
},
{
"name": "CVE-2025-40173",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40173"
},
{
"name": "CVE-2025-68321",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68321"
},
{
"name": "CVE-2025-68347",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68347"
},
{
"name": "CVE-2025-40010",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40010"
},
{
"name": "CVE-2025-39944",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39944"
},
{
"name": "CVE-2025-39923",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39923"
},
{
"name": "CVE-2025-68235",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68235"
},
{
"name": "CVE-2025-39866",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39866"
},
{
"name": "CVE-2025-39843",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39843"
},
{
"name": "CVE-2025-40202",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40202"
},
{
"name": "CVE-2025-40311",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40311"
},
{
"name": "CVE-2025-68814",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68814"
},
{
"name": "CVE-2025-40237",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40237"
},
{
"name": "CVE-2025-68780",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68780"
},
{
"name": "CVE-2025-39953",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39953"
},
{
"name": "CVE-2025-71081",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71081"
},
{
"name": "CVE-2025-68738",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68738"
},
{
"name": "CVE-2025-40167",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40167"
},
{
"name": "CVE-2025-38105",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38105"
},
{
"name": "CVE-2025-39969",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39969"
},
{
"name": "CVE-2025-71121",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71121"
},
{
"name": "CVE-2025-40194",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40194"
},
{
"name": "CVE-2025-40333",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40333"
},
{
"name": "CVE-2025-38022",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38022"
},
{
"name": "CVE-2025-40245",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40245"
},
{
"name": "CVE-2025-39899",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39899"
},
{
"name": "CVE-2025-68754",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68754"
},
{
"name": "CVE-2025-40360",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40360"
},
{
"name": "CVE-2025-71136",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71136"
},
{
"name": "CVE-2025-22105",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22105"
},
{
"name": "CVE-2025-68354",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68354"
},
{
"name": "CVE-2025-68801",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68801"
},
{
"name": "CVE-2025-21833",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21833"
},
{
"name": "CVE-2025-40104",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40104"
},
{
"name": "CVE-2025-68258",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68258"
},
{
"name": "CVE-2025-39853",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39853"
},
{
"name": "CVE-2025-40001",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40001"
},
{
"name": "CVE-2025-39871",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39871"
},
{
"name": "CVE-2025-39857",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39857"
},
{
"name": "CVE-2025-38709",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38709"
},
{
"name": "CVE-2025-40035",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40035"
},
{
"name": "CVE-2025-40322",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40322"
},
{
"name": "CVE-2025-39988",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39988"
},
{
"name": "CVE-2025-40313",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40313"
},
{
"name": "CVE-2025-39865",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39865"
},
{
"name": "CVE-2025-40233",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40233"
},
{
"name": "CVE-2025-40172",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40172"
},
{
"name": "CVE-2025-40020",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40020"
},
{
"name": "CVE-2025-40188",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40188"
},
{
"name": "CVE-2025-40271",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40271"
},
{
"name": "CVE-2025-68306",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68306"
},
{
"name": "CVE-2025-39877",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39877"
},
{
"name": "CVE-2026-22991",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-22991"
},
{
"name": "CVE-2025-38502",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38502"
},
{
"name": "CVE-2025-68300",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68300"
},
{
"name": "CVE-2025-39886",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39886"
},
{
"name": "CVE-2025-68763",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68763"
},
{
"name": "CVE-2025-68294",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68294"
},
{
"name": "CVE-2025-40290",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40290"
},
{
"name": "CVE-2025-68308",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68308"
},
{
"name": "CVE-2025-40249",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40249"
},
{
"name": "CVE-2025-40242",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40242"
},
{
"name": "CVE-2025-39838",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39838"
},
{
"name": "CVE-2025-39823",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39823"
},
{
"name": "CVE-2025-68198",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68198"
},
{
"name": "CVE-2025-39864",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39864"
},
{
"name": "CVE-2025-40013",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40013"
},
{
"name": "CVE-2025-68190",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68190"
},
{
"name": "CVE-2025-40169",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40169"
},
{
"name": "CVE-2025-39824",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39824"
},
{
"name": "CVE-2025-40252",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40252"
},
{
"name": "CVE-2025-68218",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68218"
},
{
"name": "CVE-2025-40049",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40049"
},
{
"name": "CVE-2025-68255",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68255"
},
{
"name": "CVE-2025-68322",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68322"
},
{
"name": "CVE-2025-21704",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21704"
},
{
"name": "CVE-2026-22980",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-22980"
},
{
"name": "CVE-2025-39927",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39927"
},
{
"name": "CVE-2025-40024",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40024"
},
{
"name": "CVE-2025-40238",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40238"
},
{
"name": "CVE-2025-40277",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40277"
},
{
"name": "CVE-2025-40070",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40070"
},
{
"name": "CVE-2025-40106",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40106"
},
{
"name": "CVE-2025-40272",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40272"
},
{
"name": "CVE-2025-39842",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39842"
},
{
"name": "CVE-2025-40047",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40047"
},
{
"name": "CVE-2025-71093",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71093"
},
{
"name": "CVE-2025-71102",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71102"
},
{
"name": "CVE-2025-68759",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68759"
},
{
"name": "CVE-2026-23019",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23019"
},
{
"name": "CVE-2025-39815",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39815"
},
{
"name": "CVE-2025-40345",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40345"
},
{
"name": "CVE-2025-40205",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40205"
},
{
"name": "CVE-2025-39849",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39849"
},
{
"name": "CVE-2025-40033",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40033"
},
{
"name": "CVE-2025-68733",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68733"
},
{
"name": "CVE-2025-39894",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39894"
},
{
"name": "CVE-2025-39861",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39861"
},
{
"name": "CVE-2025-68215",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68215"
},
{
"name": "CVE-2025-40269",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40269"
},
{
"name": "CVE-2025-68228",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68228"
},
{
"name": "CVE-2025-68335",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68335"
},
{
"name": "CVE-2025-71079",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71079"
},
{
"name": "CVE-2025-62626",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-62626"
},
{
"name": "CVE-2025-39940",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39940"
},
{
"name": "CVE-2025-68338",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68338"
},
{
"name": "CVE-2025-68304",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68304"
},
{
"name": "CVE-2025-68370",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68370"
},
{
"name": "CVE-2025-39977",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39977"
},
{
"name": "CVE-2025-68330",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68330"
},
{
"name": "CVE-2025-40027",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40027"
},
{
"name": "CVE-2025-39885",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39885"
},
{
"name": "CVE-2025-68180",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68180"
},
{
"name": "CVE-2025-68343",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68343"
},
{
"name": "CVE-2025-68726",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68726"
},
{
"name": "CVE-2025-21780",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21780"
},
{
"name": "CVE-2025-37899",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37899"
},
{
"name": "CVE-2025-68201",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68201"
},
{
"name": "CVE-2025-40289",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40289"
},
{
"name": "CVE-2025-68785",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68785"
},
{
"name": "CVE-2024-37354",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-37354"
},
{
"name": "CVE-2025-68808",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68808"
},
{
"name": "CVE-2025-68748",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68748"
},
{
"name": "CVE-2025-68223",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68223"
},
{
"name": "CVE-2025-68783",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68783"
},
{
"name": "CVE-2025-39970",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39970"
},
{
"name": "CVE-2025-40292",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40292"
},
{
"name": "CVE-2025-71147",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71147"
},
{
"name": "CVE-2025-40032",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40032"
},
{
"name": "CVE-2025-39981",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39981"
},
{
"name": "CVE-2025-68724",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68724"
},
{
"name": "CVE-2025-39994",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39994"
},
{
"name": "CVE-2022-48875",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48875"
},
{
"name": "CVE-2025-68797",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68797"
},
{
"name": "CVE-2025-38627",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38627"
},
{
"name": "CVE-2024-49968",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49968"
},
{
"name": "CVE-2025-68358",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68358"
},
{
"name": "CVE-2025-40206",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40206"
},
{
"name": "CVE-2025-40218",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40218"
},
{
"name": "CVE-2025-40088",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40088"
},
{
"name": "CVE-2025-40220",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40220"
},
{
"name": "CVE-2025-39845",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39845"
},
{
"name": "CVE-2025-68237",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68237"
},
{
"name": "CVE-2025-40257",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40257"
},
{
"name": "CVE-2025-68259",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68259"
},
{
"name": "CVE-2025-71125",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71125"
},
{
"name": "CVE-2024-56581",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56581"
},
{
"name": "CVE-2025-71108",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71108"
},
{
"name": "CVE-2025-71069",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71069"
},
{
"name": "CVE-2025-68312",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68312"
},
{
"name": "CVE-2025-68284",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68284"
},
{
"name": "CVE-2025-40062",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40062"
},
{
"name": "CVE-2025-68194",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68194"
},
{
"name": "CVE-2025-68356",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68356"
},
{
"name": "CVE-2025-40067",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40067"
},
{
"name": "CVE-2025-40109",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40109"
},
{
"name": "CVE-2025-40101",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40101"
},
{
"name": "CVE-2025-40006",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40006"
},
{
"name": "CVE-2025-40038",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40038"
},
{
"name": "CVE-2025-68183",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68183"
},
{
"name": "CVE-2025-39805",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39805"
},
{
"name": "CVE-2025-68774",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68774"
},
{
"name": "CVE-2025-40263",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40263"
},
{
"name": "CVE-2025-40353",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40353"
},
{
"name": "CVE-2025-40011",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40011"
},
{
"name": "CVE-2025-40085",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40085"
},
{
"name": "CVE-2025-71180",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71180"
},
{
"name": "CVE-2025-68244",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68244"
},
{
"name": "CVE-2025-40231",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40231"
},
{
"name": "CVE-2024-46830",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46830"
},
{
"name": "CVE-2024-47666",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47666"
},
{
"name": "CVE-2025-40278",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40278"
},
{
"name": "CVE-2025-22113",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22113"
},
{
"name": "CVE-2025-40176",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40176"
},
{
"name": "CVE-2025-40342",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40342"
},
{
"name": "CVE-2025-71128",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71128"
},
{
"name": "CVE-2025-71082",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71082"
},
{
"name": "CVE-2025-68222",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68222"
},
{
"name": "CVE-2025-68743",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68743"
},
{
"name": "CVE-2025-68765",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68765"
},
{
"name": "CVE-2025-23143",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-23143"
},
{
"name": "CVE-2025-71132",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71132"
},
{
"name": "CVE-2025-40193",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40193"
},
{
"name": "CVE-2025-71077",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71077"
},
{
"name": "CVE-2024-36927",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36927"
},
{
"name": "CVE-2025-40279",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40279"
},
{
"name": "CVE-2025-68328",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68328"
},
{
"name": "CVE-2025-40201",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40201"
},
{
"name": "CVE-2025-40084",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40084"
},
{
"name": "CVE-2025-22111",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22111"
},
{
"name": "CVE-2025-68232",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68232"
},
{
"name": "CVE-2025-68311",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68311"
},
{
"name": "CVE-2025-71114",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71114"
},
{
"name": "CVE-2025-68348",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68348"
},
{
"name": "CVE-2025-68744",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68744"
},
{
"name": "CVE-2025-71182",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71182"
},
{
"name": "CVE-2025-68320",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68320"
},
{
"name": "CVE-2025-40341",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40341"
},
{
"name": "CVE-2025-40183",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40183"
},
{
"name": "CVE-2026-22990",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-22990"
},
{
"name": "CVE-2025-68376",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68376"
},
{
"name": "CVE-2025-68172",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68172"
},
{
"name": "CVE-2025-39998",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39998"
},
{
"name": "CVE-2025-68821",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68821"
},
{
"name": "CVE-2025-40134",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40134"
},
{
"name": "CVE-2025-68325",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68325"
},
{
"name": "CVE-2025-39968",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39968"
},
{
"name": "CVE-2025-40358",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40358"
},
{
"name": "CVE-2025-40165",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40165"
},
{
"name": "CVE-2025-68341",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68341"
},
{
"name": "CVE-2025-68296",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68296"
},
{
"name": "CVE-2025-68361",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68361"
},
{
"name": "CVE-2025-40328",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40328"
},
{
"name": "CVE-2025-68332",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68332"
},
{
"name": "CVE-2025-39986",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39986"
},
{
"name": "CVE-2025-71104",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71104"
},
{
"name": "CVE-2026-22978",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-22978"
},
{
"name": "CVE-2025-39901",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39901"
},
{
"name": "CVE-2025-40283",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40283"
},
{
"name": "CVE-2025-39955",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39955"
},
{
"name": "CVE-2025-40324",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40324"
},
{
"name": "CVE-2025-68378",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68378"
},
{
"name": "CVE-2025-68752",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68752"
},
{
"name": "CVE-2025-38129",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38129"
},
{
"name": "CVE-2025-40250",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40250"
},
{
"name": "CVE-2025-40264",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40264"
},
{
"name": "CVE-2025-40255",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40255"
},
{
"name": "CVE-2025-40246",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40246"
},
{
"name": "CVE-2025-68367",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68367"
},
{
"name": "CVE-2025-40226",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40226"
},
{
"name": "CVE-2025-40078",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40078"
},
{
"name": "CVE-2025-68820",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68820"
},
{
"name": "CVE-2025-68756",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68756"
},
{
"name": "CVE-2025-40321",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40321"
},
{
"name": "CVE-2025-68360",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68360"
},
{
"name": "CVE-2025-40116",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40116"
},
{
"name": "CVE-2025-39895",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39895"
},
{
"name": "CVE-2025-68249",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68249"
},
{
"name": "CVE-2025-68740",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68740"
},
{
"name": "CVE-2025-39934",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39934"
},
{
"name": "CVE-2025-39978",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39978"
},
{
"name": "CVE-2025-40179",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40179"
},
{
"name": "CVE-2025-68742",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68742"
},
{
"name": "CVE-2025-40127",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40127"
},
{
"name": "CVE-2025-40282",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40282"
},
{
"name": "CVE-2025-39996",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39996"
},
{
"name": "CVE-2025-40053",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40053"
},
{
"name": "CVE-2025-39951",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39951"
},
{
"name": "CVE-2025-40120",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40120"
},
{
"name": "CVE-2025-68816",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68816"
},
{
"name": "CVE-2025-39914",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39914"
},
{
"name": "CVE-2025-68192",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68192"
},
{
"name": "CVE-2025-39697",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39697"
},
{
"name": "CVE-2025-68379",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68379"
},
{
"name": "CVE-2025-68256",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68256"
},
{
"name": "CVE-2025-68777",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68777"
},
{
"name": "CVE-2025-68254",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68254"
},
{
"name": "CVE-2025-39938",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39938"
},
{
"name": "CVE-2025-40243",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40243"
},
{
"name": "CVE-2025-40196",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40196"
},
{
"name": "CVE-2025-39982",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39982"
},
{
"name": "CVE-2025-40129",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40129"
},
{
"name": "CVE-2025-39965",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39965"
},
{
"name": "CVE-2025-38556",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38556"
},
{
"name": "CVE-2025-68171",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68171"
},
{
"name": "CVE-2025-39932",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39932"
},
{
"name": "CVE-2025-40301",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40301"
},
{
"name": "CVE-2025-40040",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40040"
},
{
"name": "CVE-2025-39810",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39810"
},
{
"name": "CVE-2026-22982",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-22982"
},
{
"name": "CVE-2025-68298",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68298"
},
{
"name": "CVE-2025-40207",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40207"
},
{
"name": "CVE-2025-40095",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40095"
},
{
"name": "CVE-2025-68747",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68747"
},
{
"name": "CVE-2025-71118",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71118"
},
{
"name": "CVE-2025-39860",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39860"
},
{
"name": "CVE-2025-40286",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40286"
},
{
"name": "CVE-2025-68327",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68327"
},
{
"name": "CVE-2025-40318",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40318"
},
{
"name": "CVE-2025-40266",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40266"
},
{
"name": "CVE-2025-68241",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68241"
},
{
"name": "CVE-2025-40118",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40118"
},
{
"name": "CVE-2025-40021",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40021"
},
{
"name": "CVE-2025-39839",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39839"
},
{
"name": "CVE-2025-68734",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68734"
},
{
"name": "CVE-2025-68776",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68776"
},
{
"name": "CVE-2025-71066",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71066"
},
{
"name": "CVE-2025-39848",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39848"
},
{
"name": "CVE-2025-68799",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68799"
},
{
"name": "CVE-2025-68345",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68345"
},
{
"name": "CVE-2025-40044",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40044"
},
{
"name": "CVE-2025-71097",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71097"
},
{
"name": "CVE-2025-40105",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40105"
},
{
"name": "CVE-2025-68288",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68288"
},
{
"name": "CVE-2025-68739",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68739"
},
{
"name": "CVE-2025-39916",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39916"
},
{
"name": "CVE-2025-40112",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40112"
},
{
"name": "CVE-2025-40079",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40079"
},
{
"name": "CVE-2025-40260",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40260"
},
{
"name": "CVE-2025-40310",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40310"
},
{
"name": "CVE-2025-40083",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40083"
},
{
"name": "CVE-2025-71111",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71111"
},
{
"name": "CVE-2025-39971",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39971"
},
{
"name": "CVE-2025-40154",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40154"
},
{
"name": "CVE-2025-40331",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40331"
},
{
"name": "CVE-2025-68337",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68337"
},
{
"name": "CVE-2025-40093",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40093"
},
{
"name": "CVE-2025-39825",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39825"
},
{
"name": "CVE-2025-71131",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71131"
},
{
"name": "CVE-2025-39852",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39852"
},
{
"name": "CVE-2025-71116",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71116"
},
{
"name": "CVE-2025-40235",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40235"
},
{
"name": "CVE-2025-39991",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39991"
},
{
"name": "CVE-2025-68281",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68281"
},
{
"name": "CVE-2025-68729",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68729"
},
{
"name": "CVE-2025-68208",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68208"
},
{
"name": "CVE-2025-68362",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68362"
},
{
"name": "CVE-2025-68236",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68236"
},
{
"name": "CVE-2025-68333",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68333"
},
{
"name": "CVE-2025-22037",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22037"
},
{
"name": "CVE-2025-39806",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39806"
},
{
"name": "CVE-2025-68290",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68290"
},
{
"name": "CVE-2025-40280",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40280"
},
{
"name": "CVE-2025-40099",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40099"
},
{
"name": "CVE-2025-40031",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40031"
},
{
"name": "CVE-2025-40180",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40180"
},
{
"name": "CVE-2025-40293",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40293"
},
{
"name": "CVE-2025-68751",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68751"
},
{
"name": "CVE-2025-68803",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68803"
},
{
"name": "CVE-2025-39851",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39851"
},
{
"name": "CVE-2025-68331",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68331"
},
{
"name": "CVE-2025-40126",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40126"
},
{
"name": "CVE-2025-39972",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39972"
},
{
"name": "CVE-2026-22976",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-22976"
},
{
"name": "CVE-2025-68760",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68760"
},
{
"name": "CVE-2025-68305",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68305"
},
{
"name": "CVE-2025-68352",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68352"
},
{
"name": "CVE-2025-68214",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68214"
},
{
"name": "CVE-2025-40320",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40320"
},
{
"name": "CVE-2025-39870",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39870"
},
{
"name": "CVE-2025-40247",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40247"
},
{
"name": "CVE-2025-68375",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68375"
},
{
"name": "CVE-2025-68753",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68753"
},
{
"name": "CVE-2025-68369",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68369"
},
{
"name": "CVE-2025-39807",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39807"
},
{
"name": "CVE-2025-71112",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71112"
},
{
"name": "CVE-2025-22022",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22022"
},
{
"name": "CVE-2025-40192",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40192"
},
{
"name": "CVE-2025-40200",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40200"
},
{
"name": "CVE-2025-68818",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68818"
},
{
"name": "CVE-2025-40124",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40124"
},
{
"name": "CVE-2025-39880",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39880"
},
{
"name": "CVE-2025-40094",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40094"
},
{
"name": "CVE-2025-40160",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40160"
},
{
"name": "CVE-2025-40284",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40284"
},
{
"name": "CVE-2025-40077",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40077"
},
{
"name": "CVE-2024-41014",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41014"
},
{
"name": "CVE-2025-40071",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40071"
},
{
"name": "CVE-2025-68329",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68329"
},
{
"name": "CVE-2025-68366",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68366"
},
{
"name": "CVE-2025-40305",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40305"
},
{
"name": "CVE-2025-40080",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40080"
},
{
"name": "CVE-2025-39846",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39846"
},
{
"name": "CVE-2025-68815",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68815"
},
{
"name": "CVE-2025-40215",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40215"
},
{
"name": "CVE-2025-40307",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40307"
},
{
"name": "CVE-2025-40111",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40111"
},
{
"name": "CVE-2025-68346",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68346"
},
{
"name": "CVE-2025-40211",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40211"
},
{
"name": "CVE-2025-40068",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40068"
},
{
"name": "CVE-2025-68315",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68315"
},
{
"name": "CVE-2025-39850",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39850"
},
{
"name": "CVE-2022-49072",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49072"
},
{
"name": "CVE-2025-40042",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40042"
},
{
"name": "CVE-2025-40155",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40155"
},
{
"name": "CVE-2025-71096",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71096"
},
{
"name": "CVE-2025-39844",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39844"
},
{
"name": "CVE-2025-71105",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71105"
},
{
"name": "CVE-2025-68266",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68266"
},
{
"name": "CVE-2025-68771",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68771"
},
{
"name": "CVE-2025-39961",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39961"
},
{
"name": "CVE-2025-68363",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68363"
},
{
"name": "CVE-2025-40248",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40248"
},
{
"name": "CVE-2026-22984",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-22984"
},
{
"name": "CVE-2024-49927",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49927"
},
{
"name": "CVE-2025-68303",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68303"
},
{
"name": "CVE-2025-39863",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39863"
},
{
"name": "CVE-2025-40259",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40259"
},
{
"name": "CVE-2025-68757",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68757"
},
{
"name": "CVE-2025-71068",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71068"
},
{
"name": "CVE-2025-23130",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-23130"
},
{
"name": "CVE-2025-40329",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40329"
},
{
"name": "CVE-2025-39957",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39957"
},
{
"name": "CVE-2025-39931",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39931"
},
{
"name": "CVE-2026-22977",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-22977"
},
{
"name": "CVE-2024-47659",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47659"
},
{
"name": "CVE-2025-39937",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39937"
},
{
"name": "CVE-2025-68766",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68766"
},
{
"name": "CVE-2025-39817",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39817"
},
{
"name": "CVE-2025-40060",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40060"
},
{
"name": "CVE-2025-39891",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39891"
},
{
"name": "CVE-2025-40059",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40059"
},
{
"name": "CVE-2025-68168",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68168"
},
{
"name": "CVE-2025-39897",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39897"
},
{
"name": "CVE-2025-68326",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68326"
},
{
"name": "CVE-2025-68372",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68372"
},
{
"name": "CVE-2025-22124",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22124"
},
{
"name": "CVE-2025-68313",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68313"
},
{
"name": "CVE-2025-71137",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71137"
},
{
"name": "CVE-2025-40123",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40123"
},
{
"name": "CVE-2025-68301",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68301"
},
{
"name": "CVE-2025-39854",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39854"
},
{
"name": "CVE-2025-68217",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68217"
},
{
"name": "CVE-2025-40178",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40178"
},
{
"name": "CVE-2025-68212",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68212"
},
{
"name": "CVE-2025-68289",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68289"
},
{
"name": "CVE-2025-40363",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40363"
},
{
"name": "CVE-2025-39869",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39869"
},
{
"name": "CVE-2025-40253",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40253"
},
{
"name": "CVE-2025-39985",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39985"
},
{
"name": "CVE-2025-68245",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68245"
},
{
"name": "CVE-2025-68730",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68730"
},
{
"name": "CVE-2025-68213",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68213"
},
{
"name": "CVE-2025-39952",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39952"
},
{
"name": "CVE-2025-40317",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40317"
},
{
"name": "CVE-2025-68233",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68233"
},
{
"name": "CVE-2025-71120",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71120"
},
{
"name": "CVE-2025-68282",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68282"
},
{
"name": "CVE-2025-68225",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68225"
},
{
"name": "CVE-2025-68787",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68787"
},
{
"name": "CVE-2025-23133",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-23133"
},
{
"name": "CVE-2025-68782",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68782"
},
{
"name": "CVE-2025-68177",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68177"
},
{
"name": "CVE-2025-68758",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68758"
},
{
"name": "CVE-2025-68191",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68191"
},
{
"name": "CVE-2025-71113",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71113"
},
{
"name": "CVE-2025-71127",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71127"
},
{
"name": "CVE-2025-40141",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40141"
},
{
"name": "CVE-2025-68340",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68340"
},
{
"name": "CVE-2025-39678",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39678"
},
{
"name": "CVE-2025-68219",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68219"
},
{
"name": "CVE-2025-40288",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40288"
},
{
"name": "CVE-2025-40258",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40258"
},
{
"name": "CVE-2025-40281",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40281"
},
{
"name": "CVE-2025-68185",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68185"
},
{
"name": "CVE-2025-40304",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40304"
},
{
"name": "CVE-2025-40110",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40110"
},
{
"name": "CVE-2024-56593",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56593"
},
{
"name": "CVE-2025-40268",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40268"
},
{
"name": "CVE-2025-39980",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39980"
},
{
"name": "CVE-2025-40009",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40009"
},
{
"name": "CVE-2025-68336",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68336"
},
{
"name": "CVE-2025-40303",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40303"
},
{
"name": "CVE-2025-68323",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68323"
},
{
"name": "CVE-2025-68178",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68178"
},
{
"name": "CVE-2025-40337",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40337"
},
{
"name": "CVE-2025-40346",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40346"
},
{
"name": "CVE-2025-40036",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40036"
},
{
"name": "CVE-2025-68221",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68221"
},
{
"name": "CVE-2025-39832",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39832"
},
{
"name": "CVE-2025-40000",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40000"
},
{
"name": "CVE-2025-40262",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40262"
},
{
"name": "CVE-2025-68262",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68262"
},
{
"name": "CVE-2025-39813",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39813"
},
{
"name": "CVE-2025-68819",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68819"
},
{
"name": "CVE-2025-40261",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40261"
},
{
"name": "CVE-2025-38643",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38643"
},
{
"name": "CVE-2025-40030",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40030"
},
{
"name": "CVE-2025-40244",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40244"
},
{
"name": "CVE-2025-39995",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39995"
},
{
"name": "CVE-2025-68735",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68735"
},
{
"name": "CVE-2026-23021",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23021"
},
{
"name": "CVE-2025-39847",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39847"
},
{
"name": "CVE-2025-39819",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39819"
},
{
"name": "CVE-2025-68732",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68732"
},
{
"name": "CVE-2025-40323",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40323"
},
{
"name": "CVE-2025-39835",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39835"
},
{
"name": "CVE-2025-68285",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68285"
},
{
"name": "CVE-2025-40096",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40096"
},
{
"name": "CVE-2024-56640",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56640"
},
{
"name": "CVE-2025-39841",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39841"
},
{
"name": "CVE-2025-68371",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68371"
},
{
"name": "CVE-2025-40275",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40275"
},
{
"name": "CVE-2025-39907",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39907"
},
{
"name": "CVE-2025-39829",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39829"
},
{
"name": "CVE-2025-71091",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71091"
},
{
"name": "CVE-2025-39909",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39909"
},
{
"name": "CVE-2025-68227",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68227"
},
{
"name": "CVE-2025-40339",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40339"
},
{
"name": "CVE-2025-40140",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40140"
},
{
"name": "CVE-2025-40223",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40223"
},
{
"name": "CVE-2025-40061",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40061"
},
{
"name": "CVE-2025-68263",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68263"
},
{
"name": "CVE-2025-68293",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68293"
},
{
"name": "CVE-2025-68800",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68800"
},
{
"name": "CVE-2025-68261",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68261"
},
{
"name": "CVE-2025-68755",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68755"
},
{
"name": "CVE-2025-68767",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68767"
},
{
"name": "CVE-2022-49267",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49267"
},
{
"name": "CVE-2025-39873",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39873"
},
{
"name": "CVE-2025-40159",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40159"
},
{
"name": "CVE-2025-40319",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40319"
},
{
"name": "CVE-2025-68727",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68727"
},
{
"name": "CVE-2025-39836",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39836"
},
{
"name": "CVE-2025-40051",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40051"
},
{
"name": "CVE-2025-40351",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40351"
},
{
"name": "CVE-2025-68264",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68264"
},
{
"name": "CVE-2025-40087",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40087"
},
{
"name": "CVE-2025-68762",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68762"
},
{
"name": "CVE-2025-68764",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68764"
}
],
"initial_release_date": "2026-03-27T00:00:00",
"last_revision_date": "2026-03-27T00:00:00",
"links": [],
"reference": "CERTFR-2026-AVI-0371",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2026-03-27T00:00:00.000000"
}
],
"risks": [
{
"description": "Atteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es"
},
{
"description": "Ex\u00e9cution de code arbitraire"
},
{
"description": "Non sp\u00e9cifi\u00e9 par l\u0027\u00e9diteur"
},
{
"description": "D\u00e9ni de service"
},
{
"description": "Contournement de la politique de s\u00e9curit\u00e9"
},
{
"description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
},
{
"description": "\u00c9l\u00e9vation de privil\u00e8ges"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans le noyau Linux d\u0027Ubuntu. Certaines d\u0027entre elles permettent \u00e0 un attaquant de provoquer une ex\u00e9cution de code arbitraire, une \u00e9l\u00e9vation de privil\u00e8ges et une atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es.",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans le noyau Linux d\u0027Ubuntu",
"vendor_advisories": [
{
"published_at": "2026-03-27",
"title": "Bulletin de s\u00e9curit\u00e9 Ubuntu USN-8098-9",
"url": "https://ubuntu.com/security/notices/USN-8098-9"
},
{
"published_at": "2026-03-23",
"title": "Bulletin de s\u00e9curit\u00e9 Ubuntu USN-8119-1",
"url": "https://ubuntu.com/security/notices/USN-8119-1"
},
{
"published_at": "2026-03-24",
"title": "Bulletin de s\u00e9curit\u00e9 Ubuntu USN-8098-6",
"url": "https://ubuntu.com/security/notices/USN-8098-6"
},
{
"published_at": "2026-03-25",
"title": "Bulletin de s\u00e9curit\u00e9 Ubuntu USN-8126-1",
"url": "https://ubuntu.com/security/notices/USN-8126-1"
},
{
"published_at": "2026-03-25",
"title": "Bulletin de s\u00e9curit\u00e9 Ubuntu USN-8098-7",
"url": "https://ubuntu.com/security/notices/USN-8098-7"
},
{
"published_at": "2026-03-20",
"title": "Bulletin de s\u00e9curit\u00e9 Ubuntu USN-8112-1",
"url": "https://ubuntu.com/security/notices/USN-8112-1"
},
{
"published_at": "2026-03-24",
"title": "Bulletin de s\u00e9curit\u00e9 Ubuntu USN-8098-4",
"url": "https://ubuntu.com/security/notices/USN-8098-4"
},
{
"published_at": "2026-03-24",
"title": "Bulletin de s\u00e9curit\u00e9 Ubuntu USN-8112-4",
"url": "https://ubuntu.com/security/notices/USN-8112-4"
},
{
"published_at": "2026-03-23",
"title": "Bulletin de s\u00e9curit\u00e9 Ubuntu USN-8116-1",
"url": "https://ubuntu.com/security/notices/USN-8116-1"
},
{
"published_at": "2026-03-24",
"title": "Bulletin de s\u00e9curit\u00e9 Ubuntu USN-8112-3",
"url": "https://ubuntu.com/security/notices/USN-8112-3"
},
{
"published_at": "2026-03-24",
"title": "Bulletin de s\u00e9curit\u00e9 Ubuntu USN-8059-9",
"url": "https://ubuntu.com/security/notices/USN-8059-9"
},
{
"published_at": "2026-03-24",
"title": "Bulletin de s\u00e9curit\u00e9 Ubuntu USN-8098-5",
"url": "https://ubuntu.com/security/notices/USN-8098-5"
},
{
"published_at": "2026-03-23",
"title": "Bulletin de s\u00e9curit\u00e9 Ubuntu USN-8094-3",
"url": "https://ubuntu.com/security/notices/USN-8094-3"
},
{
"published_at": "2026-03-23",
"title": "Bulletin de s\u00e9curit\u00e9 Ubuntu USN-8119-2",
"url": "https://ubuntu.com/security/notices/USN-8119-2"
},
{
"published_at": "2026-03-23",
"title": "Bulletin de s\u00e9curit\u00e9 Ubuntu USN-8095-4",
"url": "https://ubuntu.com/security/notices/USN-8095-4"
},
{
"published_at": "2026-03-24",
"title": "Bulletin de s\u00e9curit\u00e9 Ubuntu USN-8121-1",
"url": "https://ubuntu.com/security/notices/USN-8121-1"
},
{
"published_at": "2026-03-20",
"title": "Bulletin de s\u00e9curit\u00e9 Ubuntu USN-8112-2",
"url": "https://ubuntu.com/security/notices/USN-8112-2"
},
{
"published_at": "2026-03-25",
"title": "Bulletin de s\u00e9curit\u00e9 Ubuntu USN-8098-8",
"url": "https://ubuntu.com/security/notices/USN-8098-8"
},
{
"published_at": "2026-03-24",
"title": "Bulletin de s\u00e9curit\u00e9 Ubuntu USN-8112-5",
"url": "https://ubuntu.com/security/notices/USN-8112-5"
},
{
"published_at": "2026-03-25",
"title": "Bulletin de s\u00e9curit\u00e9 Ubuntu USN-8125-1",
"url": "https://ubuntu.com/security/notices/USN-8125-1"
},
{
"published_at": "2026-03-23",
"title": "Bulletin de s\u00e9curit\u00e9 Ubuntu USN-8096-5",
"url": "https://ubuntu.com/security/notices/USN-8096-5"
},
{
"published_at": "2026-03-25",
"title": "Bulletin de s\u00e9curit\u00e9 Ubuntu USN-8094-4",
"url": "https://ubuntu.com/security/notices/USN-8094-4"
}
]
}
CERTFR-2025-AVI-1048
Vulnerability from certfr_avis - Published: 2025-11-28 - Updated: 2025-11-28
De multiples vulnérabilités ont été découvertes dans le noyau Linux de Debian LTS. Certaines d'entre elles permettent à un attaquant de provoquer une élévation de privilèges, une atteinte à la confidentialité des données et une atteinte à l'intégrité des données.
Solutions
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
| Title | Publication Time | Tags | |||
|---|---|---|---|---|---|
|
|||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "Debian LTS bullseye versions ant\u00e9rieures \u00e0 6.1.158-1~deb11u1",
"product": {
"name": "Debian",
"vendor": {
"name": "Debian",
"scada": false
}
}
}
],
"affected_systems_content": "",
"content": "## Solutions\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des correctifs (cf. section Documentation).",
"cves": [
{
"name": "CVE-2025-39987",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39987"
},
{
"name": "CVE-2025-21861",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21861"
},
{
"name": "CVE-2025-40156",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40156"
},
{
"name": "CVE-2025-40055",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40055"
},
{
"name": "CVE-2025-40029",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40029"
},
{
"name": "CVE-2025-40008",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40008"
},
{
"name": "CVE-2025-40048",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40048"
},
{
"name": "CVE-2025-40043",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40043"
},
{
"name": "CVE-2025-39973",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39973"
},
{
"name": "CVE-2025-39943",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39943"
},
{
"name": "CVE-2025-39945",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39945"
},
{
"name": "CVE-2025-40100",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40100"
},
{
"name": "CVE-2025-40019",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40019"
},
{
"name": "CVE-2025-40081",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40081"
},
{
"name": "CVE-2025-40026",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40026"
},
{
"name": "CVE-2025-40153",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40153"
},
{
"name": "CVE-2025-40103",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40103"
},
{
"name": "CVE-2025-40121",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40121"
},
{
"name": "CVE-2025-40204",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40204"
},
{
"name": "CVE-2025-40171",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40171"
},
{
"name": "CVE-2025-40056",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40056"
},
{
"name": "CVE-2025-40125",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40125"
},
{
"name": "CVE-2025-40187",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40187"
},
{
"name": "CVE-2025-40092",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40092"
},
{
"name": "CVE-2025-39967",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39967"
},
{
"name": "CVE-2025-40107",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40107"
},
{
"name": "CVE-2025-40115",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40115"
},
{
"name": "CVE-2025-40198",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40198"
},
{
"name": "CVE-2025-39942",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39942"
},
{
"name": "CVE-2025-39929",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39929"
},
{
"name": "CVE-2025-39949",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39949"
},
{
"name": "CVE-2025-40173",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40173"
},
{
"name": "CVE-2025-40190",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40190"
},
{
"name": "CVE-2025-40010",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40010"
},
{
"name": "CVE-2025-39944",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39944"
},
{
"name": "CVE-2025-40202",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40202"
},
{
"name": "CVE-2025-39953",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39953"
},
{
"name": "CVE-2025-40167",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40167"
},
{
"name": "CVE-2025-39969",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39969"
},
{
"name": "CVE-2025-40194",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40194"
},
{
"name": "CVE-2025-40104",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40104"
},
{
"name": "CVE-2025-40001",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40001"
},
{
"name": "CVE-2025-40035",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40035"
},
{
"name": "CVE-2025-39988",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39988"
},
{
"name": "CVE-2025-40020",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40020"
},
{
"name": "CVE-2025-40188",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40188"
},
{
"name": "CVE-2025-40186",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40186"
},
{
"name": "CVE-2025-40013",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40013"
},
{
"name": "CVE-2025-40049",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40049"
},
{
"name": "CVE-2025-40070",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40070"
},
{
"name": "CVE-2025-40106",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40106"
},
{
"name": "CVE-2025-40205",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40205"
},
{
"name": "CVE-2025-39977",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39977"
},
{
"name": "CVE-2025-40027",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40027"
},
{
"name": "CVE-2025-39970",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39970"
},
{
"name": "CVE-2025-40032",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40032"
},
{
"name": "CVE-2025-39994",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39994"
},
{
"name": "CVE-2025-40088",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40088"
},
{
"name": "CVE-2025-40062",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40062"
},
{
"name": "CVE-2025-40197",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40197"
},
{
"name": "CVE-2025-40109",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40109"
},
{
"name": "CVE-2025-40006",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40006"
},
{
"name": "CVE-2025-40011",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40011"
},
{
"name": "CVE-2025-40085",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40085"
},
{
"name": "CVE-2025-40176",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40176"
},
{
"name": "CVE-2025-40193",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40193"
},
{
"name": "CVE-2025-40201",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40201"
},
{
"name": "CVE-2025-40084",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40084"
},
{
"name": "CVE-2025-40183",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40183"
},
{
"name": "CVE-2025-39998",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39998"
},
{
"name": "CVE-2025-40134",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40134"
},
{
"name": "CVE-2025-39968",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39968"
},
{
"name": "CVE-2025-39986",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39986"
},
{
"name": "CVE-2025-39955",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39955"
},
{
"name": "CVE-2025-40078",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40078"
},
{
"name": "CVE-2025-40116",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40116"
},
{
"name": "CVE-2025-39934",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39934"
},
{
"name": "CVE-2025-39978",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39978"
},
{
"name": "CVE-2025-40179",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40179"
},
{
"name": "CVE-2025-40127",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40127"
},
{
"name": "CVE-2025-39996",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39996"
},
{
"name": "CVE-2025-40053",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40053"
},
{
"name": "CVE-2025-39951",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39951"
},
{
"name": "CVE-2025-40120",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40120"
},
{
"name": "CVE-2025-39938",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39938"
},
{
"name": "CVE-2025-39982",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39982"
},
{
"name": "CVE-2025-40040",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40040"
},
{
"name": "CVE-2025-40207",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40207"
},
{
"name": "CVE-2025-40095",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40095"
},
{
"name": "CVE-2025-40118",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40118"
},
{
"name": "CVE-2025-40021",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40021"
},
{
"name": "CVE-2025-39964",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39964"
},
{
"name": "CVE-2025-39993",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39993"
},
{
"name": "CVE-2025-40044",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40044"
},
{
"name": "CVE-2025-40105",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40105"
},
{
"name": "CVE-2025-40112",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40112"
},
{
"name": "CVE-2025-39971",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39971"
},
{
"name": "CVE-2025-40154",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40154"
},
{
"name": "CVE-2025-40093",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40093"
},
{
"name": "CVE-2025-40099",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40099"
},
{
"name": "CVE-2025-40126",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40126"
},
{
"name": "CVE-2025-39972",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39972"
},
{
"name": "CVE-2025-40018",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40018"
},
{
"name": "CVE-2025-40200",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40200"
},
{
"name": "CVE-2025-40124",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40124"
},
{
"name": "CVE-2025-40094",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40094"
},
{
"name": "CVE-2025-40080",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40080"
},
{
"name": "CVE-2025-40111",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40111"
},
{
"name": "CVE-2025-40068",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40068"
},
{
"name": "CVE-2025-40042",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40042"
},
{
"name": "CVE-2025-39957",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39957"
},
{
"name": "CVE-2025-39931",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39931"
},
{
"name": "CVE-2025-39937",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39937"
},
{
"name": "CVE-2025-40060",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40060"
},
{
"name": "CVE-2025-40123",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40123"
},
{
"name": "CVE-2025-40178",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40178"
},
{
"name": "CVE-2025-39985",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39985"
},
{
"name": "CVE-2025-40141",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40141"
},
{
"name": "CVE-2025-39946",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39946"
},
{
"name": "CVE-2025-39980",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39980"
},
{
"name": "CVE-2025-40036",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40036"
},
{
"name": "CVE-2025-40030",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40030"
},
{
"name": "CVE-2025-39995",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39995"
},
{
"name": "CVE-2025-40096",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40096"
},
{
"name": "CVE-2025-40022",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40022"
},
{
"name": "CVE-2025-40140",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40140"
},
{
"name": "CVE-2025-40051",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40051"
},
{
"name": "CVE-2025-40087",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40087"
}
],
"initial_release_date": "2025-11-28T00:00:00",
"last_revision_date": "2025-11-28T00:00:00",
"links": [],
"reference": "CERTFR-2025-AVI-1048",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2025-11-28T00:00:00.000000"
}
],
"risks": [
{
"description": "Atteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es"
},
{
"description": "D\u00e9ni de service"
},
{
"description": "Contournement de la politique de s\u00e9curit\u00e9"
},
{
"description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
},
{
"description": "\u00c9l\u00e9vation de privil\u00e8ges"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans le noyau Linux de Debian LTS. Certaines d\u0027entre elles permettent \u00e0 un attaquant de provoquer une \u00e9l\u00e9vation de privil\u00e8ges, une atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es et une atteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es.",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans le noyau Linux de Debian LTS",
"vendor_advisories": [
{
"published_at": "2025-11-25",
"title": "Bulletin de s\u00e9curit\u00e9 Debian LTS DLA-4379-1",
"url": "https://lists.debian.org/debian-lts-announce/2025/11/msg00022.html"
}
]
}
CERTFR-2026-AVI-0169
Vulnerability from certfr_avis - Published: 2026-02-13 - Updated: 2026-02-13
De multiples vulnérabilités ont été découvertes dans le noyau Linux d'Ubuntu. Certaines d'entre elles permettent à un attaquant de provoquer une atteinte à la confidentialité des données, une atteinte à l'intégrité des données et un contournement de la politique de sécurité.
Solutions
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
None| Title | Publication Time | Tags | |||||||||||||||||||||||||||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "Ubuntu 16.04 ESM",
"product": {
"name": "Ubuntu",
"vendor": {
"name": "Ubuntu",
"scada": false
}
}
},
{
"description": "Ubuntu 20.04 ESM",
"product": {
"name": "Ubuntu",
"vendor": {
"name": "Ubuntu",
"scada": false
}
}
},
{
"description": "Ubuntu 24.04 LTS",
"product": {
"name": "Ubuntu",
"vendor": {
"name": "Ubuntu",
"scada": false
}
}
},
{
"description": "Ubuntu 18.04 ESM",
"product": {
"name": "Ubuntu",
"vendor": {
"name": "Ubuntu",
"scada": false
}
}
},
{
"description": "Ubuntu 25.10",
"product": {
"name": "Ubuntu",
"vendor": {
"name": "Ubuntu",
"scada": false
}
}
},
{
"description": "Ubuntu 22.04 LTS",
"product": {
"name": "Ubuntu",
"vendor": {
"name": "Ubuntu",
"scada": false
}
}
}
],
"affected_systems_content": null,
"content": "## Solutions\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des correctifs (cf. section Documentation).",
"cves": [
{
"name": "CVE-2025-40296",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40296"
},
{
"name": "CVE-2025-40225",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40225"
},
{
"name": "CVE-2025-40166",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40166"
},
{
"name": "CVE-2025-40273",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40273"
},
{
"name": "CVE-2025-40064",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40064"
},
{
"name": "CVE-2025-38490",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38490"
},
{
"name": "CVE-2025-37850",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37850"
},
{
"name": "CVE-2025-38485",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38485"
},
{
"name": "CVE-2025-22026",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22026"
},
{
"name": "CVE-2025-39987",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39987"
},
{
"name": "CVE-2025-38579",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38579"
},
{
"name": "CVE-2025-68196",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68196"
},
{
"name": "CVE-2025-37761",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37761"
},
{
"name": "CVE-2025-21861",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21861"
},
{
"name": "CVE-2025-37865",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37865"
},
{
"name": "CVE-2025-38328",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38328"
},
{
"name": "CVE-2025-40156",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40156"
},
{
"name": "CVE-2025-38711",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38711"
},
{
"name": "CVE-2025-38487",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38487"
},
{
"name": "CVE-2025-40137",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40137"
},
{
"name": "CVE-2025-37775",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37775"
},
{
"name": "CVE-2025-38335",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38335"
},
{
"name": "CVE-2025-38304",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38304"
},
{
"name": "CVE-2025-37892",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37892"
},
{
"name": "CVE-2025-38100",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38100"
},
{
"name": "CVE-2025-37859",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37859"
},
{
"name": "CVE-2025-40002",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40002"
},
{
"name": "CVE-2025-40057",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40057"
},
{
"name": "CVE-2025-38043",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38043"
},
{
"name": "CVE-2025-38471",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38471"
},
{
"name": "CVE-2025-38520",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38520"
},
{
"name": "CVE-2025-37792",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37792"
},
{
"name": "CVE-2025-68240",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68240"
},
{
"name": "CVE-2025-38108",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38108"
},
{
"name": "CVE-2025-38230",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38230"
},
{
"name": "CVE-2025-38229",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38229"
},
{
"name": "CVE-2025-40055",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40055"
},
{
"name": "CVE-2025-38158",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38158"
},
{
"name": "CVE-2025-37872",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37872"
},
{
"name": "CVE-2025-38588",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38588"
},
{
"name": "CVE-2025-39876",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39876"
},
{
"name": "CVE-2025-40314",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40314"
},
{
"name": "CVE-2025-40029",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40029"
},
{
"name": "CVE-2025-40037",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40037"
},
{
"name": "CVE-2025-38279",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38279"
},
{
"name": "CVE-2025-38561",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38561"
},
{
"name": "CVE-2025-38574",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38574"
},
{
"name": "CVE-2025-40306",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40306"
},
{
"name": "CVE-2025-68210",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68210"
},
{
"name": "CVE-2025-40239",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40239"
},
{
"name": "CVE-2025-40147",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40147"
},
{
"name": "CVE-2025-40048",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40048"
},
{
"name": "CVE-2025-38147",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38147"
},
{
"name": "CVE-2025-23155",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-23155"
},
{
"name": "CVE-2025-38286",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38286"
},
{
"name": "CVE-2025-40219",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40219"
},
{
"name": "CVE-2025-39757",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39757"
},
{
"name": "CVE-2025-68200",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68200"
},
{
"name": "CVE-2025-38501",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38501"
},
{
"name": "CVE-2025-38474",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38474"
},
{
"name": "CVE-2025-37979",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37979"
},
{
"name": "CVE-2025-40043",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40043"
},
{
"name": "CVE-2024-50195",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50195"
},
{
"name": "CVE-2025-68176",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68176"
},
{
"name": "CVE-2025-37777",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37777"
},
{
"name": "CVE-2025-39772",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39772"
},
{
"name": "CVE-2025-68199",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68199"
},
{
"name": "CVE-2025-37936",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37936"
},
{
"name": "CVE-2025-68204",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68204"
},
{
"name": "CVE-2025-38601",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38601"
},
{
"name": "CVE-2025-37766",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37766"
},
{
"name": "CVE-2025-38104",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38104"
},
{
"name": "CVE-2025-37844",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37844"
},
{
"name": "CVE-2025-21931",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21931"
},
{
"name": "CVE-2025-37871",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37871"
},
{
"name": "CVE-2025-37778",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37778"
},
{
"name": "CVE-2025-39716",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39716"
},
{
"name": "CVE-2025-39702",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39702"
},
{
"name": "CVE-2024-56606",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56606"
},
{
"name": "CVE-2025-39973",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39973"
},
{
"name": "CVE-2025-38515",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38515"
},
{
"name": "CVE-2025-38645",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38645"
},
{
"name": "CVE-2025-38163",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38163"
},
{
"name": "CVE-2025-22126",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22126"
},
{
"name": "CVE-2025-38444",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38444"
},
{
"name": "CVE-2025-38109",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38109"
},
{
"name": "CVE-2025-39779",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39779"
},
{
"name": "CVE-2025-37755",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37755"
},
{
"name": "CVE-2025-39685",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39685"
},
{
"name": "CVE-2025-38660",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38660"
},
{
"name": "CVE-2025-39761",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39761"
},
{
"name": "CVE-2025-68246",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68246"
},
{
"name": "CVE-2022-48986",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48986"
},
{
"name": "CVE-2025-40287",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40287"
},
{
"name": "CVE-2025-39943",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39943"
},
{
"name": "CVE-2025-39945",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39945"
},
{
"name": "CVE-2024-27078",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-27078"
},
{
"name": "CVE-2024-56756",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56756"
},
{
"name": "CVE-2025-39883",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39883"
},
{
"name": "CVE-2025-39720",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39720"
},
{
"name": "CVE-2025-38624",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38624"
},
{
"name": "CVE-2025-40100",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40100"
},
{
"name": "CVE-2025-40285",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40285"
},
{
"name": "CVE-2025-38388",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38388"
},
{
"name": "CVE-2025-38157",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38157"
},
{
"name": "CVE-2025-40063",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40063"
},
{
"name": "CVE-2025-37790",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37790"
},
{
"name": "CVE-2025-40208",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40208"
},
{
"name": "CVE-2025-39746",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39746"
},
{
"name": "CVE-2025-38323",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38323"
},
{
"name": "CVE-2025-40019",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40019"
},
{
"name": "CVE-2025-40039",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40039"
},
{
"name": "CVE-2025-38208",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38208"
},
{
"name": "CVE-2025-40240",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40240"
},
{
"name": "CVE-2025-38219",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38219"
},
{
"name": "CVE-2025-39889",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39889"
},
{
"name": "CVE-2025-38099",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38099"
},
{
"name": "CVE-2025-38524",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38524"
},
{
"name": "CVE-2025-38466",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38466"
},
{
"name": "CVE-2025-40117",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40117"
},
{
"name": "CVE-2025-37758",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37758"
},
{
"name": "CVE-2025-40081",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40081"
},
{
"name": "CVE-2025-38087",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38087"
},
{
"name": "CVE-2024-58011",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58011"
},
{
"name": "CVE-2025-38039",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38039"
},
{
"name": "CVE-2025-40026",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40026"
},
{
"name": "CVE-2025-40153",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40153"
},
{
"name": "CVE-2025-40103",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40103"
},
{
"name": "CVE-2025-40294",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40294"
},
{
"name": "CVE-2025-38595",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38595"
},
{
"name": "CVE-2025-38626",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38626"
},
{
"name": "CVE-2025-40356",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40356"
},
{
"name": "CVE-2025-40121",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40121"
},
{
"name": "CVE-2025-40312",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40312"
},
{
"name": "CVE-2025-40204",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40204"
},
{
"name": "CVE-2025-37852",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37852"
},
{
"name": "CVE-2025-37841",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37841"
},
{
"name": "CVE-2025-40171",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40171"
},
{
"name": "CVE-2025-37918",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37918"
},
{
"name": "CVE-2025-37917",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37917"
},
{
"name": "CVE-2025-38290",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38290"
},
{
"name": "CVE-2025-68243",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68243"
},
{
"name": "CVE-2025-38063",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38063"
},
{
"name": "CVE-2025-37770",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37770"
},
{
"name": "CVE-2025-37773",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37773"
},
{
"name": "CVE-2025-68175",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68175"
},
{
"name": "CVE-2025-40221",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40221"
},
{
"name": "CVE-2025-38578",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38578"
},
{
"name": "CVE-2025-40139",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40139"
},
{
"name": "CVE-2025-40056",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40056"
},
{
"name": "CVE-2025-38675",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38675"
},
{
"name": "CVE-2025-39911",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39911"
},
{
"name": "CVE-2025-38646",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38646"
},
{
"name": "CVE-2025-38491",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38491"
},
{
"name": "CVE-2025-38708",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38708"
},
{
"name": "CVE-2025-37961",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37961"
},
{
"name": "CVE-2025-68248",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68248"
},
{
"name": "CVE-2025-40125",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40125"
},
{
"name": "CVE-2025-40350",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40350"
},
{
"name": "CVE-2025-40309",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40309"
},
{
"name": "CVE-2025-38313",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38313"
},
{
"name": "CVE-2025-38336",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38336"
},
{
"name": "CVE-2025-40349",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40349"
},
{
"name": "CVE-2025-40052",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40052"
},
{
"name": "CVE-2025-38408",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38408"
},
{
"name": "CVE-2025-40343",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40343"
},
{
"name": "CVE-2025-38644",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38644"
},
{
"name": "CVE-2025-38692",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38692"
},
{
"name": "CVE-2025-38061",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38061"
},
{
"name": "CVE-2025-68173",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68173"
},
{
"name": "CVE-2025-37983",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37983"
},
{
"name": "CVE-2025-38127",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38127"
},
{
"name": "CVE-2025-38375",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38375"
},
{
"name": "CVE-2025-37784",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37784"
},
{
"name": "CVE-2025-39701",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39701"
},
{
"name": "CVE-2025-40308",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40308"
},
{
"name": "CVE-2025-40187",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40187"
},
{
"name": "CVE-2025-37920",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37920"
},
{
"name": "CVE-2025-40315",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40315"
},
{
"name": "CVE-2025-37815",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37815"
},
{
"name": "CVE-2025-38686",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38686"
},
{
"name": "CVE-2025-37819",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37819"
},
{
"name": "CVE-2025-39913",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39913"
},
{
"name": "CVE-2025-40092",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40092"
},
{
"name": "CVE-2025-40298",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40298"
},
{
"name": "CVE-2025-40355",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40355"
},
{
"name": "CVE-2025-38609",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38609"
},
{
"name": "CVE-2025-68186",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68186"
},
{
"name": "CVE-2025-39967",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39967"
},
{
"name": "CVE-2025-40054",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40054"
},
{
"name": "CVE-2025-68184",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68184"
},
{
"name": "CVE-2024-36357",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36357"
},
{
"name": "CVE-2025-38463",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38463"
},
{
"name": "CVE-2025-40115",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40115"
},
{
"name": "CVE-2025-38112",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38112"
},
{
"name": "CVE-2024-49959",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49959"
},
{
"name": "CVE-2025-38521",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38521"
},
{
"name": "CVE-2025-38023",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38023"
},
{
"name": "CVE-2025-39709",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39709"
},
{
"name": "CVE-2025-38282",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38282"
},
{
"name": "CVE-2025-39689",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39689"
},
{
"name": "CVE-2025-38215",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38215"
},
{
"name": "CVE-2025-39787",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39787"
},
{
"name": "CVE-2025-37943",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37943"
},
{
"name": "CVE-2025-37745",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37745"
},
{
"name": "CVE-2025-40058",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40058"
},
{
"name": "CVE-2025-39731",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39731"
},
{
"name": "CVE-2025-38734",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38734"
},
{
"name": "CVE-2025-38653",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38653"
},
{
"name": "CVE-2025-38571",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38571"
},
{
"name": "CVE-2025-37789",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37789"
},
{
"name": "CVE-2025-40347",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40347"
},
{
"name": "CVE-2025-38695",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38695"
},
{
"name": "CVE-2025-38004",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38004"
},
{
"name": "CVE-2025-39749",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39749"
},
{
"name": "CVE-2025-40198",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40198"
},
{
"name": "CVE-2025-68310",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68310"
},
{
"name": "CVE-2025-68179",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68179"
},
{
"name": "CVE-2025-40145",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40145"
},
{
"name": "CVE-2025-39949",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39949"
},
{
"name": "CVE-2025-38387",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38387"
},
{
"name": "CVE-2025-68169",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68169"
},
{
"name": "CVE-2025-38362",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38362"
},
{
"name": "CVE-2025-40173",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40173"
},
{
"name": "CVE-2025-68316",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68316"
},
{
"name": "CVE-2025-68321",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68321"
},
{
"name": "CVE-2025-37924",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37924"
},
{
"name": "CVE-2025-40004",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40004"
},
{
"name": "CVE-2025-38371",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38371"
},
{
"name": "CVE-2024-56538",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56538"
},
{
"name": "CVE-2025-39923",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39923"
},
{
"name": "CVE-2025-38445",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38445"
},
{
"name": "CVE-2025-38456",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38456"
},
{
"name": "CVE-2025-38538",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38538"
},
{
"name": "CVE-2025-37867",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37867"
},
{
"name": "CVE-2025-23160",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-23160"
},
{
"name": "CVE-2025-40311",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40311"
},
{
"name": "CVE-2025-38295",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38295"
},
{
"name": "CVE-2025-38461",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38461"
},
{
"name": "CVE-2025-37857",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37857"
},
{
"name": "CVE-2025-37842",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37842"
},
{
"name": "CVE-2025-40237",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40237"
},
{
"name": "CVE-2025-39953",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39953"
},
{
"name": "CVE-2025-38710",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38710"
},
{
"name": "CVE-2025-39681",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39681"
},
{
"name": "CVE-2025-38060",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38060"
},
{
"name": "CVE-2025-40167",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40167"
},
{
"name": "CVE-2025-38159",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38159"
},
{
"name": "CVE-2025-38066",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38066"
},
{
"name": "CVE-2025-39770",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39770"
},
{
"name": "CVE-2025-39969",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39969"
},
{
"name": "CVE-2025-37744",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37744"
},
{
"name": "CVE-2025-38705",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38705"
},
{
"name": "CVE-2025-40194",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40194"
},
{
"name": "CVE-2025-38706",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38706"
},
{
"name": "CVE-2025-40333",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40333"
},
{
"name": "CVE-2025-38305",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38305"
},
{
"name": "CVE-2025-37884",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37884"
},
{
"name": "CVE-2025-38067",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38067"
},
{
"name": "CVE-2025-39750",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39750"
},
{
"name": "CVE-2025-38699",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38699"
},
{
"name": "CVE-2025-37927",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37927"
},
{
"name": "CVE-2025-38707",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38707"
},
{
"name": "CVE-2025-38562",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38562"
},
{
"name": "CVE-2025-37897",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37897"
},
{
"name": "CVE-2025-40256",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40256"
},
{
"name": "CVE-2025-37911",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37911"
},
{
"name": "CVE-2025-40245",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40245"
},
{
"name": "CVE-2025-38587",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38587"
},
{
"name": "CVE-2025-37869",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37869"
},
{
"name": "CVE-2025-39692",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39692"
},
{
"name": "CVE-2025-40360",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40360"
},
{
"name": "CVE-2025-40332",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40332"
},
{
"name": "CVE-2025-40082",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40082"
},
{
"name": "CVE-2025-38068",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38068"
},
{
"name": "CVE-2025-38436",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38436"
},
{
"name": "CVE-2025-37930",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37930"
},
{
"name": "CVE-2025-40104",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40104"
},
{
"name": "CVE-2025-38401",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38401"
},
{
"name": "CVE-2025-38677",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38677"
},
{
"name": "CVE-2025-38097",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38097"
},
{
"name": "CVE-2025-37810",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37810"
},
{
"name": "CVE-2025-38253",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38253"
},
{
"name": "CVE-2025-40097",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40097"
},
{
"name": "CVE-2025-38123",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38123"
},
{
"name": "CVE-2025-38338",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38338"
},
{
"name": "CVE-2025-38555",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38555"
},
{
"name": "CVE-2025-38239",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38239"
},
{
"name": "CVE-2025-40001",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40001"
},
{
"name": "CVE-2025-38590",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38590"
},
{
"name": "CVE-2025-38027",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38027"
},
{
"name": "CVE-2025-38102",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38102"
},
{
"name": "CVE-2025-40035",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40035"
},
{
"name": "CVE-2025-68187",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68187"
},
{
"name": "CVE-2025-38283",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38283"
},
{
"name": "CVE-2025-40322",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40322"
},
{
"name": "CVE-2025-68209",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68209"
},
{
"name": "CVE-2025-40045",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40045"
},
{
"name": "CVE-2025-23159",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-23159"
},
{
"name": "CVE-2025-39988",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39988"
},
{
"name": "CVE-2025-38455",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38455"
},
{
"name": "CVE-2025-40313",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40313"
},
{
"name": "CVE-2025-40089",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40089"
},
{
"name": "CVE-2025-38584",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38584"
},
{
"name": "CVE-2025-38015",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38015"
},
{
"name": "CVE-2025-39675",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39675"
},
{
"name": "CVE-2025-39679",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39679"
},
{
"name": "CVE-2025-38527",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38527"
},
{
"name": "CVE-2025-38449",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38449"
},
{
"name": "CVE-2025-40233",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40233"
},
{
"name": "CVE-2025-40172",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40172"
},
{
"name": "CVE-2025-37853",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37853"
},
{
"name": "CVE-2025-38126",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38126"
},
{
"name": "CVE-2025-38149",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38149"
},
{
"name": "CVE-2025-39763",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39763"
},
{
"name": "CVE-2025-38399",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38399"
},
{
"name": "CVE-2025-40020",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40020"
},
{
"name": "CVE-2025-38065",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38065"
},
{
"name": "CVE-2025-38693",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38693"
},
{
"name": "CVE-2025-38679",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38679"
},
{
"name": "CVE-2025-38459",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38459"
},
{
"name": "CVE-2025-40188",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40188"
},
{
"name": "CVE-2025-40271",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40271"
},
{
"name": "CVE-2025-40291",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40291"
},
{
"name": "CVE-2025-38685",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38685"
},
{
"name": "CVE-2025-40359",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40359"
},
{
"name": "CVE-2025-38412",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38412"
},
{
"name": "CVE-2025-38031",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38031"
},
{
"name": "CVE-2025-40186",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40186"
},
{
"name": "CVE-2025-38293",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38293"
},
{
"name": "CVE-2025-40073",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40073"
},
{
"name": "CVE-2025-38648",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38648"
},
{
"name": "CVE-2025-38278",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38278"
},
{
"name": "CVE-2025-37764",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37764"
},
{
"name": "CVE-2025-38184",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38184"
},
{
"name": "CVE-2025-37741",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37741"
},
{
"name": "CVE-2025-38053",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38053"
},
{
"name": "CVE-2025-40242",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40242"
},
{
"name": "CVE-2025-37822",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37822"
},
{
"name": "CVE-2025-37912",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37912"
},
{
"name": "CVE-2025-38482",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38482"
},
{
"name": "CVE-2025-37820",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37820"
},
{
"name": "CVE-2025-68198",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68198"
},
{
"name": "CVE-2025-37985",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37985"
},
{
"name": "CVE-2025-68314",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68314"
},
{
"name": "CVE-2025-38634",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38634"
},
{
"name": "CVE-2025-40212",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40212"
},
{
"name": "CVE-2025-37787",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37787"
},
{
"name": "CVE-2025-38008",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38008"
},
{
"name": "CVE-2025-38458",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38458"
},
{
"name": "CVE-2025-39730",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39730"
},
{
"name": "CVE-2025-38011",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38011"
},
{
"name": "CVE-2025-68190",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68190"
},
{
"name": "CVE-2025-38034",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38034"
},
{
"name": "CVE-2025-40086",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40086"
},
{
"name": "CVE-2025-68242",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68242"
},
{
"name": "CVE-2025-38135",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38135"
},
{
"name": "CVE-2025-38619",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38619"
},
{
"name": "CVE-2025-40169",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40169"
},
{
"name": "CVE-2025-38312",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38312"
},
{
"name": "CVE-2025-38095",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38095"
},
{
"name": "CVE-2025-37878",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37878"
},
{
"name": "CVE-2025-39737",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39737"
},
{
"name": "CVE-2025-38464",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38464"
},
{
"name": "CVE-2025-40049",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40049"
},
{
"name": "CVE-2025-68322",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68322"
},
{
"name": "CVE-2025-38363",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38363"
},
{
"name": "CVE-2025-38702",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38702"
},
{
"name": "CVE-2025-38319",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38319"
},
{
"name": "CVE-2022-49698",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49698"
},
{
"name": "CVE-2025-40238",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40238"
},
{
"name": "CVE-2025-38724",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38724"
},
{
"name": "CVE-2025-68205",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68205"
},
{
"name": "CVE-2025-40277",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40277"
},
{
"name": "CVE-2025-40070",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40070"
},
{
"name": "CVE-2025-38250",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38250"
},
{
"name": "CVE-2025-38457",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38457"
},
{
"name": "CVE-2025-38582",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38582"
},
{
"name": "CVE-2025-37813",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37813"
},
{
"name": "CVE-2025-38543",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38543"
},
{
"name": "CVE-2025-38698",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38698"
},
{
"name": "CVE-2025-38212",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38212"
},
{
"name": "CVE-2025-40106",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40106"
},
{
"name": "CVE-2025-68174",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68174"
},
{
"name": "CVE-2025-38298",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38298"
},
{
"name": "CVE-2025-40272",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40272"
},
{
"name": "CVE-2025-39739",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39739"
},
{
"name": "CVE-2025-38024",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38024"
},
{
"name": "CVE-2025-40047",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40047"
},
{
"name": "CVE-2025-38496",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38496"
},
{
"name": "CVE-2025-38078",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38078"
},
{
"name": "CVE-2025-38419",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38419"
},
{
"name": "CVE-2025-40136",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40136"
},
{
"name": "CVE-2025-38533",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38533"
},
{
"name": "CVE-2025-40344",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40344"
},
{
"name": "CVE-2025-40205",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40205"
},
{
"name": "CVE-2025-40354",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40354"
},
{
"name": "CVE-2025-38169",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38169"
},
{
"name": "CVE-2025-37931",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37931"
},
{
"name": "CVE-2025-38511",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38511"
},
{
"name": "CVE-2025-38537",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38537"
},
{
"name": "CVE-2025-38546",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38546"
},
{
"name": "CVE-2025-38211",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38211"
},
{
"name": "CVE-2025-40033",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40033"
},
{
"name": "CVE-2025-38057",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38057"
},
{
"name": "CVE-2025-40122",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40122"
},
{
"name": "CVE-2025-68188",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68188"
},
{
"name": "CVE-2025-40269",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40269"
},
{
"name": "CVE-2025-37887",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37887"
},
{
"name": "CVE-2025-38077",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38077"
},
{
"name": "CVE-2025-38251",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38251"
},
{
"name": "CVE-2025-37861",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37861"
},
{
"name": "CVE-2025-68319",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68319"
},
{
"name": "CVE-2025-40119",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40119"
},
{
"name": "CVE-2025-38120",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38120"
},
{
"name": "CVE-2025-38285",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38285"
},
{
"name": "CVE-2025-39743",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39743"
},
{
"name": "CVE-2025-39718",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39718"
},
{
"name": "CVE-2025-37938",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37938"
},
{
"name": "CVE-2025-38005",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38005"
},
{
"name": "CVE-2025-38368",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38368"
},
{
"name": "CVE-2025-40075",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40075"
},
{
"name": "CVE-2025-38161",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38161"
},
{
"name": "CVE-2025-38331",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38331"
},
{
"name": "CVE-2025-38354",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38354"
},
{
"name": "CVE-2025-40138",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40138"
},
{
"name": "CVE-2025-38712",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38712"
},
{
"name": "CVE-2025-38732",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38732"
},
{
"name": "CVE-2025-39773",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39773"
},
{
"name": "CVE-2025-38696",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38696"
},
{
"name": "CVE-2025-40143",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40143"
},
{
"name": "CVE-2025-68189",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68189"
},
{
"name": "CVE-2025-38274",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38274"
},
{
"name": "CVE-2025-40076",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40076"
},
{
"name": "CVE-2025-40027",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40027"
},
{
"name": "CVE-2025-39885",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39885"
},
{
"name": "CVE-2025-68180",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68180"
},
{
"name": "CVE-2025-37874",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37874"
},
{
"name": "CVE-2025-38115",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38115"
},
{
"name": "CVE-2025-38632",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38632"
},
{
"name": "CVE-2025-37988",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37988"
},
{
"name": "CVE-2025-23158",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-23158"
},
{
"name": "CVE-2025-23144",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-23144"
},
{
"name": "CVE-2025-38153",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38153"
},
{
"name": "CVE-2025-37969",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37969"
},
{
"name": "CVE-2025-38548",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38548"
},
{
"name": "CVE-2025-37816",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37816"
},
{
"name": "CVE-2025-40362",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40362"
},
{
"name": "CVE-2025-37742",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37742"
},
{
"name": "CVE-2025-68201",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68201"
},
{
"name": "CVE-2025-40289",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40289"
},
{
"name": "CVE-2025-37765",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37765"
},
{
"name": "CVE-2025-38395",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38395"
},
{
"name": "CVE-2025-37921",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37921"
},
{
"name": "CVE-2025-38507",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38507"
},
{
"name": "CVE-2025-40230",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40230"
},
{
"name": "CVE-2025-39989",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39989"
},
{
"name": "CVE-2025-38337",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38337"
},
{
"name": "CVE-2025-38014",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38014"
},
{
"name": "CVE-2025-38258",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38258"
},
{
"name": "CVE-2025-37828",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37828"
},
{
"name": "CVE-2025-37769",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37769"
},
{
"name": "CVE-2025-38465",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38465"
},
{
"name": "CVE-2025-38513",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38513"
},
{
"name": "CVE-2025-39970",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39970"
},
{
"name": "CVE-2025-40292",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40292"
},
{
"name": "CVE-2025-38086",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38086"
},
{
"name": "CVE-2025-68181",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68181"
},
{
"name": "CVE-2025-37935",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37935"
},
{
"name": "CVE-2025-40032",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40032"
},
{
"name": "CVE-2025-38396",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38396"
},
{
"name": "CVE-2025-23161",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-23161"
},
{
"name": "CVE-2025-38407",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38407"
},
{
"name": "CVE-2025-39994",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39994"
},
{
"name": "CVE-2025-38493",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38493"
},
{
"name": "CVE-2025-37803",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37803"
},
{
"name": "CVE-2025-40228",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40228"
},
{
"name": "CVE-2025-40150",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40150"
},
{
"name": "CVE-2025-38670",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38670"
},
{
"name": "CVE-2025-39732",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39732"
},
{
"name": "CVE-2025-37824",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37824"
},
{
"name": "CVE-2025-40274",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40274"
},
{
"name": "CVE-2025-38602",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38602"
},
{
"name": "CVE-2025-38003",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38003"
},
{
"name": "CVE-2025-38441",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38441"
},
{
"name": "CVE-2025-40206",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40206"
},
{
"name": "CVE-2025-40218",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40218"
},
{
"name": "CVE-2025-38007",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38007"
},
{
"name": "CVE-2025-37923",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37923"
},
{
"name": "CVE-2025-40088",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40088"
},
{
"name": "CVE-2025-40220",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40220"
},
{
"name": "CVE-2025-38142",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38142"
},
{
"name": "CVE-2025-37739",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37739"
},
{
"name": "CVE-2025-38478",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38478"
},
{
"name": "CVE-2025-38568",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38568"
},
{
"name": "CVE-2025-38583",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38583"
},
{
"name": "CVE-2025-39788",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39788"
},
{
"name": "CVE-2025-22058",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22058"
},
{
"name": "CVE-2025-37831",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37831"
},
{
"name": "CVE-2025-38499",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38499"
},
{
"name": "CVE-2025-68312",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68312"
},
{
"name": "CVE-2025-40062",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40062"
},
{
"name": "CVE-2025-68194",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68194"
},
{
"name": "CVE-2025-38269",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38269"
},
{
"name": "CVE-2025-38079",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38079"
},
{
"name": "CVE-2025-37940",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37940"
},
{
"name": "CVE-2025-40336",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40336"
},
{
"name": "CVE-2025-37945",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37945"
},
{
"name": "CVE-2025-40067",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40067"
},
{
"name": "CVE-2025-40109",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40109"
},
{
"name": "CVE-2025-40101",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40101"
},
{
"name": "CVE-2025-38735",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38735"
},
{
"name": "CVE-2025-40006",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40006"
},
{
"name": "CVE-2025-68251",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68251"
},
{
"name": "CVE-2025-38652",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38652"
},
{
"name": "CVE-2025-38110",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38110"
},
{
"name": "CVE-2025-38422",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38422"
},
{
"name": "CVE-2025-38402",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38402"
},
{
"name": "CVE-2025-39698",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39698"
},
{
"name": "CVE-2025-40038",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40038"
},
{
"name": "CVE-2025-37915",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37915"
},
{
"name": "CVE-2025-68183",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68183"
},
{
"name": "CVE-2025-23146",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-23146"
},
{
"name": "CVE-2025-37903",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37903"
},
{
"name": "CVE-2025-40353",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40353"
},
{
"name": "CVE-2025-40222",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40222"
},
{
"name": "CVE-2025-23142",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-23142"
},
{
"name": "CVE-2025-37738",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37738"
},
{
"name": "CVE-2025-40011",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40011"
},
{
"name": "CVE-2025-38303",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38303"
},
{
"name": "CVE-2025-38074",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38074"
},
{
"name": "CVE-2025-40085",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40085"
},
{
"name": "CVE-2025-38119",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38119"
},
{
"name": "CVE-2025-38232",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38232"
},
{
"name": "CVE-2025-38245",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38245"
},
{
"name": "CVE-2025-40184",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40184"
},
{
"name": "CVE-2025-68244",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68244"
},
{
"name": "CVE-2025-40231",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40231"
},
{
"name": "CVE-2025-38324",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38324"
},
{
"name": "CVE-2025-40278",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40278"
},
{
"name": "CVE-2025-38018",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38018"
},
{
"name": "CVE-2025-40176",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40176"
},
{
"name": "CVE-2025-40342",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40342"
},
{
"name": "CVE-2025-37830",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37830"
},
{
"name": "CVE-2025-38614",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38614"
},
{
"name": "CVE-2025-37991",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37991"
},
{
"name": "CVE-2025-38425",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38425"
},
{
"name": "CVE-2025-40210",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40210"
},
{
"name": "CVE-2025-37978",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37978"
},
{
"name": "CVE-2025-37781",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37781"
},
{
"name": "CVE-2025-38210",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38210"
},
{
"name": "CVE-2025-38542",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38542"
},
{
"name": "CVE-2025-38664",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38664"
},
{
"name": "CVE-2025-38344",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38344"
},
{
"name": "CVE-2025-23145",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-23145"
},
{
"name": "CVE-2025-23143",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-23143"
},
{
"name": "CVE-2025-38322",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38322"
},
{
"name": "CVE-2025-38088",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38088"
},
{
"name": "CVE-2025-23141",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-23141"
},
{
"name": "CVE-2025-40193",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40193"
},
{
"name": "CVE-2025-37823",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37823"
},
{
"name": "CVE-2025-38332",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38332"
},
{
"name": "CVE-2025-40148",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40148"
},
{
"name": "CVE-2025-40326",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40326"
},
{
"name": "CVE-2025-38386",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38386"
},
{
"name": "CVE-2025-40279",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40279"
},
{
"name": "CVE-2025-38385",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38385"
},
{
"name": "CVE-2025-40201",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40201"
},
{
"name": "CVE-2025-37952",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37952"
},
{
"name": "CVE-2025-38694",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38694"
},
{
"name": "CVE-2025-37793",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37793"
},
{
"name": "CVE-2025-40084",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40084"
},
{
"name": "CVE-2025-68311",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68311"
},
{
"name": "CVE-2025-37740",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37740"
},
{
"name": "CVE-2025-38676",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38676"
},
{
"name": "CVE-2025-38530",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38530"
},
{
"name": "CVE-2025-38174",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38174"
},
{
"name": "CVE-2025-37826",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37826"
},
{
"name": "CVE-2025-37986",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37986"
},
{
"name": "CVE-2025-37829",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37829"
},
{
"name": "CVE-2025-68320",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68320"
},
{
"name": "CVE-2025-40341",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40341"
},
{
"name": "CVE-2025-38409",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38409"
},
{
"name": "CVE-2025-40199",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40199"
},
{
"name": "CVE-2025-40183",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40183"
},
{
"name": "CVE-2025-38019",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38019"
},
{
"name": "CVE-2025-38729",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38729"
},
{
"name": "CVE-2025-68172",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68172"
},
{
"name": "CVE-2025-23151",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-23151"
},
{
"name": "CVE-2025-38037",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38037"
},
{
"name": "CVE-2025-39998",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39998"
},
{
"name": "CVE-2025-40338",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40338"
},
{
"name": "CVE-2025-40195",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40195"
},
{
"name": "CVE-2025-37796",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37796"
},
{
"name": "CVE-2025-37962",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37962"
},
{
"name": "CVE-2025-40134",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40134"
},
{
"name": "CVE-2025-38681",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38681"
},
{
"name": "CVE-2025-37799",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37799"
},
{
"name": "CVE-2025-38593",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38593"
},
{
"name": "CVE-2025-39968",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39968"
},
{
"name": "CVE-2025-38342",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38342"
},
{
"name": "CVE-2025-39795",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39795"
},
{
"name": "CVE-2025-37801",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37801"
},
{
"name": "CVE-2025-38167",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38167"
},
{
"name": "CVE-2025-37883",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37883"
},
{
"name": "CVE-2025-40302",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40302"
},
{
"name": "CVE-2025-37863",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37863"
},
{
"name": "CVE-2025-37901",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37901"
},
{
"name": "CVE-2025-38687",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38687"
},
{
"name": "CVE-2025-40358",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40358"
},
{
"name": "CVE-2025-37811",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37811"
},
{
"name": "CVE-2025-40165",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40165"
},
{
"name": "CVE-2025-38257",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38257"
},
{
"name": "CVE-2025-68318",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68318"
},
{
"name": "CVE-2025-37864",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37864"
},
{
"name": "CVE-2025-38307",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38307"
},
{
"name": "CVE-2025-40161",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40161"
},
{
"name": "CVE-2025-40357",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40357"
},
{
"name": "CVE-2025-40328",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40328"
},
{
"name": "CVE-2025-37916",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37916"
},
{
"name": "CVE-2025-40340",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40340"
},
{
"name": "CVE-2025-38111",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38111"
},
{
"name": "CVE-2025-39986",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39986"
},
{
"name": "CVE-2025-37767",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37767"
},
{
"name": "CVE-2025-40283",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40283"
},
{
"name": "CVE-2025-39955",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39955"
},
{
"name": "CVE-2025-40324",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40324"
},
{
"name": "CVE-2025-37989",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37989"
},
{
"name": "CVE-2025-38529",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38529"
},
{
"name": "CVE-2025-40131",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40131"
},
{
"name": "CVE-2025-40146",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40146"
},
{
"name": "CVE-2025-38326",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38326"
},
{
"name": "CVE-2025-40177",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40177"
},
{
"name": "CVE-2025-38055",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38055"
},
{
"name": "CVE-2025-38129",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38129"
},
{
"name": "CVE-2025-38384",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38384"
},
{
"name": "CVE-2025-38334",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38334"
},
{
"name": "CVE-2025-38728",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38728"
},
{
"name": "CVE-2025-38424",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38424"
},
{
"name": "CVE-2025-38430",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38430"
},
{
"name": "CVE-2025-38715",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38715"
},
{
"name": "CVE-2025-39734",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39734"
},
{
"name": "CVE-2025-38089",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38089"
},
{
"name": "CVE-2025-40226",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40226"
},
{
"name": "CVE-2025-40078",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40078"
},
{
"name": "CVE-2025-38382",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38382"
},
{
"name": "CVE-2025-40074",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40074"
},
{
"name": "CVE-2025-38608",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38608"
},
{
"name": "CVE-2025-40321",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40321"
},
{
"name": "CVE-2025-38650",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38650"
},
{
"name": "CVE-2025-40069",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40069"
},
{
"name": "CVE-2025-39710",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39710"
},
{
"name": "CVE-2025-40116",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40116"
},
{
"name": "CVE-2025-68249",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68249"
},
{
"name": "CVE-2025-38124",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38124"
},
{
"name": "CVE-2025-39934",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39934"
},
{
"name": "CVE-2025-37925",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37925"
},
{
"name": "CVE-2025-40158",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40158"
},
{
"name": "CVE-2025-39683",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39683"
},
{
"name": "CVE-2025-38420",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38420"
},
{
"name": "CVE-2025-38071",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38071"
},
{
"name": "CVE-2025-40327",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40327"
},
{
"name": "CVE-2025-40130",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40130"
},
{
"name": "CVE-2025-40179",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40179"
},
{
"name": "CVE-2025-37972",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37972"
},
{
"name": "CVE-2025-38183",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38183"
},
{
"name": "CVE-2025-40127",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40127"
},
{
"name": "CVE-2025-37768",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37768"
},
{
"name": "CVE-2025-40282",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40282"
},
{
"name": "CVE-2025-39794",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39794"
},
{
"name": "CVE-2025-38160",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38160"
},
{
"name": "CVE-2025-37984",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37984"
},
{
"name": "CVE-2025-38528",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38528"
},
{
"name": "CVE-2025-39996",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39996"
},
{
"name": "CVE-2025-40168",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40168"
},
{
"name": "CVE-2025-37856",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37856"
},
{
"name": "CVE-2025-38107",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38107"
},
{
"name": "CVE-2025-38292",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38292"
},
{
"name": "CVE-2025-40053",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40053"
},
{
"name": "CVE-2025-38085",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38085"
},
{
"name": "CVE-2025-38222",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38222"
},
{
"name": "CVE-2025-38010",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38010"
},
{
"name": "CVE-2025-38197",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38197"
},
{
"name": "CVE-2025-39951",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39951"
},
{
"name": "CVE-2025-38468",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38468"
},
{
"name": "CVE-2025-40120",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40120"
},
{
"name": "CVE-2025-40185",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40185"
},
{
"name": "CVE-2025-38688",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38688"
},
{
"name": "CVE-2025-38333",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38333"
},
{
"name": "CVE-2025-40295",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40295"
},
{
"name": "CVE-2025-68192",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68192"
},
{
"name": "CVE-2025-37970",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37970"
},
{
"name": "CVE-2025-21884",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21884"
},
{
"name": "CVE-2025-37905",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37905"
},
{
"name": "CVE-2025-38390",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38390"
},
{
"name": "CVE-2025-38013",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38013"
},
{
"name": "CVE-2025-40098",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40098"
},
{
"name": "CVE-2025-38059",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38059"
},
{
"name": "CVE-2025-38713",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38713"
},
{
"name": "CVE-2025-37956",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37956"
},
{
"name": "CVE-2025-40243",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40243"
},
{
"name": "CVE-2025-40196",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40196"
},
{
"name": "CVE-2025-38148",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38148"
},
{
"name": "CVE-2025-40129",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40129"
},
{
"name": "CVE-2025-38467",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38467"
},
{
"name": "CVE-2025-38117",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38117"
},
{
"name": "CVE-2025-38094",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38094"
},
{
"name": "CVE-2025-68171",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68171"
},
{
"name": "CVE-2025-38072",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38072"
},
{
"name": "CVE-2025-37967",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37967"
},
{
"name": "CVE-2025-40301",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40301"
},
{
"name": "CVE-2025-38300",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38300"
},
{
"name": "CVE-2025-40040",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40040"
},
{
"name": "CVE-2025-38289",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38289"
},
{
"name": "CVE-2025-39782",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39782"
},
{
"name": "CVE-2025-68207",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68207"
},
{
"name": "CVE-2025-40066",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40066"
},
{
"name": "CVE-2025-38075",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38075"
},
{
"name": "CVE-2025-37885",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37885"
},
{
"name": "CVE-2025-38697",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38697"
},
{
"name": "CVE-2025-37949",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37949"
},
{
"name": "CVE-2025-68167",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68167"
},
{
"name": "CVE-2025-38691",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38691"
},
{
"name": "CVE-2025-40207",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40207"
},
{
"name": "CVE-2025-38373",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38373"
},
{
"name": "CVE-2025-38489",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38489"
},
{
"name": "CVE-2025-40095",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40095"
},
{
"name": "CVE-2025-37957",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37957"
},
{
"name": "CVE-2025-38058",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38058"
},
{
"name": "CVE-2025-38483",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38483"
},
{
"name": "CVE-2025-38369",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38369"
},
{
"name": "CVE-2025-39759",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39759"
},
{
"name": "CVE-2025-38639",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38639"
},
{
"name": "CVE-2025-38122",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38122"
},
{
"name": "CVE-2025-38612",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38612"
},
{
"name": "CVE-2025-40299",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40299"
},
{
"name": "CVE-2025-38173",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38173"
},
{
"name": "CVE-2025-40286",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40286"
},
{
"name": "CVE-2025-38143",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38143"
},
{
"name": "CVE-2025-38098",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38098"
},
{
"name": "CVE-2025-40091",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40091"
},
{
"name": "CVE-2025-40318",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40318"
},
{
"name": "CVE-2025-38566",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38566"
},
{
"name": "CVE-2025-39721",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39721"
},
{
"name": "CVE-2025-68241",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68241"
},
{
"name": "CVE-2025-39760",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39760"
},
{
"name": "CVE-2025-40118",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40118"
},
{
"name": "CVE-2025-38718",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38718"
},
{
"name": "CVE-2025-38392",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38392"
},
{
"name": "CVE-2025-39673",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39673"
},
{
"name": "CVE-2025-38259",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38259"
},
{
"name": "CVE-2025-38663",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38663"
},
{
"name": "CVE-2025-40021",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40021"
},
{
"name": "CVE-2025-40135",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40135"
},
{
"name": "CVE-2025-38156",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38156"
},
{
"name": "CVE-2025-37951",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37951"
},
{
"name": "CVE-2025-37840",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37840"
},
{
"name": "CVE-2025-68253",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68253"
},
{
"name": "CVE-2025-68734",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68734"
},
{
"name": "CVE-2025-39993",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39993"
},
{
"name": "CVE-2025-37947",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37947"
},
{
"name": "CVE-2025-38416",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38416"
},
{
"name": "CVE-2025-37846",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37846"
},
{
"name": "CVE-2025-38722",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38722"
},
{
"name": "CVE-2025-38192",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38192"
},
{
"name": "CVE-2025-39800",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39800"
},
{
"name": "CVE-2025-40044",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40044"
},
{
"name": "CVE-2025-38343",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38343"
},
{
"name": "CVE-2025-40105",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40105"
},
{
"name": "CVE-2025-38202",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38202"
},
{
"name": "CVE-2025-40050",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40050"
},
{
"name": "CVE-2025-40072",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40072"
},
{
"name": "CVE-2025-40112",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40112"
},
{
"name": "CVE-2025-40079",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40079"
},
{
"name": "CVE-2025-22101",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22101"
},
{
"name": "CVE-2025-38374",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38374"
},
{
"name": "CVE-2025-39703",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39703"
},
{
"name": "CVE-2025-38194",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38194"
},
{
"name": "CVE-2025-68182",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68182"
},
{
"name": "CVE-2025-38549",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38549"
},
{
"name": "CVE-2025-40310",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40310"
},
{
"name": "CVE-2025-38665",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38665"
},
{
"name": "CVE-2025-38101",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38101"
},
{
"name": "CVE-2025-37982",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37982"
},
{
"name": "CVE-2025-37992",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37992"
},
{
"name": "CVE-2025-38577",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38577"
},
{
"name": "CVE-2025-38671",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38671"
},
{
"name": "CVE-2025-68317",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68317"
},
{
"name": "CVE-2025-39971",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39971"
},
{
"name": "CVE-2025-38299",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38299"
},
{
"name": "CVE-2025-40154",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40154"
},
{
"name": "CVE-2025-40331",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40331"
},
{
"name": "CVE-2025-38635",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38635"
},
{
"name": "CVE-2025-38704",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38704"
},
{
"name": "CVE-2025-38348",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38348"
},
{
"name": "CVE-2025-40270",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40270"
},
{
"name": "CVE-2025-40191",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40191"
},
{
"name": "CVE-2025-38488",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38488"
},
{
"name": "CVE-2025-40189",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40189"
},
{
"name": "CVE-2025-40093",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40093"
},
{
"name": "CVE-2025-38540",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38540"
},
{
"name": "CVE-2025-38040",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38040"
},
{
"name": "CVE-2025-38265",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38265"
},
{
"name": "CVE-2025-23149",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-23149"
},
{
"name": "CVE-2025-38403",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38403"
},
{
"name": "CVE-2025-21726",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21726"
},
{
"name": "CVE-2025-38552",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38552"
},
{
"name": "CVE-2025-40335",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40335"
},
{
"name": "CVE-2025-40149",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40149"
},
{
"name": "CVE-2025-37914",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37914"
},
{
"name": "CVE-2025-40164",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40164"
},
{
"name": "CVE-2025-37873",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37873"
},
{
"name": "CVE-2025-37928",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37928"
},
{
"name": "CVE-2025-40267",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40267"
},
{
"name": "CVE-2025-40235",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40235"
},
{
"name": "CVE-2025-39766",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39766"
},
{
"name": "CVE-2025-39801",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39801"
},
{
"name": "CVE-2025-37922",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37922"
},
{
"name": "CVE-2025-38146",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38146"
},
{
"name": "CVE-2025-68208",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68208"
},
{
"name": "CVE-2025-39724",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39724"
},
{
"name": "CVE-2025-39687",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39687"
},
{
"name": "CVE-2025-37794",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37794"
},
{
"name": "CVE-2025-38510",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38510"
},
{
"name": "CVE-2025-38246",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38246"
},
{
"name": "CVE-2025-39758",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39758"
},
{
"name": "CVE-2025-39694",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39694"
},
{
"name": "CVE-2025-38220",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38220"
},
{
"name": "CVE-2025-38405",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38405"
},
{
"name": "CVE-2025-38418",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38418"
},
{
"name": "CVE-2025-40352",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40352"
},
{
"name": "CVE-2025-38090",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38090"
},
{
"name": "CVE-2025-38429",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38429"
},
{
"name": "CVE-2025-38225",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38225"
},
{
"name": "CVE-2025-40280",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40280"
},
{
"name": "CVE-2025-38155",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38155"
},
{
"name": "CVE-2025-40099",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40099"
},
{
"name": "CVE-2025-71162",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71162"
},
{
"name": "CVE-2025-37977",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37977"
},
{
"name": "CVE-2025-38365",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38365"
},
{
"name": "CVE-2025-38415",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38415"
},
{
"name": "CVE-2025-40031",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40031"
},
{
"name": "CVE-2025-40180",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40180"
},
{
"name": "CVE-2025-40293",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40293"
},
{
"name": "CVE-2025-38668",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38668"
},
{
"name": "CVE-2025-37973",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37973"
},
{
"name": "CVE-2025-40330",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40330"
},
{
"name": "CVE-2025-68750",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68750"
},
{
"name": "CVE-2025-38260",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38260"
},
{
"name": "CVE-2025-37827",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37827"
},
{
"name": "CVE-2025-38721",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38721"
},
{
"name": "CVE-2025-38244",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38244"
},
{
"name": "CVE-2025-38080",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38080"
},
{
"name": "CVE-2025-40126",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40126"
},
{
"name": "CVE-2025-39972",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39972"
},
{
"name": "CVE-2025-37748",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37748"
},
{
"name": "CVE-2025-38364",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38364"
},
{
"name": "CVE-2025-38615",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38615"
},
{
"name": "CVE-2025-39684",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39684"
},
{
"name": "CVE-2025-37836",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37836"
},
{
"name": "CVE-2025-38526",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38526"
},
{
"name": "CVE-2025-38472",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38472"
},
{
"name": "CVE-2025-37944",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37944"
},
{
"name": "CVE-2025-38506",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38506"
},
{
"name": "CVE-2025-40320",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40320"
},
{
"name": "CVE-2025-38703",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38703"
},
{
"name": "CVE-2025-38494",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38494"
},
{
"name": "CVE-2025-39753",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39753"
},
{
"name": "CVE-2025-38604",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38604"
},
{
"name": "CVE-2025-40203",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40203"
},
{
"name": "CVE-2025-38623",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38623"
},
{
"name": "CVE-2025-38193",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38193"
},
{
"name": "CVE-2025-38400",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38400"
},
{
"name": "CVE-2025-38136",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38136"
},
{
"name": "CVE-2025-40192",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40192"
},
{
"name": "CVE-2025-38544",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38544"
},
{
"name": "CVE-2025-37771",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37771"
},
{
"name": "CVE-2025-39797",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39797"
},
{
"name": "CVE-2025-40200",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40200"
},
{
"name": "CVE-2025-38236",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38236"
},
{
"name": "CVE-2025-38725",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38725"
},
{
"name": "CVE-2025-37975",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37975"
},
{
"name": "CVE-2025-40124",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40124"
},
{
"name": "CVE-2025-38347",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38347"
},
{
"name": "CVE-2025-39776",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39776"
},
{
"name": "CVE-2025-39880",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39880"
},
{
"name": "CVE-2025-37998",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37998"
},
{
"name": "CVE-2025-38198",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38198"
},
{
"name": "CVE-2025-23163",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-23163"
},
{
"name": "CVE-2025-40094",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40094"
},
{
"name": "CVE-2025-37968",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37968"
},
{
"name": "CVE-2025-38376",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38376"
},
{
"name": "CVE-2025-38006",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38006"
},
{
"name": "CVE-2025-40102",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40102"
},
{
"name": "CVE-2025-40170",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40170"
},
{
"name": "CVE-2025-38437",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38437"
},
{
"name": "CVE-2025-40160",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40160"
},
{
"name": "CVE-2025-40284",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40284"
},
{
"name": "CVE-2025-38125",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38125"
},
{
"name": "CVE-2025-40209",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40209"
},
{
"name": "CVE-2025-40077",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40077"
},
{
"name": "CVE-2025-38351",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38351"
},
{
"name": "CVE-2025-38048",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38048"
},
{
"name": "CVE-2025-40071",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40071"
},
{
"name": "CVE-2025-38683",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38683"
},
{
"name": "CVE-2025-40113",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40113"
},
{
"name": "CVE-2025-39736",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39736"
},
{
"name": "CVE-2025-40234",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40234"
},
{
"name": "CVE-2025-37757",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37757"
},
{
"name": "CVE-2025-68247",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68247"
},
{
"name": "CVE-2025-40305",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40305"
},
{
"name": "CVE-2025-40080",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40080"
},
{
"name": "CVE-2025-38009",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38009"
},
{
"name": "CVE-2025-40215",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40215"
},
{
"name": "CVE-2025-40307",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40307"
},
{
"name": "CVE-2025-40111",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40111"
},
{
"name": "CVE-2025-38081",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38081"
},
{
"name": "CVE-2025-37809",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37809"
},
{
"name": "CVE-2024-36350",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36350"
},
{
"name": "CVE-2025-40211",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40211"
},
{
"name": "CVE-2025-40068",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40068"
},
{
"name": "CVE-2025-38185",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38185"
},
{
"name": "CVE-2025-39691",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39691"
},
{
"name": "CVE-2025-38406",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38406"
},
{
"name": "CVE-2025-68315",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68315"
},
{
"name": "CVE-2025-40163",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40163"
},
{
"name": "CVE-2025-40042",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40042"
},
{
"name": "CVE-2025-37817",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37817"
},
{
"name": "CVE-2025-40155",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40155"
},
{
"name": "CVE-2025-39890",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39890"
},
{
"name": "CVE-2025-39742",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39742"
},
{
"name": "CVE-2025-40217",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40217"
},
{
"name": "CVE-2025-22102",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22102"
},
{
"name": "CVE-2025-37987",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37987"
},
{
"name": "CVE-2025-37749",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37749"
},
{
"name": "CVE-2024-36331",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36331"
},
{
"name": "CVE-2025-39748",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39748"
},
{
"name": "CVE-2025-40133",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40133"
},
{
"name": "CVE-2025-38263",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38263"
},
{
"name": "CVE-2025-38610",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38610"
},
{
"name": "CVE-2025-37772",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37772"
},
{
"name": "CVE-2025-38214",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38214"
},
{
"name": "CVE-2025-38560",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38560"
},
{
"name": "CVE-2025-37994",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37994"
},
{
"name": "CVE-2025-38551",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38551"
},
{
"name": "CVE-2025-38701",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38701"
},
{
"name": "CVE-2025-38218",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38218"
},
{
"name": "CVE-2025-40329",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40329"
},
{
"name": "CVE-2025-38349",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38349"
},
{
"name": "CVE-2025-39726",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39726"
},
{
"name": "CVE-2025-38393",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38393"
},
{
"name": "CVE-2025-37891",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37891"
},
{
"name": "CVE-2025-38249",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38249"
},
{
"name": "CVE-2025-38716",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38716"
},
{
"name": "CVE-2025-39937",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39937"
},
{
"name": "CVE-2025-37858",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37858"
},
{
"name": "CVE-2025-38154",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38154"
},
{
"name": "CVE-2025-38469",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38469"
},
{
"name": "CVE-2025-38581",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38581"
},
{
"name": "CVE-2025-40034",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40034"
},
{
"name": "CVE-2025-40060",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40060"
},
{
"name": "CVE-2025-39790",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39790"
},
{
"name": "CVE-2025-38389",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38389"
},
{
"name": "CVE-2025-38448",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38448"
},
{
"name": "CVE-2025-37780",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37780"
},
{
"name": "CVE-2025-37995",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37995"
},
{
"name": "CVE-2025-38680",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38680"
},
{
"name": "CVE-2025-37754",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37754"
},
{
"name": "CVE-2025-40059",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40059"
},
{
"name": "CVE-2025-38497",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38497"
},
{
"name": "CVE-2025-68168",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68168"
},
{
"name": "CVE-2025-23156",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-23156"
},
{
"name": "CVE-2025-23157",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-23157"
},
{
"name": "CVE-2025-68206",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68206"
},
{
"name": "CVE-2025-68309",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68309"
},
{
"name": "CVE-2025-38684",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38684"
},
{
"name": "CVE-2025-38165",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38165"
},
{
"name": "CVE-2025-40003",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40003"
},
{
"name": "CVE-2025-39686",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39686"
},
{
"name": "CVE-2025-39798",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39798"
},
{
"name": "CVE-2025-38495",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38495"
},
{
"name": "CVE-2025-37808",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37808"
},
{
"name": "CVE-2025-38730",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38730"
},
{
"name": "CVE-2025-38052",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38052"
},
{
"name": "CVE-2025-38377",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38377"
},
{
"name": "CVE-2025-40175",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40175"
},
{
"name": "CVE-2025-68170",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68170"
},
{
"name": "CVE-2025-39747",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39747"
},
{
"name": "CVE-2025-68313",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68313"
},
{
"name": "CVE-2025-38516",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38516"
},
{
"name": "CVE-2025-38462",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38462"
},
{
"name": "CVE-2025-38428",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38428"
},
{
"name": "CVE-2025-39714",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39714"
},
{
"name": "CVE-2025-38262",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38262"
},
{
"name": "CVE-2025-38138",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38138"
},
{
"name": "CVE-2025-38035",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38035"
},
{
"name": "CVE-2025-37759",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37759"
},
{
"name": "CVE-2025-38414",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38414"
},
{
"name": "CVE-2025-68197",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68197"
},
{
"name": "CVE-2025-40123",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40123"
},
{
"name": "CVE-2025-37933",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37933"
},
{
"name": "CVE-2025-38310",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38310"
},
{
"name": "CVE-2025-37886",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37886"
},
{
"name": "CVE-2025-37963",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37963"
},
{
"name": "CVE-2025-40297",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40297"
},
{
"name": "CVE-2025-38226",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38226"
},
{
"name": "CVE-2025-39706",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39706"
},
{
"name": "CVE-2025-40178",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40178"
},
{
"name": "CVE-2025-40363",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40363"
},
{
"name": "CVE-2025-38443",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38443"
},
{
"name": "CVE-2025-38576",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38576"
},
{
"name": "CVE-2025-39869",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39869"
},
{
"name": "CVE-2025-37800",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37800"
},
{
"name": "CVE-2025-39985",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39985"
},
{
"name": "CVE-2025-40276",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40276"
},
{
"name": "CVE-2025-37900",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37900"
},
{
"name": "CVE-2025-40224",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40224"
},
{
"name": "CVE-2025-38439",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38439"
},
{
"name": "CVE-2025-37805",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37805"
},
{
"name": "CVE-2025-68245",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68245"
},
{
"name": "CVE-2025-39719",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39719"
},
{
"name": "CVE-2025-40317",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40317"
},
{
"name": "CVE-2025-40236",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40236"
},
{
"name": "CVE-2025-37990",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37990"
},
{
"name": "CVE-2025-38553",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38553"
},
{
"name": "CVE-2025-38190",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38190"
},
{
"name": "CVE-2025-38180",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38180"
},
{
"name": "CVE-2025-39738",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39738"
},
{
"name": "CVE-2025-68202",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68202"
},
{
"name": "CVE-2025-38145",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38145"
},
{
"name": "CVE-2025-40174",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40174"
},
{
"name": "CVE-2025-37948",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37948"
},
{
"name": "CVE-2025-38166",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38166"
},
{
"name": "CVE-2025-40227",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40227"
},
{
"name": "CVE-2025-37862",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37862"
},
{
"name": "CVE-2025-38321",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38321"
},
{
"name": "CVE-2025-39705",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39705"
},
{
"name": "CVE-2025-40316",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40316"
},
{
"name": "CVE-2025-37960",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37960"
},
{
"name": "CVE-2025-38045",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38045"
},
{
"name": "CVE-2025-38051",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38051"
},
{
"name": "CVE-2025-39713",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39713"
},
{
"name": "CVE-2025-37763",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37763"
},
{
"name": "CVE-2025-37954",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37954"
},
{
"name": "CVE-2025-22128",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22128"
},
{
"name": "CVE-2025-40065",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40065"
},
{
"name": "CVE-2025-37839",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37839"
},
{
"name": "CVE-2025-39744",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39744"
},
{
"name": "CVE-2025-38277",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38277"
},
{
"name": "CVE-2025-37913",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37913"
},
{
"name": "CVE-2025-68177",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68177"
},
{
"name": "CVE-2025-39756",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39756"
},
{
"name": "CVE-2025-38539",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38539"
},
{
"name": "CVE-2025-40181",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40181"
},
{
"name": "CVE-2025-68191",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68191"
},
{
"name": "CVE-2025-38044",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38044"
},
{
"name": "CVE-2025-68250",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68250"
},
{
"name": "CVE-2025-37786",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37786"
},
{
"name": "CVE-2025-40141",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40141"
},
{
"name": "CVE-2025-38200",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38200"
},
{
"name": "CVE-2025-38480",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38480"
},
{
"name": "CVE-2025-40132",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40132"
},
{
"name": "CVE-2025-38346",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38346"
},
{
"name": "CVE-2025-40152",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40152"
},
{
"name": "CVE-2025-37959",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37959"
},
{
"name": "CVE-2025-38191",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38191"
},
{
"name": "CVE-2025-39946",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39946"
},
{
"name": "CVE-2025-38062",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38062"
},
{
"name": "CVE-2025-38531",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38531"
},
{
"name": "CVE-2025-40288",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40288"
},
{
"name": "CVE-2025-68239",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68239"
},
{
"name": "CVE-2025-39693",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39693"
},
{
"name": "CVE-2025-40281",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40281"
},
{
"name": "CVE-2025-68185",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68185"
},
{
"name": "CVE-2025-40304",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40304"
},
{
"name": "CVE-2025-38503",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38503"
},
{
"name": "CVE-2025-40110",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40110"
},
{
"name": "CVE-2025-40162",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40162"
},
{
"name": "CVE-2025-38630",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38630"
},
{
"name": "CVE-2025-38131",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38131"
},
{
"name": "CVE-2025-40268",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40268"
},
{
"name": "CVE-2025-39980",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39980"
},
{
"name": "CVE-2025-37851",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37851"
},
{
"name": "CVE-2025-38481",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38481"
},
{
"name": "CVE-2025-38585",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38585"
},
{
"name": "CVE-2025-38320",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38320"
},
{
"name": "CVE-2025-38625",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38625"
},
{
"name": "CVE-2025-38164",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38164"
},
{
"name": "CVE-2025-40303",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40303"
},
{
"name": "CVE-2025-68178",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68178"
},
{
"name": "CVE-2025-40337",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40337"
},
{
"name": "CVE-2025-40346",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40346"
},
{
"name": "CVE-2025-38264",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38264"
},
{
"name": "CVE-2025-40036",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40036"
},
{
"name": "CVE-2025-39676",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39676"
},
{
"name": "CVE-2025-40241",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40241"
},
{
"name": "CVE-2025-37980",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37980"
},
{
"name": "CVE-2025-38280",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38280"
},
{
"name": "CVE-2025-37788",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37788"
},
{
"name": "CVE-2025-38427",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38427"
},
{
"name": "CVE-2025-38084",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38084"
},
{
"name": "CVE-2025-40046",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40046"
},
{
"name": "CVE-2025-37879",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37879"
},
{
"name": "CVE-2025-38217",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38217"
},
{
"name": "CVE-2025-40030",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40030"
},
{
"name": "CVE-2025-40244",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40244"
},
{
"name": "CVE-2025-37881",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37881"
},
{
"name": "CVE-2025-39995",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39995"
},
{
"name": "CVE-2025-38103",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38103"
},
{
"name": "CVE-2025-38514",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38514"
},
{
"name": "CVE-2025-39783",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39783"
},
{
"name": "CVE-2025-39715",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39715"
},
{
"name": "CVE-2025-40323",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40323"
},
{
"name": "CVE-2025-38569",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38569"
},
{
"name": "CVE-2025-38255",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38255"
},
{
"name": "CVE-2025-38512",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38512"
},
{
"name": "CVE-2025-40096",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40096"
},
{
"name": "CVE-2025-38622",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38622"
},
{
"name": "CVE-2025-37909",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37909"
},
{
"name": "CVE-2025-38700",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38700"
},
{
"name": "CVE-2025-37849",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37849"
},
{
"name": "CVE-2025-38162",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38162"
},
{
"name": "CVE-2025-38532",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38532"
},
{
"name": "CVE-2025-39712",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39712"
},
{
"name": "CVE-2025-37812",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37812"
},
{
"name": "CVE-2025-39707",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39707"
},
{
"name": "CVE-2025-40275",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40275"
},
{
"name": "CVE-2025-37875",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37875"
},
{
"name": "CVE-2025-38410",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38410"
},
{
"name": "CVE-2025-39907",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39907"
},
{
"name": "CVE-2025-40182",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40182"
},
{
"name": "CVE-2025-68211",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68211"
},
{
"name": "CVE-2025-39781",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39781"
},
{
"name": "CVE-2025-38640",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38640"
},
{
"name": "CVE-2025-38476",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38476"
},
{
"name": "CVE-2025-38659",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38659"
},
{
"name": "CVE-2025-40339",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40339"
},
{
"name": "CVE-2025-40140",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40140"
},
{
"name": "CVE-2025-38020",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38020"
},
{
"name": "CVE-2025-40223",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40223"
},
{
"name": "CVE-2025-38572",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38572"
},
{
"name": "CVE-2025-23140",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-23140"
},
{
"name": "CVE-2025-23150",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-23150"
},
{
"name": "CVE-2025-38460",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38460"
},
{
"name": "CVE-2025-40061",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40061"
},
{
"name": "CVE-2025-38182",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38182"
},
{
"name": "CVE-2025-38550",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38550"
},
{
"name": "CVE-2024-53114",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53114"
},
{
"name": "CVE-2025-38275",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38275"
},
{
"name": "CVE-2025-40213",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40213"
},
{
"name": "CVE-2025-38345",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38345"
},
{
"name": "CVE-2025-40334",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40334"
},
{
"name": "CVE-2025-38170",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38170"
},
{
"name": "CVE-2025-39711",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39711"
},
{
"name": "CVE-2025-22115",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22115"
},
{
"name": "CVE-2025-22120",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22120"
},
{
"name": "CVE-2025-38535",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38535"
},
{
"name": "CVE-2025-38231",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38231"
},
{
"name": "CVE-2025-37854",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37854"
},
{
"name": "CVE-2025-40142",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40142"
},
{
"name": "CVE-2025-39873",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39873"
},
{
"name": "CVE-2025-40159",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40159"
},
{
"name": "CVE-2025-40319",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40319"
},
{
"name": "CVE-2025-68193",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68193"
},
{
"name": "CVE-2025-38473",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38473"
},
{
"name": "CVE-2025-38113",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38113"
},
{
"name": "CVE-2025-38714",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38714"
},
{
"name": "CVE-2025-23148",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-23148"
},
{
"name": "CVE-2025-38361",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38361"
},
{
"name": "CVE-2025-38470",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38470"
},
{
"name": "CVE-2025-38181",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38181"
},
{
"name": "CVE-2025-40051",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40051"
},
{
"name": "CVE-2025-38391",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38391"
},
{
"name": "CVE-2025-38248",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38248"
},
{
"name": "CVE-2025-40351",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40351"
},
{
"name": "CVE-2025-40087",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40087"
},
{
"name": "CVE-2025-40229",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40229"
},
{
"name": "CVE-2025-23147",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-23147"
},
{
"name": "CVE-2025-39752",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39752"
}
],
"initial_release_date": "2026-02-13T00:00:00",
"last_revision_date": "2026-02-13T00:00:00",
"links": [],
"reference": "CERTFR-2026-AVI-0169",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2026-02-13T00:00:00.000000"
}
],
"risks": [
{
"description": "Atteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es"
},
{
"description": "Non sp\u00e9cifi\u00e9 par l\u0027\u00e9diteur"
},
{
"description": "D\u00e9ni de service"
},
{
"description": "Contournement de la politique de s\u00e9curit\u00e9"
},
{
"description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans le noyau Linux d\u0027Ubuntu. Certaines d\u0027entre elles permettent \u00e0 un attaquant de provoquer une atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es, une atteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es et un contournement de la politique de s\u00e9curit\u00e9.",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans le noyau Linux d\u0027Ubuntu",
"vendor_advisories": [
{
"published_at": "2026-02-06",
"title": "Bulletin de s\u00e9curit\u00e9 Ubuntu USN-8015-3",
"url": "https://ubuntu.com/security/notices/USN-8015-3"
},
{
"published_at": "2026-02-12",
"title": "Bulletin de s\u00e9curit\u00e9 Ubuntu USN-8031-1",
"url": "https://ubuntu.com/security/notices/USN-8031-1"
},
{
"published_at": "2026-02-13",
"title": "Bulletin de s\u00e9curit\u00e9 Ubuntu USN-8033-4",
"url": "https://ubuntu.com/security/notices/USN-8033-4"
},
{
"published_at": "2026-02-12",
"title": "Bulletin de s\u00e9curit\u00e9 Ubuntu USN-8034-1",
"url": "https://ubuntu.com/security/notices/USN-8034-1"
},
{
"published_at": "2026-02-12",
"title": "Bulletin de s\u00e9curit\u00e9 Ubuntu USN-7988-5",
"url": "https://ubuntu.com/security/notices/USN-7988-5"
},
{
"published_at": "2026-02-11",
"title": "Bulletin de s\u00e9curit\u00e9 Ubuntu USN-7990-3",
"url": "https://ubuntu.com/security/notices/USN-7990-3"
},
{
"published_at": "2026-02-12",
"title": "Bulletin de s\u00e9curit\u00e9 Ubuntu USN-8033-2",
"url": "https://ubuntu.com/security/notices/USN-8033-2"
},
{
"published_at": "2026-02-11",
"title": "Bulletin de s\u00e9curit\u00e9 Ubuntu USN-8015-4",
"url": "https://ubuntu.com/security/notices/USN-8015-4"
},
{
"published_at": "2026-02-12",
"title": "Bulletin de s\u00e9curit\u00e9 Ubuntu USN-8029-1",
"url": "https://ubuntu.com/security/notices/USN-8029-1"
},
{
"published_at": "2026-02-12",
"title": "Bulletin de s\u00e9curit\u00e9 Ubuntu USN-8028-2",
"url": "https://ubuntu.com/security/notices/USN-8028-2"
},
{
"published_at": "2026-02-12",
"title": "Bulletin de s\u00e9curit\u00e9 Ubuntu USN-8033-3",
"url": "https://ubuntu.com/security/notices/USN-8033-3"
},
{
"published_at": "2026-02-11",
"title": "Bulletin de s\u00e9curit\u00e9 Ubuntu USN-8013-4",
"url": "https://ubuntu.com/security/notices/USN-8013-4"
},
{
"published_at": "2026-02-12",
"title": "Bulletin de s\u00e9curit\u00e9 Ubuntu USN-7990-4",
"url": "https://ubuntu.com/security/notices/USN-7990-4"
},
{
"published_at": "2026-02-11",
"title": "Bulletin de s\u00e9curit\u00e9 Ubuntu USN-7988-4",
"url": "https://ubuntu.com/security/notices/USN-7988-4"
},
{
"published_at": "2026-02-12",
"title": "Bulletin de s\u00e9curit\u00e9 Ubuntu USN-8033-1",
"url": "https://ubuntu.com/security/notices/USN-8033-1"
},
{
"published_at": "2026-02-12",
"title": "Bulletin de s\u00e9curit\u00e9 Ubuntu USN-8030-1",
"url": "https://ubuntu.com/security/notices/USN-8030-1"
},
{
"published_at": "2026-02-11",
"title": "Bulletin de s\u00e9curit\u00e9 Ubuntu USN-8028-1",
"url": "https://ubuntu.com/security/notices/USN-8028-1"
}
]
}
CERTFR-2026-AVI-0369
Vulnerability from certfr_avis - Published: 2026-03-27 - Updated: 2026-03-27
De multiples vulnérabilités ont été découvertes dans le noyau Linux de SUSE. Certaines d'entre elles permettent à un attaquant de provoquer une exécution de code arbitraire, une atteinte à la confidentialité des données et une atteinte à l'intégrité des données.
Solutions
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
| Vendor | Product | Description | ||
|---|---|---|---|---|
| SUSE | Public Cloud Module | Public Cloud Module 15-SP7 | ||
| SUSE | SUSE Linux Enterprise High Performance Computing | SUSE Linux Enterprise High Performance Computing 15 SP5 | ||
| SUSE | SUSE Linux Enterprise High Availability Extension | SUSE Linux Enterprise High Availability Extension 15 SP4 | ||
| SUSE | SUSE Linux Enterprise High Performance Computing | SUSE Linux Enterprise High Performance Computing ESPOS 15 SP5 | ||
| SUSE | openSUSE Leap | openSUSE Leap 15.5 | ||
| SUSE | SUSE Linux Enterprise Live Patching | SUSE Linux Enterprise Live Patching 15-SP5 | ||
| SUSE | SUSE Linux Enterprise Server | SUSE Linux Enterprise Server 12 SP5 LTSS | ||
| SUSE | SUSE Linux Enterprise Real Time | SUSE Linux Enterprise Real Time 15 SP7 | ||
| SUSE | SUSE Linux Enterprise Server | SUSE Linux Enterprise Server for SAP Applications 15 SP6 | ||
| SUSE | SUSE Linux Enterprise High Performance Computing | SUSE Linux Enterprise High Performance Computing 12 SP5 | ||
| SUSE | SUSE Linux Enterprise High Performance Computing | SUSE Linux Enterprise High Performance Computing 15 SP4 | ||
| SUSE | SUSE Manager Retail Branch Server | SUSE Manager Retail Branch Server 4.3 | ||
| SUSE | SUSE Linux Enterprise Live Patching | SUSE Linux Enterprise Live Patching 12-SP5 | ||
| SUSE | SUSE Linux Enterprise Server | SUSE Linux Enterprise Server 12 SP5 LTSS Extended Security | ||
| SUSE | openSUSE Leap | openSUSE Leap 15.4 | ||
| SUSE | SUSE Linux Enterprise Desktop | SUSE Linux Enterprise Desktop 15 SP7 | ||
| SUSE | SUSE Linux Enterprise Live Patching | SUSE Linux Enterprise Live Patching 15-SP6 | ||
| SUSE | SUSE Linux Enterprise Server | SUSE Linux Enterprise Server for SAP Applications 12 SP5 | ||
| SUSE | SUSE Linux Enterprise Live Patching | SUSE Linux Enterprise Live Patching 15-SP7 | ||
| SUSE | SUSE Linux Enterprise High Performance Computing | SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 | ||
| SUSE | SUSE Linux Enterprise Server | SUSE Linux Enterprise Server 12 SP5 | ||
| SUSE | SUSE Linux Enterprise Micro | SUSE Linux Enterprise Micro 5.2 | ||
| SUSE | SUSE Linux Enterprise Server | SUSE Linux Enterprise Server 15 SP4 LTSS | ||
| SUSE | SUSE Linux Enterprise Server | SUSE Linux Enterprise Server 15 SP5 | ||
| SUSE | SUSE Linux Enterprise Micro | SUSE Linux Enterprise Micro for Rancher 5.4 | ||
| SUSE | SUSE Linux Enterprise High Performance Computing | SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 | ||
| SUSE | SUSE Linux Enterprise Server | SUSE Linux Enterprise Server for SAP Applications 15 SP5 | ||
| SUSE | SUSE Linux Enterprise High Performance Computing | SUSE Linux Enterprise High Performance Computing LTSS 15 SP5 | ||
| SUSE | openSUSE Leap | openSUSE Leap 15.6 | ||
| SUSE | SUSE Linux Enterprise Micro | SUSE Linux Enterprise Micro 5.3 | ||
| SUSE | SUSE Linux Enterprise Real Time | SUSE Linux Enterprise Real Time 15 SP5 | ||
| SUSE | SUSE Linux Enterprise Micro | SUSE Linux Enterprise Micro for Rancher 5.3 | ||
| SUSE | SUSE Linux Enterprise Server | SUSE Linux Enterprise Server 15 SP6 | ||
| SUSE | SUSE Linux Enterprise Workstation Extension | SUSE Linux Enterprise Workstation Extension 15 SP7 | ||
| SUSE | SUSE Linux Enterprise Real Time | SUSE Linux Enterprise Real Time 15 SP4 | ||
| SUSE | SUSE Manager Proxy | SUSE Manager Proxy 4.3 | ||
| SUSE | SUSE Linux Enterprise Server | SUSE Linux Enterprise Server for SAP Applications 15 SP7 | ||
| SUSE | SUSE Linux Enterprise Micro | SUSE Linux Enterprise Micro for Rancher 5.2 | ||
| SUSE | SUSE Linux Enterprise Server | SUSE Linux Enterprise Server for SAP Applications 15 SP4 | ||
| SUSE | Basesystem Module | Basesystem Module 15-SP7 | ||
| SUSE | SUSE Linux Enterprise High Availability Extension | SUSE Linux Enterprise High Availability Extension 15 SP7 | ||
| SUSE | SUSE Linux Enterprise Micro | SUSE Linux Enterprise Micro 5.5 | ||
| SUSE | SUSE Linux Enterprise Server | SUSE Linux Enterprise Server 15 SP4 | ||
| SUSE | SUSE Linux Enterprise Real Time | SUSE Linux Enterprise Real Time 15 SP6 | ||
| SUSE | SUSE Linux Micro | SUSE Linux Micro 6.1 | ||
| SUSE | Legacy Module | Legacy Module 15-SP7 | ||
| SUSE | SUSE Linux Micro | SUSE Linux Micro 6.0 | ||
| SUSE | SUSE Linux Enterprise Server | SUSE Linux Enterprise Server 15 SP7 | ||
| SUSE | SUSE Linux Enterprise Server | SUSE Linux Enterprise Server 15 SP5 LTSS | ||
| SUSE | SUSE Manager Server | SUSE Manager Server 4.3 | ||
| SUSE | SUSE Linux Enterprise Server | SUSE Linux Enterprise Server 15 SP6 LTSS | ||
| SUSE | SUSE Real Time Module | SUSE Real Time Module 15-SP7 | ||
| SUSE | Development Tools Module | Development Tools Module 15-SP7 | ||
| SUSE | SUSE Linux Enterprise High Availability Extension | SUSE Linux Enterprise High Availability Extension 15 SP6 | ||
| SUSE | SUSE Linux Enterprise Micro | SUSE Linux Enterprise Micro 5.4 | ||
| SUSE | SUSE Linux Enterprise Live Patching | SUSE Linux Enterprise Live Patching 15-SP4 | ||
| SUSE | SUSE Linux Micro Extras | SUSE Linux Micro Extras 6.0 |
| Title | Publication Time | Tags | |||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "Public Cloud Module 15-SP7",
"product": {
"name": "Public Cloud Module",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise High Performance Computing 15 SP5",
"product": {
"name": "SUSE Linux Enterprise High Performance Computing",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise High Availability Extension 15 SP4",
"product": {
"name": "SUSE Linux Enterprise High Availability Extension",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise High Performance Computing ESPOS 15 SP5",
"product": {
"name": "SUSE Linux Enterprise High Performance Computing",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "openSUSE Leap 15.5",
"product": {
"name": "openSUSE Leap",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Live Patching 15-SP5",
"product": {
"name": "SUSE Linux Enterprise Live Patching",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Server 12 SP5 LTSS",
"product": {
"name": "SUSE Linux Enterprise Server",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Real Time 15 SP7",
"product": {
"name": "SUSE Linux Enterprise Real Time",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Server for SAP Applications 15 SP6",
"product": {
"name": "SUSE Linux Enterprise Server",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise High Performance Computing 12 SP5",
"product": {
"name": "SUSE Linux Enterprise High Performance Computing",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise High Performance Computing 15 SP4",
"product": {
"name": "SUSE Linux Enterprise High Performance Computing",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Manager Retail Branch Server 4.3",
"product": {
"name": "SUSE Manager Retail Branch Server",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Live Patching 12-SP5",
"product": {
"name": "SUSE Linux Enterprise Live Patching",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Server 12 SP5 LTSS Extended Security",
"product": {
"name": "SUSE Linux Enterprise Server",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "openSUSE Leap 15.4",
"product": {
"name": "openSUSE Leap",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Desktop 15 SP7",
"product": {
"name": "SUSE Linux Enterprise Desktop",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Live Patching 15-SP6",
"product": {
"name": "SUSE Linux Enterprise Live Patching",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Server for SAP Applications 12 SP5",
"product": {
"name": "SUSE Linux Enterprise Server",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Live Patching 15-SP7",
"product": {
"name": "SUSE Linux Enterprise Live Patching",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise High Performance Computing LTSS 15 SP4",
"product": {
"name": "SUSE Linux Enterprise High Performance Computing",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Server 12 SP5",
"product": {
"name": "SUSE Linux Enterprise Server",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Micro 5.2",
"product": {
"name": "SUSE Linux Enterprise Micro",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Server 15 SP4 LTSS",
"product": {
"name": "SUSE Linux Enterprise Server",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Server 15 SP5",
"product": {
"name": "SUSE Linux Enterprise Server",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Micro for Rancher 5.4",
"product": {
"name": "SUSE Linux Enterprise Micro",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4",
"product": {
"name": "SUSE Linux Enterprise High Performance Computing",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Server for SAP Applications 15 SP5",
"product": {
"name": "SUSE Linux Enterprise Server",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise High Performance Computing LTSS 15 SP5",
"product": {
"name": "SUSE Linux Enterprise High Performance Computing",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "openSUSE Leap 15.6",
"product": {
"name": "openSUSE Leap",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Micro 5.3",
"product": {
"name": "SUSE Linux Enterprise Micro",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Real Time 15 SP5",
"product": {
"name": "SUSE Linux Enterprise Real Time",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Micro for Rancher 5.3",
"product": {
"name": "SUSE Linux Enterprise Micro",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Server 15 SP6",
"product": {
"name": "SUSE Linux Enterprise Server",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Workstation Extension 15 SP7",
"product": {
"name": "SUSE Linux Enterprise Workstation Extension",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Real Time 15 SP4",
"product": {
"name": "SUSE Linux Enterprise Real Time",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Manager Proxy 4.3",
"product": {
"name": "SUSE Manager Proxy",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Server for SAP Applications 15 SP7",
"product": {
"name": "SUSE Linux Enterprise Server",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Micro for Rancher 5.2",
"product": {
"name": "SUSE Linux Enterprise Micro",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Server for SAP Applications 15 SP4",
"product": {
"name": "SUSE Linux Enterprise Server",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "Basesystem Module 15-SP7",
"product": {
"name": "Basesystem Module",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise High Availability Extension 15 SP7",
"product": {
"name": "SUSE Linux Enterprise High Availability Extension",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Micro 5.5",
"product": {
"name": "SUSE Linux Enterprise Micro",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Server 15 SP4",
"product": {
"name": "SUSE Linux Enterprise Server",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Real Time 15 SP6",
"product": {
"name": "SUSE Linux Enterprise Real Time",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Micro 6.1",
"product": {
"name": "SUSE Linux Micro",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "Legacy Module 15-SP7",
"product": {
"name": "Legacy Module",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Micro 6.0",
"product": {
"name": "SUSE Linux Micro",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Server 15 SP7",
"product": {
"name": "SUSE Linux Enterprise Server",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Server 15 SP5 LTSS",
"product": {
"name": "SUSE Linux Enterprise Server",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Manager Server 4.3",
"product": {
"name": "SUSE Manager Server",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Server 15 SP6 LTSS",
"product": {
"name": "SUSE Linux Enterprise Server",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Real Time Module 15-SP7",
"product": {
"name": "SUSE Real Time Module",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "Development Tools Module 15-SP7",
"product": {
"name": "Development Tools Module",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise High Availability Extension 15 SP6",
"product": {
"name": "SUSE Linux Enterprise High Availability Extension",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Micro 5.4",
"product": {
"name": "SUSE Linux Enterprise Micro",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Live Patching 15-SP4",
"product": {
"name": "SUSE Linux Enterprise Live Patching",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Micro Extras 6.0",
"product": {
"name": "SUSE Linux Micro Extras",
"vendor": {
"name": "SUSE",
"scada": false
}
}
}
],
"affected_systems_content": "",
"content": "## Solutions\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des correctifs (cf. section Documentation).",
"cves": [
{
"name": "CVE-2025-68234",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68234"
},
{
"name": "CVE-2025-71075",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71075"
},
{
"name": "CVE-2023-54076",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54076"
},
{
"name": "CVE-2026-23198",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23198"
},
{
"name": "CVE-2025-40273",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40273"
},
{
"name": "CVE-2023-53714",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53714"
},
{
"name": "CVE-2025-68230",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68230"
},
{
"name": "CVE-2026-23202",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23202"
},
{
"name": "CVE-2023-54149",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54149"
},
{
"name": "CVE-2025-71086",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71086"
},
{
"name": "CVE-2023-53797",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53797"
},
{
"name": "CVE-2023-53863",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53863"
},
{
"name": "CVE-2026-23167",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23167"
},
{
"name": "CVE-2025-22083",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22083"
},
{
"name": "CVE-2023-54142",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54142"
},
{
"name": "CVE-2025-68374",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68374"
},
{
"name": "CVE-2026-23129",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23129"
},
{
"name": "CVE-2023-54000",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54000"
},
{
"name": "CVE-2023-54052",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54052"
},
{
"name": "CVE-2025-68286",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68286"
},
{
"name": "CVE-2025-71094",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71094"
},
{
"name": "CVE-2025-68788",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68788"
},
{
"name": "CVE-2023-54091",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54091"
},
{
"name": "CVE-2023-54083",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54083"
},
{
"name": "CVE-2025-40314",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40314"
},
{
"name": "CVE-2025-40306",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40306"
},
{
"name": "CVE-2025-68778",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68778"
},
{
"name": "CVE-2023-53821",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53821"
},
{
"name": "CVE-2023-53799",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53799"
},
{
"name": "CVE-2026-23054",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23054"
},
{
"name": "CVE-2025-40254",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40254"
},
{
"name": "CVE-2025-71064",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71064"
},
{
"name": "CVE-2023-54201",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54201"
},
{
"name": "CVE-2025-40219",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40219"
},
{
"name": "CVE-2025-68200",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68200"
},
{
"name": "CVE-2025-68736",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68736"
},
{
"name": "CVE-2025-68725",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68725"
},
{
"name": "CVE-2025-68176",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68176"
},
{
"name": "CVE-2025-68204",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68204"
},
{
"name": "CVE-2025-68795",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68795"
},
{
"name": "CVE-2025-68349",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68349"
},
{
"name": "CVE-2025-68380",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68380"
},
{
"name": "CVE-2026-23269",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23269"
},
{
"name": "CVE-2023-54309",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54309"
},
{
"name": "CVE-2025-68283",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68283"
},
{
"name": "CVE-2025-68339",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68339"
},
{
"name": "CVE-2025-40287",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40287"
},
{
"name": "CVE-2026-23069",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23069"
},
{
"name": "CVE-2023-53995",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53995"
},
{
"name": "CVE-2026-22992",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-22992"
},
{
"name": "CVE-2023-54255",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54255"
},
{
"name": "CVE-2026-23004",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23004"
},
{
"name": "CVE-2025-71071",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71071"
},
{
"name": "CVE-2023-54271",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54271"
},
{
"name": "CVE-2025-71191",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71191"
},
{
"name": "CVE-2025-68295",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68295"
},
{
"name": "CVE-2025-68728",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68728"
},
{
"name": "CVE-2025-71087",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71087"
},
{
"name": "CVE-2023-54297",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54297"
},
{
"name": "CVE-2023-54112",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54112"
},
{
"name": "CVE-2025-68287",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68287"
},
{
"name": "CVE-2025-40240",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40240"
},
{
"name": "CVE-2025-71135",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71135"
},
{
"name": "CVE-2025-40081",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40081"
},
{
"name": "CVE-2023-54313",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54313"
},
{
"name": "CVE-2023-53759",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53759"
},
{
"name": "CVE-2025-68746",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68746"
},
{
"name": "CVE-2025-68773",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68773"
},
{
"name": "CVE-2025-71133",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71133"
},
{
"name": "CVE-2023-53994",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53994"
},
{
"name": "CVE-2025-40153",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40153"
},
{
"name": "CVE-2025-40103",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40103"
},
{
"name": "CVE-2025-40312",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40312"
},
{
"name": "CVE-2023-54095",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54095"
},
{
"name": "CVE-2025-22125",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22125"
},
{
"name": "CVE-2025-21738",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21738"
},
{
"name": "CVE-2023-54143",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54143"
},
{
"name": "CVE-2025-68238",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68238"
},
{
"name": "CVE-2025-68297",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68297"
},
{
"name": "CVE-2023-53813",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53813"
},
{
"name": "CVE-2023-54227",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54227"
},
{
"name": "CVE-2026-23139",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23139"
},
{
"name": "CVE-2023-53855",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53855"
},
{
"name": "CVE-2026-23208",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23208"
},
{
"name": "CVE-2025-68804",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68804"
},
{
"name": "CVE-2026-23017",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23017"
},
{
"name": "CVE-2023-53864",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53864"
},
{
"name": "CVE-2025-40350",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40350"
},
{
"name": "CVE-2025-40309",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40309"
},
{
"name": "CVE-2025-71189",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71189"
},
{
"name": "CVE-2025-40349",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40349"
},
{
"name": "CVE-2023-54246",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54246"
},
{
"name": "CVE-2025-71088",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71088"
},
{
"name": "CVE-2026-23179",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23179"
},
{
"name": "CVE-2025-38243",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38243"
},
{
"name": "CVE-2025-40343",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40343"
},
{
"name": "CVE-2023-54001",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54001"
},
{
"name": "CVE-2026-23090",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23090"
},
{
"name": "CVE-2026-23035",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23035"
},
{
"name": "CVE-2023-54253",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54253"
},
{
"name": "CVE-2026-23210",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23210"
},
{
"name": "CVE-2025-38375",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38375"
},
{
"name": "CVE-2025-68307",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68307"
},
{
"name": "CVE-2025-40308",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40308"
},
{
"name": "CVE-2023-54324",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54324"
},
{
"name": "CVE-2023-54106",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54106"
},
{
"name": "CVE-2025-40187",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40187"
},
{
"name": "CVE-2025-40315",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40315"
},
{
"name": "CVE-2023-53793",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53793"
},
{
"name": "CVE-2023-54096",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54096"
},
{
"name": "CVE-2025-39913",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39913"
},
{
"name": "CVE-2026-23064",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23064"
},
{
"name": "CVE-2025-71098",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71098"
},
{
"name": "CVE-2025-40251",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40251"
},
{
"name": "CVE-2025-71078",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71078"
},
{
"name": "CVE-2025-40355",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40355"
},
{
"name": "CVE-2023-54283",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54283"
},
{
"name": "CVE-2023-54049",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54049"
},
{
"name": "CVE-2025-71083",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71083"
},
{
"name": "CVE-2023-54066",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54066"
},
{
"name": "CVE-2026-23061",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23061"
},
{
"name": "CVE-2023-54117",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54117"
},
{
"name": "CVE-2023-53999",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53999"
},
{
"name": "CVE-2023-54038",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54038"
},
{
"name": "CVE-2025-68813",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68813"
},
{
"name": "CVE-2023-54315",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54315"
},
{
"name": "CVE-2026-23135",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23135"
},
{
"name": "CVE-2025-39689",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39689"
},
{
"name": "CVE-2025-68365",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68365"
},
{
"name": "CVE-2023-54211",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54211"
},
{
"name": "CVE-2023-54251",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54251"
},
{
"name": "CVE-2026-23119",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23119"
},
{
"name": "CVE-2025-71085",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71085"
},
{
"name": "CVE-2023-54156",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54156"
},
{
"name": "CVE-2026-23173",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23173"
},
{
"name": "CVE-2026-23268",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23268"
},
{
"name": "CVE-2023-53750",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53750"
},
{
"name": "CVE-2025-40347",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40347"
},
{
"name": "CVE-2025-71154",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71154"
},
{
"name": "CVE-2023-54037",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54037"
},
{
"name": "CVE-2023-53815",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53815"
},
{
"name": "CVE-2026-23222",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23222"
},
{
"name": "CVE-2025-68257",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68257"
},
{
"name": "CVE-2025-71084",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71084"
},
{
"name": "CVE-2023-54031",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54031"
},
{
"name": "CVE-2026-23094",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23094"
},
{
"name": "CVE-2026-23049",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23049"
},
{
"name": "CVE-2025-40190",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40190"
},
{
"name": "CVE-2022-50756",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50756"
},
{
"name": "CVE-2023-53989",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53989"
},
{
"name": "CVE-2025-68347",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68347"
},
{
"name": "CVE-2025-68235",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68235"
},
{
"name": "CVE-2025-68770",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68770"
},
{
"name": "CVE-2026-23229",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23229"
},
{
"name": "CVE-2025-40202",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40202"
},
{
"name": "CVE-2025-40311",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40311"
},
{
"name": "CVE-2025-68814",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68814"
},
{
"name": "CVE-2023-54254",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54254"
},
{
"name": "CVE-2025-71081",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71081"
},
{
"name": "CVE-2023-54312",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54312"
},
{
"name": "CVE-2023-54094",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54094"
},
{
"name": "CVE-2026-23101",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23101"
},
{
"name": "CVE-2026-23099",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23099"
},
{
"name": "CVE-2025-40167",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40167"
},
{
"name": "CVE-2025-38159",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38159"
},
{
"name": "CVE-2023-53846",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53846"
},
{
"name": "CVE-2023-53792",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53792"
},
{
"name": "CVE-2023-54164",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54164"
},
{
"name": "CVE-2025-40256",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40256"
},
{
"name": "CVE-2026-22989",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-22989"
},
{
"name": "CVE-2026-23085",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23085"
},
{
"name": "CVE-2025-40360",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40360"
},
{
"name": "CVE-2026-23209",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23209"
},
{
"name": "CVE-2025-71136",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71136"
},
{
"name": "CVE-2025-68354",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68354"
},
{
"name": "CVE-2025-68801",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68801"
},
{
"name": "CVE-2026-23150",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23150"
},
{
"name": "CVE-2023-54316",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54316"
},
{
"name": "CVE-2025-40097",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40097"
},
{
"name": "CVE-2025-68258",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68258"
},
{
"name": "CVE-2023-54089",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54089"
},
{
"name": "CVE-2026-23163",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23163"
},
{
"name": "CVE-2023-54016",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54016"
},
{
"name": "CVE-2025-71235",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71235"
},
{
"name": "CVE-2023-54035",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54035"
},
{
"name": "CVE-2025-40322",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40322"
},
{
"name": "CVE-2026-23057",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23057"
},
{
"name": "CVE-2025-68209",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68209"
},
{
"name": "CVE-2025-71138",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71138"
},
{
"name": "CVE-2025-40233",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40233"
},
{
"name": "CVE-2023-54322",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54322"
},
{
"name": "CVE-2023-54155",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54155"
},
{
"name": "CVE-2023-54088",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54088"
},
{
"name": "CVE-2026-23166",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23166"
},
{
"name": "CVE-2025-40271",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40271"
},
{
"name": "CVE-2023-54276",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54276"
},
{
"name": "CVE-2023-42752",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-42752"
},
{
"name": "CVE-2026-22991",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-22991"
},
{
"name": "CVE-2023-54048",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54048"
},
{
"name": "CVE-2023-54278",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54278"
},
{
"name": "CVE-2023-54215",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54215"
},
{
"name": "CVE-2025-68308",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68308"
},
{
"name": "CVE-2023-53777",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53777"
},
{
"name": "CVE-2023-54133",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54133"
},
{
"name": "CVE-2025-40242",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40242"
},
{
"name": "CVE-2026-23116",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23116"
},
{
"name": "CVE-2023-54148",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54148"
},
{
"name": "CVE-2025-68190",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68190"
},
{
"name": "CVE-2023-54064",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54064"
},
{
"name": "CVE-2023-54153",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54153"
},
{
"name": "CVE-2026-23207",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23207"
},
{
"name": "CVE-2025-40252",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40252"
},
{
"name": "CVE-2025-71200",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71200"
},
{
"name": "CVE-2023-53791",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53791"
},
{
"name": "CVE-2025-68218",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68218"
},
{
"name": "CVE-2023-53848",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53848"
},
{
"name": "CVE-2025-68255",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68255"
},
{
"name": "CVE-2023-54081",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54081"
},
{
"name": "CVE-2023-53828",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53828"
},
{
"name": "CVE-2025-40024",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40024"
},
{
"name": "CVE-2026-23172",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23172"
},
{
"name": "CVE-2025-40238",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40238"
},
{
"name": "CVE-2023-54185",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54185"
},
{
"name": "CVE-2025-40277",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40277"
},
{
"name": "CVE-2025-37813",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37813"
},
{
"name": "CVE-2025-40106",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40106"
},
{
"name": "CVE-2025-68174",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68174"
},
{
"name": "CVE-2025-40272",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40272"
},
{
"name": "CVE-2026-23133",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23133"
},
{
"name": "CVE-2025-71093",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71093"
},
{
"name": "CVE-2026-23131",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23131"
},
{
"name": "CVE-2026-23170",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23170"
},
{
"name": "CVE-2025-68759",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68759"
},
{
"name": "CVE-2023-53834",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53834"
},
{
"name": "CVE-2026-23204",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23204"
},
{
"name": "CVE-2025-71188",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71188"
},
{
"name": "CVE-2025-40345",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40345"
},
{
"name": "CVE-2023-54170",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54170"
},
{
"name": "CVE-2026-23125",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23125"
},
{
"name": "CVE-2023-53781",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53781"
},
{
"name": "CVE-2025-40033",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40033"
},
{
"name": "CVE-2022-50453",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50453"
},
{
"name": "CVE-2024-42103",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42103"
},
{
"name": "CVE-2025-68733",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68733"
},
{
"name": "CVE-2026-23005",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23005"
},
{
"name": "CVE-2026-23214",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23214"
},
{
"name": "CVE-2025-7709",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-7709"
},
{
"name": "CVE-2025-68188",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68188"
},
{
"name": "CVE-2025-40269",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40269"
},
{
"name": "CVE-2025-68335",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68335"
},
{
"name": "CVE-2025-71079",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71079"
},
{
"name": "CVE-2023-54223",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54223"
},
{
"name": "CVE-2025-37861",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37861"
},
{
"name": "CVE-2026-23178",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23178"
},
{
"name": "CVE-2026-22997",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-22997"
},
{
"name": "CVE-2025-39977",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39977"
},
{
"name": "CVE-2023-54045",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54045"
},
{
"name": "CVE-2025-68330",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68330"
},
{
"name": "CVE-2023-54101",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54101"
},
{
"name": "CVE-2025-71196",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71196"
},
{
"name": "CVE-2023-54179",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54179"
},
{
"name": "CVE-2025-68180",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68180"
},
{
"name": "CVE-2023-54289",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54289"
},
{
"name": "CVE-2023-54177",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54177"
},
{
"name": "CVE-2026-23191",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23191"
},
{
"name": "CVE-2026-23078",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23078"
},
{
"name": "CVE-2025-68201",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68201"
},
{
"name": "CVE-2025-40289",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40289"
},
{
"name": "CVE-2026-23169",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23169"
},
{
"name": "CVE-2025-68768",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68768"
},
{
"name": "CVE-2025-68785",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68785"
},
{
"name": "CVE-2025-71130",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71130"
},
{
"name": "CVE-2023-54013",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54013"
},
{
"name": "CVE-2025-68808",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68808"
},
{
"name": "CVE-2024-27005",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-27005"
},
{
"name": "CVE-2025-68223",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68223"
},
{
"name": "CVE-2025-68783",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68783"
},
{
"name": "CVE-2025-40292",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40292"
},
{
"name": "CVE-2025-71147",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71147"
},
{
"name": "CVE-2023-54093",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54093"
},
{
"name": "CVE-2023-53839",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53839"
},
{
"name": "CVE-2023-53752",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53752"
},
{
"name": "CVE-2023-53802",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53802"
},
{
"name": "CVE-2025-38224",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38224"
},
{
"name": "CVE-2025-68724",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68724"
},
{
"name": "CVE-2023-54318",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54318"
},
{
"name": "CVE-2026-23074",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23074"
},
{
"name": "CVE-2025-71126",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71126"
},
{
"name": "CVE-2025-71199",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71199"
},
{
"name": "CVE-2025-68252",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68252"
},
{
"name": "CVE-2023-54166",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54166"
},
{
"name": "CVE-2025-40274",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40274"
},
{
"name": "CVE-2025-68797",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68797"
},
{
"name": "CVE-2023-54136",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54136"
},
{
"name": "CVE-2023-54225",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54225"
},
{
"name": "CVE-2025-40220",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40220"
},
{
"name": "CVE-2025-68237",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68237"
},
{
"name": "CVE-2023-54194",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54194"
},
{
"name": "CVE-2025-40257",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40257"
},
{
"name": "CVE-2025-68259",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68259"
},
{
"name": "CVE-2025-71125",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71125"
},
{
"name": "CVE-2026-23006",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23006"
},
{
"name": "CVE-2025-71108",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71108"
},
{
"name": "CVE-2025-68789",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68789"
},
{
"name": "CVE-2025-68312",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68312"
},
{
"name": "CVE-2023-53843",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53843"
},
{
"name": "CVE-2025-68284",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68284"
},
{
"name": "CVE-2025-68194",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68194"
},
{
"name": "CVE-2025-38379",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38379"
},
{
"name": "CVE-2025-71195",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71195"
},
{
"name": "CVE-2025-40006",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40006"
},
{
"name": "CVE-2026-23083",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23083"
},
{
"name": "CVE-2026-23088",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23088"
},
{
"name": "CVE-2023-53844",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53844"
},
{
"name": "CVE-2025-68183",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68183"
},
{
"name": "CVE-2025-40263",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40263"
},
{
"name": "CVE-2023-54026",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54026"
},
{
"name": "CVE-2026-23108",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23108"
},
{
"name": "CVE-2025-68244",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68244"
},
{
"name": "CVE-2025-40231",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40231"
},
{
"name": "CVE-2025-40278",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40278"
},
{
"name": "CVE-2025-71194",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71194"
},
{
"name": "CVE-2025-40342",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40342"
},
{
"name": "CVE-2026-23023",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23023"
},
{
"name": "CVE-2023-53858",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53858"
},
{
"name": "CVE-2023-53992",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53992"
},
{
"name": "CVE-2026-22999",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-22999"
},
{
"name": "CVE-2023-54266",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54266"
},
{
"name": "CVE-2025-71082",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71082"
},
{
"name": "CVE-2025-68222",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68222"
},
{
"name": "CVE-2026-23068",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23068"
},
{
"name": "CVE-2025-68765",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68765"
},
{
"name": "CVE-2023-53825",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53825"
},
{
"name": "CVE-2026-23089",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23089"
},
{
"name": "CVE-2025-71132",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71132"
},
{
"name": "CVE-2025-71225",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71225"
},
{
"name": "CVE-2023-54072",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54072"
},
{
"name": "CVE-2025-38322",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38322"
},
{
"name": "CVE-2026-23071",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23071"
},
{
"name": "CVE-2023-54134",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54134"
},
{
"name": "CVE-2026-23056",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23056"
},
{
"name": "CVE-2023-54184",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54184"
},
{
"name": "CVE-2025-71077",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71077"
},
{
"name": "CVE-2023-54291",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54291"
},
{
"name": "CVE-2025-40279",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40279"
},
{
"name": "CVE-2023-53865",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53865"
},
{
"name": "CVE-2025-68328",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68328"
},
{
"name": "CVE-2025-40201",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40201"
},
{
"name": "CVE-2026-23063",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23063"
},
{
"name": "CVE-2023-53823",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53823"
},
{
"name": "CVE-2026-23073",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23073"
},
{
"name": "CVE-2023-54023",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54023"
},
{
"name": "CVE-2025-71114",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71114"
},
{
"name": "CVE-2026-23058",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23058"
},
{
"name": "CVE-2025-68744",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68744"
},
{
"name": "CVE-2025-71182",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71182"
},
{
"name": "CVE-2023-54241",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54241"
},
{
"name": "CVE-2025-68320",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68320"
},
{
"name": "CVE-2026-23038",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23038"
},
{
"name": "CVE-2023-54017",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54017"
},
{
"name": "CVE-2023-53257",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53257"
},
{
"name": "CVE-2026-22990",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-22990"
},
{
"name": "CVE-2023-53787",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53787"
},
{
"name": "CVE-2026-23000",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23000"
},
{
"name": "CVE-2025-68172",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68172"
},
{
"name": "CVE-2026-23176",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23176"
},
{
"name": "CVE-2025-39998",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39998"
},
{
"name": "CVE-2024-53149",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53149"
},
{
"name": "CVE-2025-40338",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40338"
},
{
"name": "CVE-2026-23026",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23026"
},
{
"name": "CVE-2025-40134",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40134"
},
{
"name": "CVE-2026-23128",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23128"
},
{
"name": "CVE-2025-68325",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68325"
},
{
"name": "CVE-2025-71190",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71190"
},
{
"name": "CVE-2023-54154",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54154"
},
{
"name": "CVE-2025-71089",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71089"
},
{
"name": "CVE-2023-54141",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54141"
},
{
"name": "CVE-2023-53766",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53766"
},
{
"name": "CVE-2026-23107",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23107"
},
{
"name": "CVE-2025-68296",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68296"
},
{
"name": "CVE-2023-53785",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53785"
},
{
"name": "CVE-2025-40328",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40328"
},
{
"name": "CVE-2025-68332",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68332"
},
{
"name": "CVE-2023-54263",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54263"
},
{
"name": "CVE-2025-71104",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71104"
},
{
"name": "CVE-2026-22978",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-22978"
},
{
"name": "CVE-2025-40283",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40283"
},
{
"name": "CVE-2025-40324",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40324"
},
{
"name": "CVE-2023-54181",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54181"
},
{
"name": "CVE-2025-68378",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68378"
},
{
"name": "CVE-2026-23146",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23146"
},
{
"name": "CVE-2023-53795",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53795"
},
{
"name": "CVE-2026-23037",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23037"
},
{
"name": "CVE-2025-40250",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40250"
},
{
"name": "CVE-2025-40264",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40264"
},
{
"name": "CVE-2025-38728",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38728"
},
{
"name": "CVE-2026-23001",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23001"
},
{
"name": "CVE-2025-68367",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68367"
},
{
"name": "CVE-2025-71224",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71224"
},
{
"name": "CVE-2025-68820",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68820"
},
{
"name": "CVE-2025-40321",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40321"
},
{
"name": "CVE-2023-54207",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54207"
},
{
"name": "CVE-2025-68249",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68249"
},
{
"name": "CVE-2025-68740",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68740"
},
{
"name": "CVE-2025-40158",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40158"
},
{
"name": "CVE-2025-40179",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40179"
},
{
"name": "CVE-2025-68742",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68742"
},
{
"name": "CVE-2025-40282",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40282"
},
{
"name": "CVE-2023-53819",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53819"
},
{
"name": "CVE-2023-54210",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54210"
},
{
"name": "CVE-2025-40053",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40053"
},
{
"name": "CVE-2023-54030",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54030"
},
{
"name": "CVE-2025-68816",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68816"
},
{
"name": "CVE-2025-68192",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68192"
},
{
"name": "CVE-2023-54092",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54092"
},
{
"name": "CVE-2025-68379",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68379"
},
{
"name": "CVE-2023-53997",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53997"
},
{
"name": "CVE-2025-68256",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68256"
},
{
"name": "CVE-2025-68777",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68777"
},
{
"name": "CVE-2025-68254",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68254"
},
{
"name": "CVE-2026-23221",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23221"
},
{
"name": "CVE-2026-23151",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23151"
},
{
"name": "CVE-2025-71145",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71145"
},
{
"name": "CVE-2025-68171",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68171"
},
{
"name": "CVE-2026-23152",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23152"
},
{
"name": "CVE-2025-40301",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40301"
},
{
"name": "CVE-2025-22047",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22047"
},
{
"name": "CVE-2026-22982",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-22982"
},
{
"name": "CVE-2023-54224",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54224"
},
{
"name": "CVE-2023-54235",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54235"
},
{
"name": "CVE-2025-71222",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71222"
},
{
"name": "CVE-2025-71118",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71118"
},
{
"name": "CVE-2023-54032",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54032"
},
{
"name": "CVE-2025-68327",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68327"
},
{
"name": "CVE-2023-6040",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-6040"
},
{
"name": "CVE-2023-53856",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53856"
},
{
"name": "CVE-2025-40318",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40318"
},
{
"name": "CVE-2025-71229",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71229"
},
{
"name": "CVE-2026-23213",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23213"
},
{
"name": "CVE-2026-23091",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23091"
},
{
"name": "CVE-2025-68241",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68241"
},
{
"name": "CVE-2023-53817",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53817"
},
{
"name": "CVE-2023-53782",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53782"
},
{
"name": "CVE-2023-54115",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54115"
},
{
"name": "CVE-2023-54069",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54069"
},
{
"name": "CVE-2025-71192",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71192"
},
{
"name": "CVE-2023-54104",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54104"
},
{
"name": "CVE-2025-40135",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40135"
},
{
"name": "CVE-2026-23121",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23121"
},
{
"name": "CVE-2023-54027",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54027"
},
{
"name": "CVE-2025-39964",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39964"
},
{
"name": "CVE-2025-68734",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68734"
},
{
"name": "CVE-2025-68776",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68776"
},
{
"name": "CVE-2025-71066",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71066"
},
{
"name": "CVE-2026-22993",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-22993"
},
{
"name": "CVE-2025-71236",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71236"
},
{
"name": "CVE-2023-53851",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53851"
},
{
"name": "CVE-2025-68345",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68345"
},
{
"name": "CVE-2025-71097",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71097"
},
{
"name": "CVE-2023-54183",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54183"
},
{
"name": "CVE-2023-53841",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53841"
},
{
"name": "CVE-2023-54326",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54326"
},
{
"name": "CVE-2023-54267",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54267"
},
{
"name": "CVE-2023-54282",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54282"
},
{
"name": "CVE-2025-71234",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71234"
},
{
"name": "CVE-2025-40310",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40310"
},
{
"name": "CVE-2022-50697",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50697"
},
{
"name": "CVE-2025-70873",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-70873"
},
{
"name": "CVE-2025-71111",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71111"
},
{
"name": "CVE-2026-22985",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-22985"
},
{
"name": "CVE-2023-54006",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54006"
},
{
"name": "CVE-2023-53784",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53784"
},
{
"name": "CVE-2023-54067",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54067"
},
{
"name": "CVE-2023-54264",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54264"
},
{
"name": "CVE-2025-71185",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71185"
},
{
"name": "CVE-2025-40331",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40331"
},
{
"name": "CVE-2026-23096",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23096"
},
{
"name": "CVE-2025-68337",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68337"
},
{
"name": "CVE-2025-68351",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68351"
},
{
"name": "CVE-2023-54304",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54304"
},
{
"name": "CVE-2025-38488",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38488"
},
{
"name": "CVE-2025-71131",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71131"
},
{
"name": "CVE-2023-54125",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54125"
},
{
"name": "CVE-2023-54173",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54173"
},
{
"name": "CVE-2023-53743",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53743"
},
{
"name": "CVE-2025-71116",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71116"
},
{
"name": "CVE-2023-53842",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53842"
},
{
"name": "CVE-2025-68208",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68208"
},
{
"name": "CVE-2025-68362",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68362"
},
{
"name": "CVE-2025-71232",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71232"
},
{
"name": "CVE-2023-53762",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53762"
},
{
"name": "CVE-2025-68290",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68290"
},
{
"name": "CVE-2025-40280",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40280"
},
{
"name": "CVE-2025-40099",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40099"
},
{
"name": "CVE-2025-71162",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71162"
},
{
"name": "CVE-2025-40293",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40293"
},
{
"name": "CVE-2025-68750",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68750"
},
{
"name": "CVE-2023-54127",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54127"
},
{
"name": "CVE-2023-53861",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53861"
},
{
"name": "CVE-2025-68803",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68803"
},
{
"name": "CVE-2026-22996",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-22996"
},
{
"name": "CVE-2025-68331",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68331"
},
{
"name": "CVE-2023-54137",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54137"
},
{
"name": "CVE-2026-23105",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23105"
},
{
"name": "CVE-2026-22976",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-22976"
},
{
"name": "CVE-2023-54319",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54319"
},
{
"name": "CVE-2025-68305",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68305"
},
{
"name": "CVE-2025-40320",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40320"
},
{
"name": "CVE-2026-23141",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23141"
},
{
"name": "CVE-2026-23065",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23065"
},
{
"name": "CVE-2025-68753",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68753"
},
{
"name": "CVE-2023-54140",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54140"
},
{
"name": "CVE-2025-68775",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68775"
},
{
"name": "CVE-2026-23182",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23182"
},
{
"name": "CVE-2025-71112",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71112"
},
{
"name": "CVE-2023-54285",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54285"
},
{
"name": "CVE-2026-23086",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23086"
},
{
"name": "CVE-2023-54025",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54025"
},
{
"name": "CVE-2025-40192",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40192"
},
{
"name": "CVE-2023-54229",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54229"
},
{
"name": "CVE-2025-68818",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68818"
},
{
"name": "CVE-2023-54300",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54300"
},
{
"name": "CVE-2025-39880",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39880"
},
{
"name": "CVE-2023-54042",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54042"
},
{
"name": "CVE-2023-53807",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53807"
},
{
"name": "CVE-2025-40102",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40102"
},
{
"name": "CVE-2023-54302",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54302"
},
{
"name": "CVE-2025-40170",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40170"
},
{
"name": "CVE-2025-40160",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40160"
},
{
"name": "CVE-2025-40284",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40284"
},
{
"name": "CVE-2023-54178",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54178"
},
{
"name": "CVE-2023-54051",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54051"
},
{
"name": "CVE-2023-53808",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53808"
},
{
"name": "CVE-2025-71148",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71148"
},
{
"name": "CVE-2025-68366",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68366"
},
{
"name": "CVE-2024-53070",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53070"
},
{
"name": "CVE-2023-54008",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54008"
},
{
"name": "CVE-2026-23156",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23156"
},
{
"name": "CVE-2023-54014",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54014"
},
{
"name": "CVE-2025-68815",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68815"
},
{
"name": "CVE-2025-40215",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40215"
},
{
"name": "CVE-2025-40307",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40307"
},
{
"name": "CVE-2026-23095",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23095"
},
{
"name": "CVE-2025-68346",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68346"
},
{
"name": "CVE-2025-71163",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71163"
},
{
"name": "CVE-2025-40211",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40211"
},
{
"name": "CVE-2026-23062",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23062"
},
{
"name": "CVE-2025-40042",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40042"
},
{
"name": "CVE-2023-54258",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54258"
},
{
"name": "CVE-2025-39890",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39890"
},
{
"name": "CVE-2025-71096",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71096"
},
{
"name": "CVE-2025-71095",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71095"
},
{
"name": "CVE-2023-54221",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54221"
},
{
"name": "CVE-2025-68771",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68771"
},
{
"name": "CVE-2025-68363",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68363"
},
{
"name": "CVE-2025-40248",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40248"
},
{
"name": "CVE-2025-39748",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39748"
},
{
"name": "CVE-2026-22984",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-22984"
},
{
"name": "CVE-2025-68303",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68303"
},
{
"name": "CVE-2025-40259",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40259"
},
{
"name": "CVE-2023-53827",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53827"
},
{
"name": "CVE-2025-68757",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68757"
},
{
"name": "CVE-2023-54293",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54293"
},
{
"name": "CVE-2025-40329",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40329"
},
{
"name": "CVE-2026-23070",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23070"
},
{
"name": "CVE-2026-23033",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23033"
},
{
"name": "CVE-2026-22977",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-22977"
},
{
"name": "CVE-2026-23145",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23145"
},
{
"name": "CVE-2022-50423",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50423"
},
{
"name": "CVE-2023-54060",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54060"
},
{
"name": "CVE-2026-23104",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23104"
},
{
"name": "CVE-2026-23003",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23003"
},
{
"name": "CVE-2025-68766",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68766"
},
{
"name": "CVE-2023-53778",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53778"
},
{
"name": "CVE-2025-39817",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39817"
},
{
"name": "CVE-2026-23076",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23076"
},
{
"name": "CVE-2023-54145",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54145"
},
{
"name": "CVE-2023-54171",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54171"
},
{
"name": "CVE-2023-54240",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54240"
},
{
"name": "CVE-2025-68168",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68168"
},
{
"name": "CVE-2025-71123",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71123"
},
{
"name": "CVE-2025-68206",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68206"
},
{
"name": "CVE-2023-54247",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54247"
},
{
"name": "CVE-2024-38542",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38542"
},
{
"name": "CVE-2025-71100",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71100"
},
{
"name": "CVE-2025-68372",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68372"
},
{
"name": "CVE-2026-23171",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23171"
},
{
"name": "CVE-2023-54070",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54070"
},
{
"name": "CVE-2023-54204",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54204"
},
{
"name": "CVE-2026-23010",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23010"
},
{
"name": "CVE-2026-23112",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23112"
},
{
"name": "CVE-2025-68313",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68313"
},
{
"name": "CVE-2023-53850",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53850"
},
{
"name": "CVE-2023-54303",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54303"
},
{
"name": "CVE-2025-71137",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71137"
},
{
"name": "CVE-2026-23084",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23084"
},
{
"name": "CVE-2026-23190",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23190"
},
{
"name": "CVE-2025-40123",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40123"
},
{
"name": "CVE-2026-22979",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-22979"
},
{
"name": "CVE-2023-53998",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53998"
},
{
"name": "CVE-2025-68301",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68301"
},
{
"name": "CVE-2026-23011",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23011"
},
{
"name": "CVE-2023-53816",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53816"
},
{
"name": "CVE-2025-40297",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40297"
},
{
"name": "CVE-2025-68217",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68217"
},
{
"name": "CVE-2025-40178",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40178"
},
{
"name": "CVE-2025-68289",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68289"
},
{
"name": "CVE-2025-40363",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40363"
},
{
"name": "CVE-2023-53852",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53852"
},
{
"name": "CVE-2025-40253",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40253"
},
{
"name": "CVE-2026-22988",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-22988"
},
{
"name": "CVE-2025-68245",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68245"
},
{
"name": "CVE-2025-40317",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40317"
},
{
"name": "CVE-2026-23110",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23110"
},
{
"name": "CVE-2023-54135",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54135"
},
{
"name": "CVE-2023-53996",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53996"
},
{
"name": "CVE-2025-68233",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68233"
},
{
"name": "CVE-2025-71120",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71120"
},
{
"name": "CVE-2024-26944",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26944"
},
{
"name": "CVE-2026-23060",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23060"
},
{
"name": "CVE-2025-38321",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38321"
},
{
"name": "CVE-2025-40316",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40316"
},
{
"name": "CVE-2025-71119",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71119"
},
{
"name": "CVE-2023-54314",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54314"
},
{
"name": "CVE-2025-71197",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71197"
},
{
"name": "CVE-2025-68758",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68758"
},
{
"name": "CVE-2025-38539",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38539"
},
{
"name": "CVE-2025-71113",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71113"
},
{
"name": "CVE-2023-54292",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54292"
},
{
"name": "CVE-2026-23102",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23102"
},
{
"name": "CVE-2026-22998",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-22998"
},
{
"name": "CVE-2023-54172",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54172"
},
{
"name": "CVE-2023-54113",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54113"
},
{
"name": "CVE-2025-68340",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68340"
},
{
"name": "CVE-2026-23082",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23082"
},
{
"name": "CVE-2023-53836",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53836"
},
{
"name": "CVE-2026-23155",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23155"
},
{
"name": "CVE-2025-40288",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40288"
},
{
"name": "CVE-2025-68239",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68239"
},
{
"name": "CVE-2025-40258",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40258"
},
{
"name": "CVE-2023-53857",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53857"
},
{
"name": "CVE-2023-53860",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53860"
},
{
"name": "CVE-2025-68185",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68185"
},
{
"name": "CVE-2025-40304",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40304"
},
{
"name": "CVE-2023-54169",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54169"
},
{
"name": "CVE-2025-40268",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40268"
},
{
"name": "CVE-2026-23111",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23111"
},
{
"name": "CVE-2023-54281",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54281"
},
{
"name": "CVE-2026-23113",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23113"
},
{
"name": "CVE-2025-71231",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71231"
},
{
"name": "CVE-2023-54080",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54080"
},
{
"name": "CVE-2025-68798",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68798"
},
{
"name": "CVE-2023-53794",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53794"
},
{
"name": "CVE-2026-23157",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23157"
},
{
"name": "CVE-2025-68810",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68810"
},
{
"name": "CVE-2025-68178",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68178"
},
{
"name": "CVE-2025-40337",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40337"
},
{
"name": "CVE-2025-40346",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40346"
},
{
"name": "CVE-2025-40262",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40262"
},
{
"name": "CVE-2025-39813",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39813"
},
{
"name": "CVE-2025-71198",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71198"
},
{
"name": "CVE-2025-68819",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68819"
},
{
"name": "CVE-2023-54022",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54022"
},
{
"name": "CVE-2025-40261",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40261"
},
{
"name": "CVE-2023-54296",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54296"
},
{
"name": "CVE-2025-40244",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40244"
},
{
"name": "CVE-2025-68735",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68735"
},
{
"name": "CVE-2026-23021",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23021"
},
{
"name": "CVE-2025-68732",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68732"
},
{
"name": "CVE-2025-40323",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40323"
},
{
"name": "CVE-2025-68285",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68285"
},
{
"name": "CVE-2023-54220",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54220"
},
{
"name": "CVE-2025-71183",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71183"
},
{
"name": "CVE-2023-54209",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54209"
},
{
"name": "CVE-2025-40275",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40275"
},
{
"name": "CVE-2023-54019",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54019"
},
{
"name": "CVE-2026-25702",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-25702"
},
{
"name": "CVE-2025-39829",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39829"
},
{
"name": "CVE-2025-71091",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71091"
},
{
"name": "CVE-2026-23053",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23053"
},
{
"name": "CVE-2023-54189",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54189"
},
{
"name": "CVE-2025-71184",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71184"
},
{
"name": "CVE-2025-68227",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68227"
},
{
"name": "CVE-2025-40339",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40339"
},
{
"name": "CVE-2025-40223",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40223"
},
{
"name": "CVE-2023-54230",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54230"
},
{
"name": "CVE-2023-53831",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53831"
},
{
"name": "CVE-2025-68800",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68800"
},
{
"name": "CVE-2025-68195",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68195"
},
{
"name": "CVE-2025-68261",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68261"
},
{
"name": "CVE-2023-54299",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54299"
},
{
"name": "CVE-2023-53768",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53768"
},
{
"name": "CVE-2025-71149",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71149"
},
{
"name": "CVE-2023-54099",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54099"
},
{
"name": "CVE-2025-40319",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40319"
},
{
"name": "CVE-2023-54219",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54219"
},
{
"name": "CVE-2025-68727",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68727"
},
{
"name": "CVE-2023-53847",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53847"
},
{
"name": "CVE-2024-53093",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53093"
},
{
"name": "CVE-2026-23080",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23080"
},
{
"name": "CVE-2023-54121",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54121"
},
{
"name": "CVE-2023-54261",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54261"
},
{
"name": "CVE-2023-54005",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54005"
},
{
"name": "CVE-2025-40351",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40351"
},
{
"name": "CVE-2025-68264",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68264"
},
{
"name": "CVE-2026-23154",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23154"
},
{
"name": "CVE-2025-68764",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68764"
}
],
"initial_release_date": "2026-03-27T00:00:00",
"last_revision_date": "2026-03-27T00:00:00",
"links": [],
"reference": "CERTFR-2026-AVI-0369",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2026-03-27T00:00:00.000000"
}
],
"risks": [
{
"description": "Atteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es"
},
{
"description": "Ex\u00e9cution de code arbitraire"
},
{
"description": "Non sp\u00e9cifi\u00e9 par l\u0027\u00e9diteur"
},
{
"description": "D\u00e9ni de service"
},
{
"description": "Contournement de la politique de s\u00e9curit\u00e9"
},
{
"description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans le noyau Linux de SUSE. Certaines d\u0027entre elles permettent \u00e0 un attaquant de provoquer une ex\u00e9cution de code arbitraire, une atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es et une atteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es.",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans le noyau Linux de SUSE",
"vendor_advisories": [
{
"published_at": "2026-03-23",
"title": "Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-2026:20774-1",
"url": "https://www.suse.com/support/update/announcement/2026/suse-su-202620774-1"
},
{
"published_at": "2026-03-23",
"title": "Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-2026:0970-1",
"url": "https://www.suse.com/support/update/announcement/2026/suse-su-20260970-1"
},
{
"published_at": "2026-03-23",
"title": "Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-2026:0983-1",
"url": "https://www.suse.com/support/update/announcement/2026/suse-su-20260983-1"
},
{
"published_at": "2026-03-24",
"title": "Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-2026:0985-1",
"url": "https://www.suse.com/support/update/announcement/2026/suse-su-20260985-1"
},
{
"published_at": "2026-03-26",
"title": "Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-2026:1077-1",
"url": "https://www.suse.com/support/update/announcement/2026/suse-su-20261077-1"
},
{
"published_at": "2026-03-23",
"title": "Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-2026:20778-1",
"url": "https://www.suse.com/support/update/announcement/2026/suse-su-202620778-1"
},
{
"published_at": "2026-03-23",
"title": "Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-2026:20779-1",
"url": "https://www.suse.com/support/update/announcement/2026/suse-su-202620779-1"
},
{
"published_at": "2026-03-23",
"title": "Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-2026:0961-1",
"url": "https://www.suse.com/support/update/announcement/2026/suse-su-20260961-1"
},
{
"published_at": "2026-03-26",
"title": "Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-2026:1073-1",
"url": "https://www.suse.com/support/update/announcement/2026/suse-su-20261073-1"
},
{
"published_at": "2026-03-23",
"title": "Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-2026:20789-1",
"url": "https://www.suse.com/support/update/announcement/2026/suse-su-202620789-1"
},
{
"published_at": "2026-03-22",
"title": "Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-2026:0946-1",
"url": "https://www.suse.com/support/update/announcement/2026/suse-su-20260946-1"
},
{
"published_at": "2026-03-23",
"title": "Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-2026:0962-1",
"url": "https://www.suse.com/support/update/announcement/2026/suse-su-20260962-1"
},
{
"published_at": "2026-03-23",
"title": "Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-2026:0967-1",
"url": "https://www.suse.com/support/update/announcement/2026/suse-su-20260967-1"
},
{
"published_at": "2026-03-23",
"title": "Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-2026:20775-1",
"url": "https://www.suse.com/support/update/announcement/2026/suse-su-202620775-1"
},
{
"published_at": "2026-03-26",
"title": "Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-2026:1088-1",
"url": "https://www.suse.com/support/update/announcement/2026/suse-su-20261088-1"
},
{
"published_at": "2026-03-20",
"title": "Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-2026:0939-1",
"url": "https://www.suse.com/support/update/announcement/2026/suse-su-20260939-1"
},
{
"published_at": "2026-03-23",
"title": "Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-2026:20814-1",
"url": "https://www.suse.com/support/update/announcement/2026/suse-su-202620814-1"
},
{
"published_at": "2026-03-25",
"title": "Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-2026:1046-1",
"url": "https://www.suse.com/support/update/announcement/2026/suse-su-20261046-1"
},
{
"published_at": "2026-03-23",
"title": "Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-2026:20788-1",
"url": "https://www.suse.com/support/update/announcement/2026/suse-su-202620788-1"
},
{
"published_at": "2026-03-23",
"title": "Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-2026:20786-1",
"url": "https://www.suse.com/support/update/announcement/2026/suse-su-202620786-1"
},
{
"published_at": "2026-03-23",
"title": "Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-2026:0954-1",
"url": "https://www.suse.com/support/update/announcement/2026/suse-su-20260954-1"
},
{
"published_at": "2026-03-23",
"title": "Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-2026:20819-1",
"url": "https://www.suse.com/support/update/announcement/2026/suse-su-202620819-1"
},
{
"published_at": "2026-03-25",
"title": "Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-2026:1045-1",
"url": "https://www.suse.com/support/update/announcement/2026/suse-su-20261045-1"
},
{
"published_at": "2026-03-23",
"title": "Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-2026:20815-1",
"url": "https://www.suse.com/support/update/announcement/2026/suse-su-202620815-1"
},
{
"published_at": "2026-03-26",
"title": "Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-2026:1060-1",
"url": "https://www.suse.com/support/update/announcement/2026/suse-su-20261060-1"
},
{
"published_at": "2026-03-23",
"title": "Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-2026:20790-1",
"url": "https://www.suse.com/support/update/announcement/2026/suse-su-202620790-1"
},
{
"published_at": "2026-03-23",
"title": "Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-2026:20772-1",
"url": "https://www.suse.com/support/update/announcement/2026/suse-su-202620772-1"
},
{
"published_at": "2026-03-23",
"title": "Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-2026:20776-1",
"url": "https://www.suse.com/support/update/announcement/2026/suse-su-202620776-1"
},
{
"published_at": "2026-03-25",
"title": "Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-2026:1002-1",
"url": "https://www.suse.com/support/update/announcement/2026/suse-su-20261002-1"
},
{
"published_at": "2026-03-23",
"title": "Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-2026:0984-1",
"url": "https://www.suse.com/support/update/announcement/2026/suse-su-20260984-1"
},
{
"published_at": "2026-03-23",
"title": "Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-2026:0964-1",
"url": "https://www.suse.com/support/update/announcement/2026/suse-su-20260964-1"
},
{
"published_at": "2026-03-23",
"title": "Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-2026:20781-1",
"url": "https://www.suse.com/support/update/announcement/2026/suse-su-202620781-1"
},
{
"published_at": "2026-03-26",
"title": "Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-2026:1081-1",
"url": "https://www.suse.com/support/update/announcement/2026/suse-su-20261081-1"
},
{
"published_at": "2026-03-26",
"title": "Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-2026:1048-1",
"url": "https://www.suse.com/support/update/announcement/2026/suse-su-20261048-1"
},
{
"published_at": "2026-03-26",
"title": "Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-2026:1059-1",
"url": "https://www.suse.com/support/update/announcement/2026/suse-su-20261059-1"
},
{
"published_at": "2026-03-23",
"title": "Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-2026:0958-1",
"url": "https://www.suse.com/support/update/announcement/2026/suse-su-20260958-1"
},
{
"published_at": "2026-03-25",
"title": "Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-2026:1000-1",
"url": "https://www.suse.com/support/update/announcement/2026/suse-su-20261000-1"
},
{
"published_at": "2026-03-25",
"title": "Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-2026:1039-1",
"url": "https://www.suse.com/support/update/announcement/2026/suse-su-20261039-1"
},
{
"published_at": "2026-03-23",
"title": "Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-2026:20791-1",
"url": "https://www.suse.com/support/update/announcement/2026/suse-su-202620791-1"
},
{
"published_at": "2026-03-23",
"title": "Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-2026:20773-1",
"url": "https://www.suse.com/support/update/announcement/2026/suse-su-202620773-1"
},
{
"published_at": "2026-03-23",
"title": "Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-2026:20816-1",
"url": "https://www.suse.com/support/update/announcement/2026/suse-su-202620816-1"
},
{
"published_at": "2026-03-26",
"title": "Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-2026:1083-1",
"url": "https://www.suse.com/support/update/announcement/2026/suse-su-20261083-1"
},
{
"published_at": "2026-03-22",
"title": "Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-2026:0951-1",
"url": "https://www.suse.com/support/update/announcement/2026/suse-su-20260951-1"
},
{
"published_at": "2026-03-23",
"title": "Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-2026:20787-1",
"url": "https://www.suse.com/support/update/announcement/2026/suse-su-202620787-1"
},
{
"published_at": "2026-03-24",
"title": "Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-2026:0992-1",
"url": "https://www.suse.com/support/update/announcement/2026/suse-su-20260992-1"
},
{
"published_at": "2026-03-23",
"title": "Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-2026:20777-1",
"url": "https://www.suse.com/support/update/announcement/2026/suse-su-202620777-1"
},
{
"published_at": "2026-03-26",
"title": "Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-2026:1089-1",
"url": "https://www.suse.com/support/update/announcement/2026/suse-su-20261089-1"
},
{
"published_at": "2026-03-26",
"title": "Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-2026:1078-1",
"url": "https://www.suse.com/support/update/announcement/2026/suse-su-20261078-1"
},
{
"published_at": "2026-03-24",
"title": "Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-2026:0997-1",
"url": "https://www.suse.com/support/update/announcement/2026/suse-su-20260997-1"
},
{
"published_at": "2026-03-25",
"title": "Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-2026:1003-1",
"url": "https://www.suse.com/support/update/announcement/2026/suse-su-20261003-1"
},
{
"published_at": "2026-03-23",
"title": "Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-2026:20794-1",
"url": "https://www.suse.com/support/update/announcement/2026/suse-su-202620794-1"
},
{
"published_at": "2026-03-25",
"title": "Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-2026:1041-1",
"url": "https://www.suse.com/support/update/announcement/2026/suse-su-20261041-1"
},
{
"published_at": "2026-03-23",
"title": "Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-2026:20780-1",
"url": "https://www.suse.com/support/update/announcement/2026/suse-su-202620780-1"
},
{
"published_at": "2026-03-26",
"title": "Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-2026:1049-1",
"url": "https://www.suse.com/support/update/announcement/2026/suse-su-20261049-1"
},
{
"published_at": "2026-03-25",
"title": "Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-2026:1044-1",
"url": "https://www.suse.com/support/update/announcement/2026/suse-su-20261044-1"
},
{
"published_at": "2026-03-23",
"title": "Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-2026:20817-1",
"url": "https://www.suse.com/support/update/announcement/2026/suse-su-202620817-1"
},
{
"published_at": "2026-03-23",
"title": "Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-2026:20782-1",
"url": "https://www.suse.com/support/update/announcement/2026/suse-su-202620782-1"
},
{
"published_at": "2026-03-23",
"title": "Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-2026:20792-1",
"url": "https://www.suse.com/support/update/announcement/2026/suse-su-202620792-1"
},
{
"published_at": "2026-03-22",
"title": "Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-2026:0953-1",
"url": "https://www.suse.com/support/update/announcement/2026/suse-su-20260953-1"
}
]
}
CERTFR-2026-AVI-0331
Vulnerability from certfr_avis - Published: 2026-03-20 - Updated: 2026-03-20
De multiples vulnérabilités ont été découvertes dans le noyau Linux d'Ubuntu. Certaines d'entre elles permettent à un attaquant de provoquer une élévation de privilèges, une atteinte à la confidentialité des données et une atteinte à l'intégrité des données.
Solutions
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
None| Title | Publication Time | Tags | ||||||||||||||||||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
||||||||||||||||||||||||||||||||||||||||||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "Ubuntu 20.04 ESM",
"product": {
"name": "Ubuntu",
"vendor": {
"name": "Ubuntu",
"scada": false
}
}
},
{
"description": "Ubuntu 24.04 LTS",
"product": {
"name": "Ubuntu",
"vendor": {
"name": "Ubuntu",
"scada": false
}
}
},
{
"description": "Ubuntu 18.04 ESM",
"product": {
"name": "Ubuntu",
"vendor": {
"name": "Ubuntu",
"scada": false
}
}
},
{
"description": "Ubuntu 25.10",
"product": {
"name": "Ubuntu",
"vendor": {
"name": "Ubuntu",
"scada": false
}
}
},
{
"description": "Ubuntu 22.04 LTS",
"product": {
"name": "Ubuntu",
"vendor": {
"name": "Ubuntu",
"scada": false
}
}
}
],
"affected_systems_content": null,
"content": "## Solutions\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des correctifs (cf. section Documentation).",
"cves": [
{
"name": "CVE-2024-36903",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36903"
},
{
"name": "CVE-2025-68234",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68234"
},
{
"name": "CVE-2025-40166",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40166"
},
{
"name": "CVE-2025-71075",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71075"
},
{
"name": "CVE-2025-40273",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40273"
},
{
"name": "CVE-2025-68230",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68230"
},
{
"name": "CVE-2025-39992",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39992"
},
{
"name": "CVE-2026-23202",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23202"
},
{
"name": "CVE-2025-68324",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68324"
},
{
"name": "CVE-2025-39987",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39987"
},
{
"name": "CVE-2025-71086",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71086"
},
{
"name": "CVE-2025-39812",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39812"
},
{
"name": "CVE-2025-40156",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40156"
},
{
"name": "CVE-2025-68342",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68342"
},
{
"name": "CVE-2025-68374",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68374"
},
{
"name": "CVE-2025-40137",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40137"
},
{
"name": "CVE-2025-22107",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22107"
},
{
"name": "CVE-2025-68373",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68373"
},
{
"name": "CVE-2025-39808",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39808"
},
{
"name": "CVE-2025-68286",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68286"
},
{
"name": "CVE-2025-68749",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68749"
},
{
"name": "CVE-2025-40057",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40057"
},
{
"name": "CVE-2025-71094",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71094"
},
{
"name": "CVE-2025-68788",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68788"
},
{
"name": "CVE-2025-40055",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40055"
},
{
"name": "CVE-2025-39876",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39876"
},
{
"name": "CVE-2025-40314",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40314"
},
{
"name": "CVE-2025-40029",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40029"
},
{
"name": "CVE-2025-40037",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40037"
},
{
"name": "CVE-2025-40306",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40306"
},
{
"name": "CVE-2025-40008",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40008"
},
{
"name": "CVE-2025-39947",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39947"
},
{
"name": "CVE-2025-40048",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40048"
},
{
"name": "CVE-2025-68292",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68292"
},
{
"name": "CVE-2025-40254",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40254"
},
{
"name": "CVE-2025-71064",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71064"
},
{
"name": "CVE-2025-40219",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40219"
},
{
"name": "CVE-2025-68200",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68200"
},
{
"name": "CVE-2025-39902",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39902"
},
{
"name": "CVE-2025-40043",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40043"
},
{
"name": "CVE-2025-68176",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68176"
},
{
"name": "CVE-2025-68741",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68741"
},
{
"name": "CVE-2025-68204",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68204"
},
{
"name": "CVE-2025-68795",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68795"
},
{
"name": "CVE-2025-68349",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68349"
},
{
"name": "CVE-2025-39948",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39948"
},
{
"name": "CVE-2025-39826",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39826"
},
{
"name": "CVE-2025-68380",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68380"
},
{
"name": "CVE-2025-68359",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68359"
},
{
"name": "CVE-2025-39973",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39973"
},
{
"name": "CVE-2025-39881",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39881"
},
{
"name": "CVE-2025-68283",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68283"
},
{
"name": "CVE-2021-47599",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47599"
},
{
"name": "CVE-2025-68246",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68246"
},
{
"name": "CVE-2025-68339",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68339"
},
{
"name": "CVE-2025-40287",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40287"
},
{
"name": "CVE-2025-39943",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39943"
},
{
"name": "CVE-2025-39945",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39945"
},
{
"name": "CVE-2026-22992",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-22992"
},
{
"name": "CVE-2022-49465",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49465"
},
{
"name": "CVE-2025-39883",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39883"
},
{
"name": "CVE-2025-68295",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68295"
},
{
"name": "CVE-2025-23129",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-23129"
},
{
"name": "CVE-2025-68728",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68728"
},
{
"name": "CVE-2025-68364",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68364"
},
{
"name": "CVE-2025-40100",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40100"
},
{
"name": "CVE-2025-71087",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71087"
},
{
"name": "CVE-2025-40285",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40285"
},
{
"name": "CVE-2025-39827",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39827"
},
{
"name": "CVE-2025-22106",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22106"
},
{
"name": "CVE-2025-68287",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68287"
},
{
"name": "CVE-2025-40240",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40240"
},
{
"name": "CVE-2025-39828",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39828"
},
{
"name": "CVE-2025-40081",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40081"
},
{
"name": "CVE-2025-68746",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68746"
},
{
"name": "CVE-2025-71133",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71133"
},
{
"name": "CVE-2025-40026",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40026"
},
{
"name": "CVE-2025-40153",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40153"
},
{
"name": "CVE-2025-40103",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40103"
},
{
"name": "CVE-2026-23020",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23020"
},
{
"name": "CVE-2025-40294",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40294"
},
{
"name": "CVE-2025-68796",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68796"
},
{
"name": "CVE-2025-40016",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40016"
},
{
"name": "CVE-2025-40121",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40121"
},
{
"name": "CVE-2025-40265",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40265"
},
{
"name": "CVE-2025-40312",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40312"
},
{
"name": "CVE-2025-40204",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40204"
},
{
"name": "CVE-2025-68220",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68220"
},
{
"name": "CVE-2025-22125",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22125"
},
{
"name": "CVE-2025-40171",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40171"
},
{
"name": "CVE-2025-68302",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68302"
},
{
"name": "CVE-2025-68238",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68238"
},
{
"name": "CVE-2025-68297",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68297"
},
{
"name": "CVE-2025-68299",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68299"
},
{
"name": "CVE-2025-40221",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40221"
},
{
"name": "CVE-2025-68804",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68804"
},
{
"name": "CVE-2025-68769",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68769"
},
{
"name": "CVE-2025-39811",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39811"
},
{
"name": "CVE-2025-40056",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40056"
},
{
"name": "CVE-2025-39911",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39911"
},
{
"name": "CVE-2025-40125",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40125"
},
{
"name": "CVE-2025-40350",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40350"
},
{
"name": "CVE-2025-40309",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40309"
},
{
"name": "CVE-2025-40349",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40349"
},
{
"name": "CVE-2025-40052",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40052"
},
{
"name": "CVE-2025-68334",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68334"
},
{
"name": "CVE-2025-40343",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40343"
},
{
"name": "CVE-2025-68173",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68173"
},
{
"name": "CVE-2025-22103",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22103"
},
{
"name": "CVE-2025-68307",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68307"
},
{
"name": "CVE-2025-40308",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40308"
},
{
"name": "CVE-2025-40187",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40187"
},
{
"name": "CVE-2025-40315",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40315"
},
{
"name": "CVE-2025-37860",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37860"
},
{
"name": "CVE-2025-39913",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39913"
},
{
"name": "CVE-2025-68231",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68231"
},
{
"name": "CVE-2025-39950",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39950"
},
{
"name": "CVE-2025-40092",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40092"
},
{
"name": "CVE-2025-71098",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71098"
},
{
"name": "CVE-2025-40251",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40251"
},
{
"name": "CVE-2025-71078",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71078"
},
{
"name": "CVE-2025-39967",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39967"
},
{
"name": "CVE-2025-68184",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68184"
},
{
"name": "CVE-2025-40107",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40107"
},
{
"name": "CVE-2025-71083",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71083"
},
{
"name": "CVE-2025-40115",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40115"
},
{
"name": "CVE-2025-68813",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68813"
},
{
"name": "CVE-2026-23047",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23047"
},
{
"name": "CVE-2025-22121",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22121"
},
{
"name": "CVE-2025-68265",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68265"
},
{
"name": "CVE-2025-71085",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71085"
},
{
"name": "CVE-2025-39920",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39920"
},
{
"name": "CVE-2025-40058",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40058"
},
{
"name": "CVE-2025-68344",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68344"
},
{
"name": "CVE-2025-40347",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40347"
},
{
"name": "CVE-2025-71154",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71154"
},
{
"name": "CVE-2025-40198",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40198"
},
{
"name": "CVE-2025-39942",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39942"
},
{
"name": "CVE-2025-68310",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68310"
},
{
"name": "CVE-2025-68179",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68179"
},
{
"name": "CVE-2025-68229",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68229"
},
{
"name": "CVE-2025-68257",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68257"
},
{
"name": "CVE-2025-39929",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39929"
},
{
"name": "CVE-2025-39949",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39949"
},
{
"name": "CVE-2025-71084",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71084"
},
{
"name": "CVE-2025-40173",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40173"
},
{
"name": "CVE-2025-68321",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68321"
},
{
"name": "CVE-2025-68347",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68347"
},
{
"name": "CVE-2025-40010",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40010"
},
{
"name": "CVE-2025-39944",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39944"
},
{
"name": "CVE-2025-39923",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39923"
},
{
"name": "CVE-2025-68235",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68235"
},
{
"name": "CVE-2025-39866",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39866"
},
{
"name": "CVE-2025-39843",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39843"
},
{
"name": "CVE-2025-40311",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40311"
},
{
"name": "CVE-2025-68814",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68814"
},
{
"name": "CVE-2025-40237",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40237"
},
{
"name": "CVE-2025-68780",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68780"
},
{
"name": "CVE-2025-39953",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39953"
},
{
"name": "CVE-2025-71081",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71081"
},
{
"name": "CVE-2025-68738",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68738"
},
{
"name": "CVE-2025-40167",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40167"
},
{
"name": "CVE-2025-38105",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38105"
},
{
"name": "CVE-2025-39969",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39969"
},
{
"name": "CVE-2025-71121",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71121"
},
{
"name": "CVE-2025-40194",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40194"
},
{
"name": "CVE-2025-40333",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40333"
},
{
"name": "CVE-2025-38022",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38022"
},
{
"name": "CVE-2025-40245",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40245"
},
{
"name": "CVE-2025-39899",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39899"
},
{
"name": "CVE-2025-68754",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68754"
},
{
"name": "CVE-2025-40360",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40360"
},
{
"name": "CVE-2025-71136",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71136"
},
{
"name": "CVE-2025-22105",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22105"
},
{
"name": "CVE-2025-68354",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68354"
},
{
"name": "CVE-2025-68801",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68801"
},
{
"name": "CVE-2025-21833",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21833"
},
{
"name": "CVE-2025-40104",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40104"
},
{
"name": "CVE-2025-68258",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68258"
},
{
"name": "CVE-2025-39853",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39853"
},
{
"name": "CVE-2025-40001",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40001"
},
{
"name": "CVE-2025-39871",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39871"
},
{
"name": "CVE-2025-39857",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39857"
},
{
"name": "CVE-2025-38709",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38709"
},
{
"name": "CVE-2025-40035",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40035"
},
{
"name": "CVE-2025-40322",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40322"
},
{
"name": "CVE-2025-39988",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39988"
},
{
"name": "CVE-2025-40313",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40313"
},
{
"name": "CVE-2025-39865",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39865"
},
{
"name": "CVE-2025-40233",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40233"
},
{
"name": "CVE-2025-40172",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40172"
},
{
"name": "CVE-2025-40020",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40020"
},
{
"name": "CVE-2025-40188",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40188"
},
{
"name": "CVE-2025-40271",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40271"
},
{
"name": "CVE-2025-68306",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68306"
},
{
"name": "CVE-2025-39877",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39877"
},
{
"name": "CVE-2026-22991",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-22991"
},
{
"name": "CVE-2025-38502",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38502"
},
{
"name": "CVE-2025-68300",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68300"
},
{
"name": "CVE-2025-39886",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39886"
},
{
"name": "CVE-2025-68763",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68763"
},
{
"name": "CVE-2025-68294",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68294"
},
{
"name": "CVE-2025-40290",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40290"
},
{
"name": "CVE-2025-68308",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68308"
},
{
"name": "CVE-2025-40249",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40249"
},
{
"name": "CVE-2025-40242",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40242"
},
{
"name": "CVE-2025-39838",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39838"
},
{
"name": "CVE-2025-39823",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39823"
},
{
"name": "CVE-2025-68198",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68198"
},
{
"name": "CVE-2025-39864",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39864"
},
{
"name": "CVE-2025-40013",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40013"
},
{
"name": "CVE-2025-68190",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68190"
},
{
"name": "CVE-2025-40169",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40169"
},
{
"name": "CVE-2025-39824",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39824"
},
{
"name": "CVE-2026-23207",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23207"
},
{
"name": "CVE-2025-40252",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40252"
},
{
"name": "CVE-2025-68218",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68218"
},
{
"name": "CVE-2025-40049",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40049"
},
{
"name": "CVE-2025-68255",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68255"
},
{
"name": "CVE-2025-68322",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68322"
},
{
"name": "CVE-2026-22980",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-22980"
},
{
"name": "CVE-2025-39927",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39927"
},
{
"name": "CVE-2025-40024",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40024"
},
{
"name": "CVE-2025-40238",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40238"
},
{
"name": "CVE-2025-40277",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40277"
},
{
"name": "CVE-2025-40070",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40070"
},
{
"name": "CVE-2025-40106",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40106"
},
{
"name": "CVE-2025-40272",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40272"
},
{
"name": "CVE-2025-39842",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39842"
},
{
"name": "CVE-2025-40047",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40047"
},
{
"name": "CVE-2025-71093",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71093"
},
{
"name": "CVE-2025-71102",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71102"
},
{
"name": "CVE-2025-68759",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68759"
},
{
"name": "CVE-2026-23019",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23019"
},
{
"name": "CVE-2025-39815",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39815"
},
{
"name": "CVE-2025-40345",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40345"
},
{
"name": "CVE-2025-40205",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40205"
},
{
"name": "CVE-2025-39849",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39849"
},
{
"name": "CVE-2025-40033",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40033"
},
{
"name": "CVE-2025-68733",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68733"
},
{
"name": "CVE-2025-39894",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39894"
},
{
"name": "CVE-2025-39861",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39861"
},
{
"name": "CVE-2025-68215",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68215"
},
{
"name": "CVE-2025-40269",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40269"
},
{
"name": "CVE-2025-68228",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68228"
},
{
"name": "CVE-2025-68335",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68335"
},
{
"name": "CVE-2025-71079",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71079"
},
{
"name": "CVE-2025-62626",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-62626"
},
{
"name": "CVE-2025-39940",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39940"
},
{
"name": "CVE-2025-68338",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68338"
},
{
"name": "CVE-2025-68304",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68304"
},
{
"name": "CVE-2025-68370",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68370"
},
{
"name": "CVE-2025-39977",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39977"
},
{
"name": "CVE-2025-68330",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68330"
},
{
"name": "CVE-2025-40027",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40027"
},
{
"name": "CVE-2025-39885",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39885"
},
{
"name": "CVE-2025-68180",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68180"
},
{
"name": "CVE-2025-68343",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68343"
},
{
"name": "CVE-2025-68726",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68726"
},
{
"name": "CVE-2025-21780",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21780"
},
{
"name": "CVE-2025-68201",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68201"
},
{
"name": "CVE-2025-40289",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40289"
},
{
"name": "CVE-2025-68785",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68785"
},
{
"name": "CVE-2024-37354",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-37354"
},
{
"name": "CVE-2025-68808",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68808"
},
{
"name": "CVE-2025-68748",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68748"
},
{
"name": "CVE-2025-68223",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68223"
},
{
"name": "CVE-2025-68783",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68783"
},
{
"name": "CVE-2025-39970",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39970"
},
{
"name": "CVE-2025-40292",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40292"
},
{
"name": "CVE-2025-71147",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71147"
},
{
"name": "CVE-2025-40032",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40032"
},
{
"name": "CVE-2025-39981",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39981"
},
{
"name": "CVE-2025-68724",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68724"
},
{
"name": "CVE-2025-39994",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39994"
},
{
"name": "CVE-2022-48875",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48875"
},
{
"name": "CVE-2025-68797",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68797"
},
{
"name": "CVE-2025-38627",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38627"
},
{
"name": "CVE-2024-49968",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49968"
},
{
"name": "CVE-2025-68358",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68358"
},
{
"name": "CVE-2025-40206",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40206"
},
{
"name": "CVE-2025-40218",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40218"
},
{
"name": "CVE-2025-40088",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40088"
},
{
"name": "CVE-2025-40220",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40220"
},
{
"name": "CVE-2025-39845",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39845"
},
{
"name": "CVE-2025-68237",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68237"
},
{
"name": "CVE-2025-40257",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40257"
},
{
"name": "CVE-2025-68259",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68259"
},
{
"name": "CVE-2025-71125",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71125"
},
{
"name": "CVE-2025-71108",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71108"
},
{
"name": "CVE-2025-71069",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71069"
},
{
"name": "CVE-2025-68312",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68312"
},
{
"name": "CVE-2025-68284",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68284"
},
{
"name": "CVE-2025-40062",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40062"
},
{
"name": "CVE-2025-68194",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68194"
},
{
"name": "CVE-2025-68356",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68356"
},
{
"name": "CVE-2025-40067",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40067"
},
{
"name": "CVE-2025-40109",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40109"
},
{
"name": "CVE-2025-40101",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40101"
},
{
"name": "CVE-2025-40006",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40006"
},
{
"name": "CVE-2025-40038",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40038"
},
{
"name": "CVE-2025-68183",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68183"
},
{
"name": "CVE-2025-39805",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39805"
},
{
"name": "CVE-2025-68774",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68774"
},
{
"name": "CVE-2025-40263",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40263"
},
{
"name": "CVE-2025-40353",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40353"
},
{
"name": "CVE-2025-40011",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40011"
},
{
"name": "CVE-2025-40085",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40085"
},
{
"name": "CVE-2025-71180",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71180"
},
{
"name": "CVE-2025-68244",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68244"
},
{
"name": "CVE-2025-40231",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40231"
},
{
"name": "CVE-2024-46830",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46830"
},
{
"name": "CVE-2024-47666",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47666"
},
{
"name": "CVE-2025-40278",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40278"
},
{
"name": "CVE-2025-22113",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22113"
},
{
"name": "CVE-2025-40176",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40176"
},
{
"name": "CVE-2025-40342",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40342"
},
{
"name": "CVE-2025-71128",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71128"
},
{
"name": "CVE-2025-71082",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71082"
},
{
"name": "CVE-2025-68222",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68222"
},
{
"name": "CVE-2025-68743",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68743"
},
{
"name": "CVE-2025-68765",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68765"
},
{
"name": "CVE-2025-23143",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-23143"
},
{
"name": "CVE-2025-71132",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71132"
},
{
"name": "CVE-2025-40193",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40193"
},
{
"name": "CVE-2025-71077",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71077"
},
{
"name": "CVE-2024-36927",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36927"
},
{
"name": "CVE-2025-40279",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40279"
},
{
"name": "CVE-2025-68328",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68328"
},
{
"name": "CVE-2025-40201",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40201"
},
{
"name": "CVE-2025-40084",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40084"
},
{
"name": "CVE-2025-22111",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22111"
},
{
"name": "CVE-2025-68232",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68232"
},
{
"name": "CVE-2025-68311",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68311"
},
{
"name": "CVE-2025-71114",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71114"
},
{
"name": "CVE-2025-68348",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68348"
},
{
"name": "CVE-2025-68744",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68744"
},
{
"name": "CVE-2025-71182",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71182"
},
{
"name": "CVE-2025-68320",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68320"
},
{
"name": "CVE-2025-40341",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40341"
},
{
"name": "CVE-2025-40183",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40183"
},
{
"name": "CVE-2026-22990",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-22990"
},
{
"name": "CVE-2025-68376",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68376"
},
{
"name": "CVE-2025-68172",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68172"
},
{
"name": "CVE-2025-39998",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39998"
},
{
"name": "CVE-2025-68821",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68821"
},
{
"name": "CVE-2025-40134",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40134"
},
{
"name": "CVE-2025-68325",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68325"
},
{
"name": "CVE-2025-39968",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39968"
},
{
"name": "CVE-2025-40358",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40358"
},
{
"name": "CVE-2025-40165",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40165"
},
{
"name": "CVE-2025-68341",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68341"
},
{
"name": "CVE-2025-68296",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68296"
},
{
"name": "CVE-2025-68361",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68361"
},
{
"name": "CVE-2025-40328",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40328"
},
{
"name": "CVE-2025-68332",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68332"
},
{
"name": "CVE-2025-39986",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39986"
},
{
"name": "CVE-2025-71104",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71104"
},
{
"name": "CVE-2026-22978",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-22978"
},
{
"name": "CVE-2025-39901",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39901"
},
{
"name": "CVE-2025-40283",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40283"
},
{
"name": "CVE-2025-39955",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39955"
},
{
"name": "CVE-2025-40324",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40324"
},
{
"name": "CVE-2025-68378",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68378"
},
{
"name": "CVE-2025-68752",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68752"
},
{
"name": "CVE-2025-38129",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38129"
},
{
"name": "CVE-2025-40250",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40250"
},
{
"name": "CVE-2025-40264",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40264"
},
{
"name": "CVE-2025-40255",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40255"
},
{
"name": "CVE-2025-40246",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40246"
},
{
"name": "CVE-2025-68367",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68367"
},
{
"name": "CVE-2025-40226",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40226"
},
{
"name": "CVE-2025-40078",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40078"
},
{
"name": "CVE-2025-68820",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68820"
},
{
"name": "CVE-2025-68756",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68756"
},
{
"name": "CVE-2025-40321",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40321"
},
{
"name": "CVE-2025-68360",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68360"
},
{
"name": "CVE-2025-40116",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40116"
},
{
"name": "CVE-2025-39895",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39895"
},
{
"name": "CVE-2025-68249",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68249"
},
{
"name": "CVE-2025-68740",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68740"
},
{
"name": "CVE-2025-39934",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39934"
},
{
"name": "CVE-2025-39978",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39978"
},
{
"name": "CVE-2025-40179",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40179"
},
{
"name": "CVE-2025-68742",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68742"
},
{
"name": "CVE-2025-40127",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40127"
},
{
"name": "CVE-2025-40282",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40282"
},
{
"name": "CVE-2025-39996",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39996"
},
{
"name": "CVE-2025-40053",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40053"
},
{
"name": "CVE-2025-39951",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39951"
},
{
"name": "CVE-2025-40120",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40120"
},
{
"name": "CVE-2025-68816",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68816"
},
{
"name": "CVE-2025-39914",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39914"
},
{
"name": "CVE-2025-68192",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68192"
},
{
"name": "CVE-2025-39697",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39697"
},
{
"name": "CVE-2025-68379",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68379"
},
{
"name": "CVE-2025-68256",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68256"
},
{
"name": "CVE-2025-68777",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68777"
},
{
"name": "CVE-2025-68254",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68254"
},
{
"name": "CVE-2025-39938",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39938"
},
{
"name": "CVE-2025-40243",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40243"
},
{
"name": "CVE-2025-40196",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40196"
},
{
"name": "CVE-2025-39982",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39982"
},
{
"name": "CVE-2025-40129",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40129"
},
{
"name": "CVE-2025-39965",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39965"
},
{
"name": "CVE-2025-38556",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38556"
},
{
"name": "CVE-2025-68171",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68171"
},
{
"name": "CVE-2025-39932",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39932"
},
{
"name": "CVE-2025-40301",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40301"
},
{
"name": "CVE-2025-40040",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40040"
},
{
"name": "CVE-2025-39810",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39810"
},
{
"name": "CVE-2026-22982",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-22982"
},
{
"name": "CVE-2025-68298",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68298"
},
{
"name": "CVE-2025-40207",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40207"
},
{
"name": "CVE-2025-40095",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40095"
},
{
"name": "CVE-2025-68747",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68747"
},
{
"name": "CVE-2025-71118",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71118"
},
{
"name": "CVE-2025-39860",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39860"
},
{
"name": "CVE-2025-40286",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40286"
},
{
"name": "CVE-2025-68327",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68327"
},
{
"name": "CVE-2025-40318",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40318"
},
{
"name": "CVE-2025-40266",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40266"
},
{
"name": "CVE-2025-68241",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68241"
},
{
"name": "CVE-2025-40118",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40118"
},
{
"name": "CVE-2025-40021",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40021"
},
{
"name": "CVE-2025-39839",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39839"
},
{
"name": "CVE-2025-68734",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68734"
},
{
"name": "CVE-2025-68776",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68776"
},
{
"name": "CVE-2025-71066",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71066"
},
{
"name": "CVE-2025-39848",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39848"
},
{
"name": "CVE-2025-68799",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68799"
},
{
"name": "CVE-2025-68345",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68345"
},
{
"name": "CVE-2025-40044",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40044"
},
{
"name": "CVE-2025-71097",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71097"
},
{
"name": "CVE-2025-40105",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40105"
},
{
"name": "CVE-2025-68288",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68288"
},
{
"name": "CVE-2025-68739",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68739"
},
{
"name": "CVE-2025-39916",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39916"
},
{
"name": "CVE-2025-40112",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40112"
},
{
"name": "CVE-2025-40079",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40079"
},
{
"name": "CVE-2025-40260",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40260"
},
{
"name": "CVE-2025-40310",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40310"
},
{
"name": "CVE-2025-40083",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40083"
},
{
"name": "CVE-2025-71111",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71111"
},
{
"name": "CVE-2025-39971",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39971"
},
{
"name": "CVE-2025-40154",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40154"
},
{
"name": "CVE-2025-40331",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40331"
},
{
"name": "CVE-2025-68337",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68337"
},
{
"name": "CVE-2025-40093",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40093"
},
{
"name": "CVE-2025-39825",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39825"
},
{
"name": "CVE-2025-71131",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71131"
},
{
"name": "CVE-2025-39852",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39852"
},
{
"name": "CVE-2025-71116",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71116"
},
{
"name": "CVE-2025-40235",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40235"
},
{
"name": "CVE-2025-39991",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39991"
},
{
"name": "CVE-2025-68281",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68281"
},
{
"name": "CVE-2025-68729",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68729"
},
{
"name": "CVE-2025-68208",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68208"
},
{
"name": "CVE-2025-68362",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68362"
},
{
"name": "CVE-2025-68236",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68236"
},
{
"name": "CVE-2025-68333",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68333"
},
{
"name": "CVE-2025-39806",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39806"
},
{
"name": "CVE-2025-68290",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68290"
},
{
"name": "CVE-2025-40280",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40280"
},
{
"name": "CVE-2025-40099",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40099"
},
{
"name": "CVE-2025-40031",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40031"
},
{
"name": "CVE-2025-40180",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40180"
},
{
"name": "CVE-2025-40293",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40293"
},
{
"name": "CVE-2025-68751",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68751"
},
{
"name": "CVE-2025-68803",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68803"
},
{
"name": "CVE-2025-39851",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39851"
},
{
"name": "CVE-2025-68331",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68331"
},
{
"name": "CVE-2025-40126",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40126"
},
{
"name": "CVE-2025-39972",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39972"
},
{
"name": "CVE-2026-22976",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-22976"
},
{
"name": "CVE-2025-68760",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68760"
},
{
"name": "CVE-2025-68305",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68305"
},
{
"name": "CVE-2025-68352",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68352"
},
{
"name": "CVE-2025-68214",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68214"
},
{
"name": "CVE-2025-40320",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40320"
},
{
"name": "CVE-2025-39870",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39870"
},
{
"name": "CVE-2025-40247",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40247"
},
{
"name": "CVE-2025-68375",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68375"
},
{
"name": "CVE-2025-68753",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68753"
},
{
"name": "CVE-2025-68369",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68369"
},
{
"name": "CVE-2025-39807",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39807"
},
{
"name": "CVE-2025-71112",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71112"
},
{
"name": "CVE-2025-22022",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22022"
},
{
"name": "CVE-2025-40192",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40192"
},
{
"name": "CVE-2025-40200",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40200"
},
{
"name": "CVE-2025-68818",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68818"
},
{
"name": "CVE-2025-40124",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40124"
},
{
"name": "CVE-2025-39880",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39880"
},
{
"name": "CVE-2025-40094",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40094"
},
{
"name": "CVE-2025-40160",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40160"
},
{
"name": "CVE-2025-40284",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40284"
},
{
"name": "CVE-2025-40077",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40077"
},
{
"name": "CVE-2024-41014",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41014"
},
{
"name": "CVE-2025-40071",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40071"
},
{
"name": "CVE-2025-68329",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68329"
},
{
"name": "CVE-2025-68366",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68366"
},
{
"name": "CVE-2025-40305",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40305"
},
{
"name": "CVE-2025-40080",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40080"
},
{
"name": "CVE-2025-39846",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39846"
},
{
"name": "CVE-2025-68815",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68815"
},
{
"name": "CVE-2025-40215",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40215"
},
{
"name": "CVE-2025-40307",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40307"
},
{
"name": "CVE-2025-40111",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40111"
},
{
"name": "CVE-2025-68346",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68346"
},
{
"name": "CVE-2025-40211",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40211"
},
{
"name": "CVE-2025-40068",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40068"
},
{
"name": "CVE-2025-68315",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68315"
},
{
"name": "CVE-2025-39850",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39850"
},
{
"name": "CVE-2022-49072",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49072"
},
{
"name": "CVE-2025-40042",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40042"
},
{
"name": "CVE-2025-40155",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40155"
},
{
"name": "CVE-2025-71096",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71096"
},
{
"name": "CVE-2025-39844",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39844"
},
{
"name": "CVE-2025-71105",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71105"
},
{
"name": "CVE-2025-68266",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68266"
},
{
"name": "CVE-2025-68771",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68771"
},
{
"name": "CVE-2025-39961",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39961"
},
{
"name": "CVE-2025-68363",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68363"
},
{
"name": "CVE-2025-40248",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40248"
},
{
"name": "CVE-2026-22984",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-22984"
},
{
"name": "CVE-2024-49927",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49927"
},
{
"name": "CVE-2025-68303",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68303"
},
{
"name": "CVE-2025-39863",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39863"
},
{
"name": "CVE-2025-40259",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40259"
},
{
"name": "CVE-2025-68757",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68757"
},
{
"name": "CVE-2025-71068",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71068"
},
{
"name": "CVE-2025-23130",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-23130"
},
{
"name": "CVE-2025-40329",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40329"
},
{
"name": "CVE-2025-39957",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39957"
},
{
"name": "CVE-2025-39931",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39931"
},
{
"name": "CVE-2026-22977",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-22977"
},
{
"name": "CVE-2025-39937",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39937"
},
{
"name": "CVE-2025-68766",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68766"
},
{
"name": "CVE-2025-39817",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39817"
},
{
"name": "CVE-2025-40060",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40060"
},
{
"name": "CVE-2025-39891",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39891"
},
{
"name": "CVE-2025-40059",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40059"
},
{
"name": "CVE-2025-68168",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68168"
},
{
"name": "CVE-2025-39897",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39897"
},
{
"name": "CVE-2025-68326",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68326"
},
{
"name": "CVE-2025-68372",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68372"
},
{
"name": "CVE-2025-22124",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22124"
},
{
"name": "CVE-2025-68313",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68313"
},
{
"name": "CVE-2025-71137",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71137"
},
{
"name": "CVE-2025-40123",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40123"
},
{
"name": "CVE-2025-68301",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68301"
},
{
"name": "CVE-2025-39854",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39854"
},
{
"name": "CVE-2025-68217",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68217"
},
{
"name": "CVE-2025-40178",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40178"
},
{
"name": "CVE-2025-68212",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68212"
},
{
"name": "CVE-2025-68289",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68289"
},
{
"name": "CVE-2025-40363",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40363"
},
{
"name": "CVE-2025-39869",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39869"
},
{
"name": "CVE-2025-40253",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40253"
},
{
"name": "CVE-2025-39985",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39985"
},
{
"name": "CVE-2025-68245",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68245"
},
{
"name": "CVE-2025-68730",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68730"
},
{
"name": "CVE-2025-68213",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68213"
},
{
"name": "CVE-2025-39952",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39952"
},
{
"name": "CVE-2025-40317",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40317"
},
{
"name": "CVE-2025-68233",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68233"
},
{
"name": "CVE-2025-71120",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71120"
},
{
"name": "CVE-2025-68282",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68282"
},
{
"name": "CVE-2025-68225",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68225"
},
{
"name": "CVE-2025-68787",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68787"
},
{
"name": "CVE-2025-23133",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-23133"
},
{
"name": "CVE-2025-68782",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68782"
},
{
"name": "CVE-2025-68177",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68177"
},
{
"name": "CVE-2025-68758",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68758"
},
{
"name": "CVE-2025-68191",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68191"
},
{
"name": "CVE-2025-71113",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71113"
},
{
"name": "CVE-2025-71127",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71127"
},
{
"name": "CVE-2025-40141",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40141"
},
{
"name": "CVE-2025-68340",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68340"
},
{
"name": "CVE-2025-39678",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39678"
},
{
"name": "CVE-2025-68219",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68219"
},
{
"name": "CVE-2025-40288",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40288"
},
{
"name": "CVE-2025-40258",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40258"
},
{
"name": "CVE-2025-40281",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40281"
},
{
"name": "CVE-2025-68185",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68185"
},
{
"name": "CVE-2025-40304",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40304"
},
{
"name": "CVE-2025-40110",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40110"
},
{
"name": "CVE-2025-40268",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40268"
},
{
"name": "CVE-2025-39980",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39980"
},
{
"name": "CVE-2025-40009",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40009"
},
{
"name": "CVE-2025-68336",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68336"
},
{
"name": "CVE-2025-40303",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40303"
},
{
"name": "CVE-2025-68323",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68323"
},
{
"name": "CVE-2025-68178",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68178"
},
{
"name": "CVE-2025-40337",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40337"
},
{
"name": "CVE-2025-40346",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40346"
},
{
"name": "CVE-2025-40036",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40036"
},
{
"name": "CVE-2025-68221",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68221"
},
{
"name": "CVE-2025-39832",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39832"
},
{
"name": "CVE-2025-40000",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40000"
},
{
"name": "CVE-2025-40262",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40262"
},
{
"name": "CVE-2025-68262",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68262"
},
{
"name": "CVE-2025-39813",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39813"
},
{
"name": "CVE-2025-68819",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68819"
},
{
"name": "CVE-2025-40261",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40261"
},
{
"name": "CVE-2025-38643",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38643"
},
{
"name": "CVE-2025-40030",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40030"
},
{
"name": "CVE-2025-40244",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40244"
},
{
"name": "CVE-2025-39995",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39995"
},
{
"name": "CVE-2025-68735",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68735"
},
{
"name": "CVE-2026-23021",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23021"
},
{
"name": "CVE-2025-39847",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39847"
},
{
"name": "CVE-2025-39819",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39819"
},
{
"name": "CVE-2025-68732",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68732"
},
{
"name": "CVE-2025-40323",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40323"
},
{
"name": "CVE-2025-39835",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39835"
},
{
"name": "CVE-2025-68285",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68285"
},
{
"name": "CVE-2025-40096",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40096"
},
{
"name": "CVE-2024-56640",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56640"
},
{
"name": "CVE-2025-39841",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39841"
},
{
"name": "CVE-2025-68371",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68371"
},
{
"name": "CVE-2025-40275",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40275"
},
{
"name": "CVE-2025-39907",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39907"
},
{
"name": "CVE-2025-39829",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39829"
},
{
"name": "CVE-2025-71091",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71091"
},
{
"name": "CVE-2025-39909",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39909"
},
{
"name": "CVE-2025-68227",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68227"
},
{
"name": "CVE-2025-40339",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40339"
},
{
"name": "CVE-2025-40140",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40140"
},
{
"name": "CVE-2025-40223",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40223"
},
{
"name": "CVE-2025-40061",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40061"
},
{
"name": "CVE-2025-68263",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68263"
},
{
"name": "CVE-2025-68293",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68293"
},
{
"name": "CVE-2025-68800",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68800"
},
{
"name": "CVE-2025-68261",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68261"
},
{
"name": "CVE-2025-68755",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68755"
},
{
"name": "CVE-2025-68767",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68767"
},
{
"name": "CVE-2022-49267",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49267"
},
{
"name": "CVE-2025-39873",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39873"
},
{
"name": "CVE-2025-40159",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40159"
},
{
"name": "CVE-2025-40319",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40319"
},
{
"name": "CVE-2025-68727",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68727"
},
{
"name": "CVE-2025-39836",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39836"
},
{
"name": "CVE-2025-40051",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40051"
},
{
"name": "CVE-2025-40351",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40351"
},
{
"name": "CVE-2025-68264",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68264"
},
{
"name": "CVE-2025-40087",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40087"
},
{
"name": "CVE-2025-68762",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68762"
},
{
"name": "CVE-2025-68764",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68764"
}
],
"initial_release_date": "2026-03-20T00:00:00",
"last_revision_date": "2026-03-20T00:00:00",
"links": [],
"reference": "CERTFR-2026-AVI-0331",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2026-03-20T00:00:00.000000"
}
],
"risks": [
{
"description": "Atteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es"
},
{
"description": "Non sp\u00e9cifi\u00e9 par l\u0027\u00e9diteur"
},
{
"description": "D\u00e9ni de service"
},
{
"description": "Contournement de la politique de s\u00e9curit\u00e9"
},
{
"description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
},
{
"description": "\u00c9l\u00e9vation de privil\u00e8ges"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans le noyau Linux d\u0027Ubuntu. Certaines d\u0027entre elles permettent \u00e0 un attaquant de provoquer une \u00e9l\u00e9vation de privil\u00e8ges, une atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es et une atteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es.",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans le noyau Linux d\u0027Ubuntu",
"vendor_advisories": [
{
"published_at": "2026-03-16",
"title": "Bulletin de s\u00e9curit\u00e9 Ubuntu USN-8096-2",
"url": "https://ubuntu.com/security/notices/USN-8096-2"
},
{
"published_at": "2026-03-16",
"title": "Bulletin de s\u00e9curit\u00e9 Ubuntu USN-8095-1",
"url": "https://ubuntu.com/security/notices/USN-8095-1"
},
{
"published_at": "2026-03-17",
"title": "Bulletin de s\u00e9curit\u00e9 Ubuntu USN-8096-4",
"url": "https://ubuntu.com/security/notices/USN-8096-4"
},
{
"published_at": "2026-03-16",
"title": "Bulletin de s\u00e9curit\u00e9 Ubuntu USN-8098-1",
"url": "https://ubuntu.com/security/notices/USN-8098-1"
},
{
"published_at": "2026-03-17",
"title": "Bulletin de s\u00e9curit\u00e9 Ubuntu USN-8094-2",
"url": "https://ubuntu.com/security/notices/USN-8094-2"
},
{
"published_at": "2026-03-16",
"title": "Bulletin de s\u00e9curit\u00e9 Ubuntu USN-8100-1",
"url": "https://ubuntu.com/security/notices/USN-8100-1"
},
{
"published_at": "2026-03-18",
"title": "Bulletin de s\u00e9curit\u00e9 Ubuntu USN-8107-1",
"url": "https://ubuntu.com/security/notices/USN-8107-1"
},
{
"published_at": "2026-03-16",
"title": "Bulletin de s\u00e9curit\u00e9 Ubuntu USN-8094-1",
"url": "https://ubuntu.com/security/notices/USN-8094-1"
},
{
"published_at": "2026-03-18",
"title": "Bulletin de s\u00e9curit\u00e9 Ubuntu USN-8098-3",
"url": "https://ubuntu.com/security/notices/USN-8098-3"
},
{
"published_at": "2026-03-16",
"title": "Bulletin de s\u00e9curit\u00e9 Ubuntu USN-8095-2",
"url": "https://ubuntu.com/security/notices/USN-8095-2"
},
{
"published_at": "2026-03-17",
"title": "Bulletin de s\u00e9curit\u00e9 Ubuntu USN-8096-3",
"url": "https://ubuntu.com/security/notices/USN-8096-3"
},
{
"published_at": "2026-03-16",
"title": "Bulletin de s\u00e9curit\u00e9 Ubuntu USN-8096-1",
"url": "https://ubuntu.com/security/notices/USN-8096-1"
},
{
"published_at": "2026-03-17",
"title": "Bulletin de s\u00e9curit\u00e9 Ubuntu USN-8095-3",
"url": "https://ubuntu.com/security/notices/USN-8095-3"
},
{
"published_at": "2026-03-17",
"title": "Bulletin de s\u00e9curit\u00e9 Ubuntu USN-8098-2",
"url": "https://ubuntu.com/security/notices/USN-8098-2"
}
]
}
CERTFR-2026-AVI-0397
Vulnerability from certfr_avis - Published: 2026-04-03 - Updated: 2026-04-03
De multiples vulnérabilités ont été découvertes dans le noyau Linux d'Ubuntu. Certaines d'entre elles permettent à un attaquant de provoquer une exécution de code arbitraire, une élévation de privilèges et une atteinte à la confidentialité des données.
Solutions
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
| Title | Publication Time | Tags | ||||||||||||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
||||||||||||||||||||||||||||||||||||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "Ubuntu 16.04 ESM",
"product": {
"name": "Ubuntu",
"vendor": {
"name": "Ubuntu",
"scada": false
}
}
},
{
"description": "Ubuntu 24.04 LTS",
"product": {
"name": "Ubuntu",
"vendor": {
"name": "Ubuntu",
"scada": false
}
}
},
{
"description": "Ubuntu 18.04 ESM",
"product": {
"name": "Ubuntu",
"vendor": {
"name": "Ubuntu",
"scada": false
}
}
},
{
"description": "Ubuntu 25.10",
"product": {
"name": "Ubuntu",
"vendor": {
"name": "Ubuntu",
"scada": false
}
}
},
{
"description": "Ubuntu 14.04 ESM",
"product": {
"name": "Ubuntu",
"vendor": {
"name": "Ubuntu",
"scada": false
}
}
},
{
"description": "Ubuntu 22.04 LTS",
"product": {
"name": "Ubuntu",
"vendor": {
"name": "Ubuntu",
"scada": false
}
}
}
],
"affected_systems_content": "",
"content": "## Solutions\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des correctifs (cf. section Documentation).",
"cves": [
{
"name": "CVE-2024-36903",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36903"
},
{
"name": "CVE-2025-68234",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68234"
},
{
"name": "CVE-2025-40166",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40166"
},
{
"name": "CVE-2025-71075",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71075"
},
{
"name": "CVE-2025-40273",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40273"
},
{
"name": "CVE-2025-68230",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68230"
},
{
"name": "CVE-2025-39992",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39992"
},
{
"name": "CVE-2025-68324",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68324"
},
{
"name": "CVE-2025-39987",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39987"
},
{
"name": "CVE-2025-71086",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71086"
},
{
"name": "CVE-2025-39812",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39812"
},
{
"name": "CVE-2025-21861",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21861"
},
{
"name": "CVE-2025-40156",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40156"
},
{
"name": "CVE-2025-68342",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68342"
},
{
"name": "CVE-2025-68374",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68374"
},
{
"name": "CVE-2025-40137",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40137"
},
{
"name": "CVE-2025-22107",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22107"
},
{
"name": "CVE-2025-68373",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68373"
},
{
"name": "CVE-2025-39808",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39808"
},
{
"name": "CVE-2025-68286",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68286"
},
{
"name": "CVE-2025-68749",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68749"
},
{
"name": "CVE-2025-40057",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40057"
},
{
"name": "CVE-2025-71094",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71094"
},
{
"name": "CVE-2025-68788",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68788"
},
{
"name": "CVE-2025-40055",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40055"
},
{
"name": "CVE-2025-39876",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39876"
},
{
"name": "CVE-2025-40314",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40314"
},
{
"name": "CVE-2025-40029",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40029"
},
{
"name": "CVE-2025-40037",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40037"
},
{
"name": "CVE-2025-40306",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40306"
},
{
"name": "CVE-2025-40008",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40008"
},
{
"name": "CVE-2025-39947",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39947"
},
{
"name": "CVE-2025-40048",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40048"
},
{
"name": "CVE-2025-68292",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68292"
},
{
"name": "CVE-2025-40254",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40254"
},
{
"name": "CVE-2025-71064",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71064"
},
{
"name": "CVE-2025-40219",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40219"
},
{
"name": "CVE-2025-68200",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68200"
},
{
"name": "CVE-2025-39902",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39902"
},
{
"name": "CVE-2025-40043",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40043"
},
{
"name": "CVE-2025-68176",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68176"
},
{
"name": "CVE-2025-68741",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68741"
},
{
"name": "CVE-2025-68204",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68204"
},
{
"name": "CVE-2025-68795",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68795"
},
{
"name": "CVE-2025-68349",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68349"
},
{
"name": "CVE-2025-39948",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39948"
},
{
"name": "CVE-2025-39826",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39826"
},
{
"name": "CVE-2025-68380",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68380"
},
{
"name": "CVE-2025-68359",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68359"
},
{
"name": "CVE-2026-23269",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23269"
},
{
"name": "CVE-2025-39973",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39973"
},
{
"name": "CVE-2025-39881",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39881"
},
{
"name": "CVE-2025-68283",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68283"
},
{
"name": "CVE-2025-68246",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68246"
},
{
"name": "CVE-2025-68339",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68339"
},
{
"name": "CVE-2025-40287",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40287"
},
{
"name": "CVE-2021-47142",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47142"
},
{
"name": "CVE-2025-39943",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39943"
},
{
"name": "CVE-2025-39945",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39945"
},
{
"name": "CVE-2026-22992",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-22992"
},
{
"name": "CVE-2022-49465",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49465"
},
{
"name": "CVE-2025-39883",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39883"
},
{
"name": "CVE-2025-68295",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68295"
},
{
"name": "CVE-2025-23129",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-23129"
},
{
"name": "CVE-2025-68728",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68728"
},
{
"name": "CVE-2025-68364",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68364"
},
{
"name": "CVE-2025-40100",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40100"
},
{
"name": "CVE-2025-71087",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71087"
},
{
"name": "CVE-2025-40285",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40285"
},
{
"name": "CVE-2025-39827",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39827"
},
{
"name": "CVE-2025-22106",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22106"
},
{
"name": "CVE-2025-68287",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68287"
},
{
"name": "CVE-2025-40240",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40240"
},
{
"name": "CVE-2025-39828",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39828"
},
{
"name": "CVE-2025-40081",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40081"
},
{
"name": "CVE-2025-68746",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68746"
},
{
"name": "CVE-2024-58011",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58011"
},
{
"name": "CVE-2025-71133",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71133"
},
{
"name": "CVE-2025-40026",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40026"
},
{
"name": "CVE-2025-40153",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40153"
},
{
"name": "CVE-2025-40103",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40103"
},
{
"name": "CVE-2026-23020",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23020"
},
{
"name": "CVE-2025-40294",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40294"
},
{
"name": "CVE-2025-68796",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68796"
},
{
"name": "CVE-2025-40016",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40016"
},
{
"name": "CVE-2025-40121",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40121"
},
{
"name": "CVE-2025-40265",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40265"
},
{
"name": "CVE-2025-40312",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40312"
},
{
"name": "CVE-2025-40204",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40204"
},
{
"name": "CVE-2025-68220",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68220"
},
{
"name": "CVE-2025-22125",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22125"
},
{
"name": "CVE-2025-40171",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40171"
},
{
"name": "CVE-2025-68302",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68302"
},
{
"name": "CVE-2025-68238",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68238"
},
{
"name": "CVE-2025-68297",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68297"
},
{
"name": "CVE-2025-68299",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68299"
},
{
"name": "CVE-2025-40221",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40221"
},
{
"name": "CVE-2025-68804",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68804"
},
{
"name": "CVE-2025-68769",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68769"
},
{
"name": "CVE-2025-39811",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39811"
},
{
"name": "CVE-2025-40056",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40056"
},
{
"name": "CVE-2025-39911",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39911"
},
{
"name": "CVE-2025-40125",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40125"
},
{
"name": "CVE-2025-40350",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40350"
},
{
"name": "CVE-2025-40309",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40309"
},
{
"name": "CVE-2025-40349",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40349"
},
{
"name": "CVE-2025-40052",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40052"
},
{
"name": "CVE-2025-68334",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68334"
},
{
"name": "CVE-2025-40343",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40343"
},
{
"name": "CVE-2025-68173",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68173"
},
{
"name": "CVE-2025-22103",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22103"
},
{
"name": "CVE-2025-68307",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68307"
},
{
"name": "CVE-2025-40308",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40308"
},
{
"name": "CVE-2025-40187",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40187"
},
{
"name": "CVE-2025-40315",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40315"
},
{
"name": "CVE-2025-37860",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37860"
},
{
"name": "CVE-2025-39913",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39913"
},
{
"name": "CVE-2025-68231",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68231"
},
{
"name": "CVE-2025-39950",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39950"
},
{
"name": "CVE-2025-40092",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40092"
},
{
"name": "CVE-2025-71098",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71098"
},
{
"name": "CVE-2025-40251",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40251"
},
{
"name": "CVE-2025-21735",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21735"
},
{
"name": "CVE-2025-71078",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71078"
},
{
"name": "CVE-2025-39967",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39967"
},
{
"name": "CVE-2025-68184",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68184"
},
{
"name": "CVE-2025-40107",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40107"
},
{
"name": "CVE-2025-71083",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71083"
},
{
"name": "CVE-2025-40115",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40115"
},
{
"name": "CVE-2025-68813",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68813"
},
{
"name": "CVE-2026-23047",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23047"
},
{
"name": "CVE-2025-22121",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22121"
},
{
"name": "CVE-2021-47254",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47254"
},
{
"name": "CVE-2025-68265",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68265"
},
{
"name": "CVE-2025-71085",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71085"
},
{
"name": "CVE-2026-23268",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23268"
},
{
"name": "CVE-2025-39920",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39920"
},
{
"name": "CVE-2025-40058",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40058"
},
{
"name": "CVE-2025-68344",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68344"
},
{
"name": "CVE-2025-40347",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40347"
},
{
"name": "CVE-2025-71154",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71154"
},
{
"name": "CVE-2025-40198",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40198"
},
{
"name": "CVE-2025-39942",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39942"
},
{
"name": "CVE-2025-68310",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68310"
},
{
"name": "CVE-2025-68179",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68179"
},
{
"name": "CVE-2025-68229",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68229"
},
{
"name": "CVE-2025-68257",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68257"
},
{
"name": "CVE-2025-39929",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39929"
},
{
"name": "CVE-2025-39949",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39949"
},
{
"name": "CVE-2025-71084",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71084"
},
{
"name": "CVE-2025-40173",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40173"
},
{
"name": "CVE-2025-68321",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68321"
},
{
"name": "CVE-2024-56538",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56538"
},
{
"name": "CVE-2025-68347",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68347"
},
{
"name": "CVE-2025-40010",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40010"
},
{
"name": "CVE-2025-39944",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39944"
},
{
"name": "CVE-2025-39923",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39923"
},
{
"name": "CVE-2025-68235",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68235"
},
{
"name": "CVE-2025-39866",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39866"
},
{
"name": "CVE-2025-39843",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39843"
},
{
"name": "CVE-2025-40311",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40311"
},
{
"name": "CVE-2025-68814",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68814"
},
{
"name": "CVE-2025-40237",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40237"
},
{
"name": "CVE-2025-68780",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68780"
},
{
"name": "CVE-2025-39953",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39953"
},
{
"name": "CVE-2025-71081",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71081"
},
{
"name": "CVE-2025-68738",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68738"
},
{
"name": "CVE-2025-40167",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40167"
},
{
"name": "CVE-2025-38105",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38105"
},
{
"name": "CVE-2025-39969",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39969"
},
{
"name": "CVE-2025-71121",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71121"
},
{
"name": "CVE-2025-40194",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40194"
},
{
"name": "CVE-2025-40333",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40333"
},
{
"name": "CVE-2025-38022",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38022"
},
{
"name": "CVE-2025-40245",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40245"
},
{
"name": "CVE-2025-39899",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39899"
},
{
"name": "CVE-2025-68754",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68754"
},
{
"name": "CVE-2025-40360",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40360"
},
{
"name": "CVE-2025-71136",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71136"
},
{
"name": "CVE-2025-22105",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22105"
},
{
"name": "CVE-2025-68354",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68354"
},
{
"name": "CVE-2025-68801",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68801"
},
{
"name": "CVE-2025-21833",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21833"
},
{
"name": "CVE-2025-40104",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40104"
},
{
"name": "CVE-2025-68258",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68258"
},
{
"name": "CVE-2025-39853",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39853"
},
{
"name": "CVE-2025-40001",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40001"
},
{
"name": "CVE-2025-39871",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39871"
},
{
"name": "CVE-2025-39857",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39857"
},
{
"name": "CVE-2025-38709",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38709"
},
{
"name": "CVE-2025-40035",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40035"
},
{
"name": "CVE-2025-40322",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40322"
},
{
"name": "CVE-2025-39988",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39988"
},
{
"name": "CVE-2025-40313",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40313"
},
{
"name": "CVE-2025-39865",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39865"
},
{
"name": "CVE-2025-38584",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38584"
},
{
"name": "CVE-2025-40233",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40233"
},
{
"name": "CVE-2025-40172",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40172"
},
{
"name": "CVE-2025-40020",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40020"
},
{
"name": "CVE-2024-46777",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46777"
},
{
"name": "CVE-2025-40188",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40188"
},
{
"name": "CVE-2025-40271",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40271"
},
{
"name": "CVE-2025-68306",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68306"
},
{
"name": "CVE-2025-39877",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39877"
},
{
"name": "CVE-2026-22991",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-22991"
},
{
"name": "CVE-2025-38502",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38502"
},
{
"name": "CVE-2025-68300",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68300"
},
{
"name": "CVE-2025-39886",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39886"
},
{
"name": "CVE-2025-68763",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68763"
},
{
"name": "CVE-2025-68294",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68294"
},
{
"name": "CVE-2025-40290",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40290"
},
{
"name": "CVE-2025-68308",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68308"
},
{
"name": "CVE-2025-40249",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40249"
},
{
"name": "CVE-2025-40242",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40242"
},
{
"name": "CVE-2025-39838",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39838"
},
{
"name": "CVE-2025-39823",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39823"
},
{
"name": "CVE-2025-68198",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68198"
},
{
"name": "CVE-2025-39864",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39864"
},
{
"name": "CVE-2025-40013",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40013"
},
{
"name": "CVE-2025-68190",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68190"
},
{
"name": "CVE-2025-40169",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40169"
},
{
"name": "CVE-2025-39824",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39824"
},
{
"name": "CVE-2025-40252",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40252"
},
{
"name": "CVE-2025-68218",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68218"
},
{
"name": "CVE-2025-40049",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40049"
},
{
"name": "CVE-2025-68255",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68255"
},
{
"name": "CVE-2025-68322",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68322"
},
{
"name": "CVE-2026-22980",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-22980"
},
{
"name": "CVE-2025-39927",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39927"
},
{
"name": "CVE-2025-40024",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40024"
},
{
"name": "CVE-2025-40238",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40238"
},
{
"name": "CVE-2025-40277",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40277"
},
{
"name": "CVE-2025-40070",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40070"
},
{
"name": "CVE-2025-40106",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40106"
},
{
"name": "CVE-2025-40272",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40272"
},
{
"name": "CVE-2025-39842",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39842"
},
{
"name": "CVE-2025-40047",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40047"
},
{
"name": "CVE-2025-71093",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71093"
},
{
"name": "CVE-2025-71102",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71102"
},
{
"name": "CVE-2025-68759",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68759"
},
{
"name": "CVE-2026-23019",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23019"
},
{
"name": "CVE-2025-39815",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39815"
},
{
"name": "CVE-2025-40345",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40345"
},
{
"name": "CVE-2025-40205",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40205"
},
{
"name": "CVE-2025-39849",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39849"
},
{
"name": "CVE-2025-40033",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40033"
},
{
"name": "CVE-2025-68733",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68733"
},
{
"name": "CVE-2025-39894",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39894"
},
{
"name": "CVE-2025-39861",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39861"
},
{
"name": "CVE-2025-68215",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68215"
},
{
"name": "CVE-2025-40269",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40269"
},
{
"name": "CVE-2025-68228",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68228"
},
{
"name": "CVE-2025-68335",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68335"
},
{
"name": "CVE-2025-71079",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71079"
},
{
"name": "CVE-2025-62626",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-62626"
},
{
"name": "CVE-2025-39940",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39940"
},
{
"name": "CVE-2025-68338",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68338"
},
{
"name": "CVE-2025-68304",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68304"
},
{
"name": "CVE-2025-68370",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68370"
},
{
"name": "CVE-2025-39977",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39977"
},
{
"name": "CVE-2025-68330",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68330"
},
{
"name": "CVE-2025-40027",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40027"
},
{
"name": "CVE-2025-39885",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39885"
},
{
"name": "CVE-2025-68180",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68180"
},
{
"name": "CVE-2025-68343",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68343"
},
{
"name": "CVE-2025-68726",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68726"
},
{
"name": "CVE-2025-21780",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21780"
},
{
"name": "CVE-2025-68201",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68201"
},
{
"name": "CVE-2025-40289",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40289"
},
{
"name": "CVE-2025-68785",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68785"
},
{
"name": "CVE-2024-37354",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-37354"
},
{
"name": "CVE-2025-68808",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68808"
},
{
"name": "CVE-2025-68748",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68748"
},
{
"name": "CVE-2025-68223",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68223"
},
{
"name": "CVE-2025-68783",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68783"
},
{
"name": "CVE-2025-39970",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39970"
},
{
"name": "CVE-2025-40292",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40292"
},
{
"name": "CVE-2025-71147",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71147"
},
{
"name": "CVE-2025-40032",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40032"
},
{
"name": "CVE-2025-39981",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39981"
},
{
"name": "CVE-2025-68724",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68724"
},
{
"name": "CVE-2025-39994",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39994"
},
{
"name": "CVE-2026-23074",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23074"
},
{
"name": "CVE-2025-68797",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68797"
},
{
"name": "CVE-2025-38627",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38627"
},
{
"name": "CVE-2024-49968",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49968"
},
{
"name": "CVE-2025-68358",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68358"
},
{
"name": "CVE-2025-40206",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40206"
},
{
"name": "CVE-2025-40218",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40218"
},
{
"name": "CVE-2025-40088",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40088"
},
{
"name": "CVE-2025-40220",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40220"
},
{
"name": "CVE-2025-39845",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39845"
},
{
"name": "CVE-2025-68237",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68237"
},
{
"name": "CVE-2025-40257",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40257"
},
{
"name": "CVE-2025-68259",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68259"
},
{
"name": "CVE-2025-71125",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71125"
},
{
"name": "CVE-2025-22058",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22058"
},
{
"name": "CVE-2025-71108",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71108"
},
{
"name": "CVE-2025-71069",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71069"
},
{
"name": "CVE-2025-68312",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68312"
},
{
"name": "CVE-2025-68284",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68284"
},
{
"name": "CVE-2025-40062",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40062"
},
{
"name": "CVE-2025-68194",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68194"
},
{
"name": "CVE-2025-68356",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68356"
},
{
"name": "CVE-2025-40067",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40067"
},
{
"name": "CVE-2025-40109",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40109"
},
{
"name": "CVE-2025-40101",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40101"
},
{
"name": "CVE-2025-40006",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40006"
},
{
"name": "CVE-2025-40038",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40038"
},
{
"name": "CVE-2025-68183",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68183"
},
{
"name": "CVE-2025-39805",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39805"
},
{
"name": "CVE-2025-68774",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68774"
},
{
"name": "CVE-2025-40263",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40263"
},
{
"name": "CVE-2025-40353",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40353"
},
{
"name": "CVE-2025-40011",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40011"
},
{
"name": "CVE-2025-40085",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40085"
},
{
"name": "CVE-2025-71180",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71180"
},
{
"name": "CVE-2025-68244",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68244"
},
{
"name": "CVE-2025-40231",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40231"
},
{
"name": "CVE-2024-46830",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46830"
},
{
"name": "CVE-2024-47666",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47666"
},
{
"name": "CVE-2025-40278",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40278"
},
{
"name": "CVE-2025-22113",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22113"
},
{
"name": "CVE-2025-40176",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40176"
},
{
"name": "CVE-2025-40342",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40342"
},
{
"name": "CVE-2025-71128",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71128"
},
{
"name": "CVE-2025-71082",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71082"
},
{
"name": "CVE-2025-68222",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68222"
},
{
"name": "CVE-2025-68743",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68743"
},
{
"name": "CVE-2025-68765",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68765"
},
{
"name": "CVE-2025-23143",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-23143"
},
{
"name": "CVE-2025-71132",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71132"
},
{
"name": "CVE-2025-40193",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40193"
},
{
"name": "CVE-2025-71077",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71077"
},
{
"name": "CVE-2024-36927",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36927"
},
{
"name": "CVE-2025-40279",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40279"
},
{
"name": "CVE-2025-68328",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68328"
},
{
"name": "CVE-2025-40201",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40201"
},
{
"name": "CVE-2025-40084",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40084"
},
{
"name": "CVE-2025-22111",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22111"
},
{
"name": "CVE-2025-68232",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68232"
},
{
"name": "CVE-2025-68311",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68311"
},
{
"name": "CVE-2025-71114",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71114"
},
{
"name": "CVE-2025-68348",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68348"
},
{
"name": "CVE-2025-68744",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68744"
},
{
"name": "CVE-2025-71182",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71182"
},
{
"name": "CVE-2025-68320",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68320"
},
{
"name": "CVE-2025-40341",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40341"
},
{
"name": "CVE-2025-40183",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40183"
},
{
"name": "CVE-2026-22990",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-22990"
},
{
"name": "CVE-2025-68376",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68376"
},
{
"name": "CVE-2025-68172",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68172"
},
{
"name": "CVE-2025-39998",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39998"
},
{
"name": "CVE-2025-40134",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40134"
},
{
"name": "CVE-2025-68325",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68325"
},
{
"name": "CVE-2025-39968",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39968"
},
{
"name": "CVE-2025-40358",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40358"
},
{
"name": "CVE-2025-40165",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40165"
},
{
"name": "CVE-2025-68341",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68341"
},
{
"name": "CVE-2025-68296",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68296"
},
{
"name": "CVE-2025-68361",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68361"
},
{
"name": "CVE-2025-40328",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40328"
},
{
"name": "CVE-2025-68332",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68332"
},
{
"name": "CVE-2025-39986",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39986"
},
{
"name": "CVE-2025-71104",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71104"
},
{
"name": "CVE-2026-22978",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-22978"
},
{
"name": "CVE-2025-39901",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39901"
},
{
"name": "CVE-2025-40283",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40283"
},
{
"name": "CVE-2025-39955",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39955"
},
{
"name": "CVE-2025-40324",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40324"
},
{
"name": "CVE-2025-68378",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68378"
},
{
"name": "CVE-2025-68752",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68752"
},
{
"name": "CVE-2025-38129",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38129"
},
{
"name": "CVE-2025-40250",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40250"
},
{
"name": "CVE-2025-40264",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40264"
},
{
"name": "CVE-2025-40255",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40255"
},
{
"name": "CVE-2025-40246",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40246"
},
{
"name": "CVE-2025-68367",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68367"
},
{
"name": "CVE-2025-40226",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40226"
},
{
"name": "CVE-2025-40078",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40078"
},
{
"name": "CVE-2025-68820",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68820"
},
{
"name": "CVE-2025-68756",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68756"
},
{
"name": "CVE-2025-40321",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40321"
},
{
"name": "CVE-2025-68360",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68360"
},
{
"name": "CVE-2025-40116",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40116"
},
{
"name": "CVE-2025-39895",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39895"
},
{
"name": "CVE-2025-68249",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68249"
},
{
"name": "CVE-2025-68740",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68740"
},
{
"name": "CVE-2025-39934",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39934"
},
{
"name": "CVE-2025-39978",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39978"
},
{
"name": "CVE-2025-40179",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40179"
},
{
"name": "CVE-2025-68742",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68742"
},
{
"name": "CVE-2025-40127",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40127"
},
{
"name": "CVE-2025-40282",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40282"
},
{
"name": "CVE-2025-39996",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39996"
},
{
"name": "CVE-2025-40053",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40053"
},
{
"name": "CVE-2025-39951",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39951"
},
{
"name": "CVE-2025-40120",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40120"
},
{
"name": "CVE-2025-68816",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68816"
},
{
"name": "CVE-2025-39914",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39914"
},
{
"name": "CVE-2025-68192",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68192"
},
{
"name": "CVE-2025-39697",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39697"
},
{
"name": "CVE-2025-68379",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68379"
},
{
"name": "CVE-2025-68256",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68256"
},
{
"name": "CVE-2025-68777",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68777"
},
{
"name": "CVE-2025-68254",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68254"
},
{
"name": "CVE-2025-39938",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39938"
},
{
"name": "CVE-2025-40243",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40243"
},
{
"name": "CVE-2025-40196",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40196"
},
{
"name": "CVE-2025-39982",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39982"
},
{
"name": "CVE-2025-40129",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40129"
},
{
"name": "CVE-2025-39965",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39965"
},
{
"name": "CVE-2025-38556",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38556"
},
{
"name": "CVE-2025-68171",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68171"
},
{
"name": "CVE-2025-39932",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39932"
},
{
"name": "CVE-2025-40301",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40301"
},
{
"name": "CVE-2025-40040",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40040"
},
{
"name": "CVE-2025-39810",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39810"
},
{
"name": "CVE-2026-22982",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-22982"
},
{
"name": "CVE-2025-68298",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68298"
},
{
"name": "CVE-2025-40207",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40207"
},
{
"name": "CVE-2025-40095",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40095"
},
{
"name": "CVE-2025-68747",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68747"
},
{
"name": "CVE-2025-71118",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71118"
},
{
"name": "CVE-2025-39860",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39860"
},
{
"name": "CVE-2025-40286",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40286"
},
{
"name": "CVE-2025-68327",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68327"
},
{
"name": "CVE-2025-40318",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40318"
},
{
"name": "CVE-2025-40266",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40266"
},
{
"name": "CVE-2025-68241",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68241"
},
{
"name": "CVE-2025-40118",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40118"
},
{
"name": "CVE-2025-40021",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40021"
},
{
"name": "CVE-2025-39839",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39839"
},
{
"name": "CVE-2025-68734",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68734"
},
{
"name": "CVE-2025-68776",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68776"
},
{
"name": "CVE-2025-71066",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71066"
},
{
"name": "CVE-2025-39848",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39848"
},
{
"name": "CVE-2025-68799",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68799"
},
{
"name": "CVE-2025-68345",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68345"
},
{
"name": "CVE-2025-40044",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40044"
},
{
"name": "CVE-2025-71097",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71097"
},
{
"name": "CVE-2025-40105",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40105"
},
{
"name": "CVE-2025-68288",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68288"
},
{
"name": "CVE-2025-68739",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68739"
},
{
"name": "CVE-2025-39916",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39916"
},
{
"name": "CVE-2025-40112",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40112"
},
{
"name": "CVE-2025-40079",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40079"
},
{
"name": "CVE-2025-40260",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40260"
},
{
"name": "CVE-2025-40310",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40310"
},
{
"name": "CVE-2025-40083",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40083"
},
{
"name": "CVE-2025-71111",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71111"
},
{
"name": "CVE-2025-39971",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39971"
},
{
"name": "CVE-2025-40154",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40154"
},
{
"name": "CVE-2025-40331",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40331"
},
{
"name": "CVE-2022-49635",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49635"
},
{
"name": "CVE-2025-68337",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68337"
},
{
"name": "CVE-2025-40093",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40093"
},
{
"name": "CVE-2025-39825",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39825"
},
{
"name": "CVE-2025-71131",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71131"
},
{
"name": "CVE-2025-39852",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39852"
},
{
"name": "CVE-2025-71116",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71116"
},
{
"name": "CVE-2025-40235",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40235"
},
{
"name": "CVE-2025-39991",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39991"
},
{
"name": "CVE-2025-68281",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68281"
},
{
"name": "CVE-2025-68729",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68729"
},
{
"name": "CVE-2025-68208",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68208"
},
{
"name": "CVE-2025-68362",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68362"
},
{
"name": "CVE-2025-68236",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68236"
},
{
"name": "CVE-2025-68333",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68333"
},
{
"name": "CVE-2025-39806",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39806"
},
{
"name": "CVE-2025-68290",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68290"
},
{
"name": "CVE-2025-40280",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40280"
},
{
"name": "CVE-2025-40099",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40099"
},
{
"name": "CVE-2025-40031",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40031"
},
{
"name": "CVE-2025-40180",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40180"
},
{
"name": "CVE-2025-40293",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40293"
},
{
"name": "CVE-2025-68751",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68751"
},
{
"name": "CVE-2025-68803",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68803"
},
{
"name": "CVE-2025-39851",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39851"
},
{
"name": "CVE-2025-68331",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68331"
},
{
"name": "CVE-2025-40126",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40126"
},
{
"name": "CVE-2025-39972",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39972"
},
{
"name": "CVE-2026-22976",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-22976"
},
{
"name": "CVE-2025-68760",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68760"
},
{
"name": "CVE-2025-68305",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68305"
},
{
"name": "CVE-2025-68352",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68352"
},
{
"name": "CVE-2025-68214",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68214"
},
{
"name": "CVE-2025-40320",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40320"
},
{
"name": "CVE-2025-39870",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39870"
},
{
"name": "CVE-2025-40247",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40247"
},
{
"name": "CVE-2025-68375",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68375"
},
{
"name": "CVE-2025-68753",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68753"
},
{
"name": "CVE-2025-68369",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68369"
},
{
"name": "CVE-2025-39807",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39807"
},
{
"name": "CVE-2025-71112",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71112"
},
{
"name": "CVE-2025-22022",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22022"
},
{
"name": "CVE-2025-40192",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40192"
},
{
"name": "CVE-2025-40200",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40200"
},
{
"name": "CVE-2025-38236",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38236"
},
{
"name": "CVE-2025-68818",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68818"
},
{
"name": "CVE-2025-40124",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40124"
},
{
"name": "CVE-2025-39880",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39880"
},
{
"name": "CVE-2025-40094",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40094"
},
{
"name": "CVE-2025-40160",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40160"
},
{
"name": "CVE-2025-40284",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40284"
},
{
"name": "CVE-2025-40077",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40077"
},
{
"name": "CVE-2024-41014",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41014"
},
{
"name": "CVE-2025-40071",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40071"
},
{
"name": "CVE-2025-68329",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68329"
},
{
"name": "CVE-2025-68366",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68366"
},
{
"name": "CVE-2025-40305",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40305"
},
{
"name": "CVE-2025-40080",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40080"
},
{
"name": "CVE-2025-39846",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39846"
},
{
"name": "CVE-2025-68815",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68815"
},
{
"name": "CVE-2025-40215",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40215"
},
{
"name": "CVE-2025-40307",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40307"
},
{
"name": "CVE-2025-40111",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40111"
},
{
"name": "CVE-2025-68346",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68346"
},
{
"name": "CVE-2025-40211",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40211"
},
{
"name": "CVE-2025-40068",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40068"
},
{
"name": "CVE-2025-68315",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68315"
},
{
"name": "CVE-2025-39850",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39850"
},
{
"name": "CVE-2025-40042",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40042"
},
{
"name": "CVE-2025-40155",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40155"
},
{
"name": "CVE-2025-71096",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71096"
},
{
"name": "CVE-2025-39844",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39844"
},
{
"name": "CVE-2025-71105",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71105"
},
{
"name": "CVE-2025-68266",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68266"
},
{
"name": "CVE-2025-68771",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68771"
},
{
"name": "CVE-2025-39961",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39961"
},
{
"name": "CVE-2025-68363",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68363"
},
{
"name": "CVE-2025-40248",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40248"
},
{
"name": "CVE-2026-22984",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-22984"
},
{
"name": "CVE-2025-68303",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68303"
},
{
"name": "CVE-2025-39863",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39863"
},
{
"name": "CVE-2025-40259",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40259"
},
{
"name": "CVE-2025-68757",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68757"
},
{
"name": "CVE-2025-71068",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71068"
},
{
"name": "CVE-2025-23130",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-23130"
},
{
"name": "CVE-2025-40329",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40329"
},
{
"name": "CVE-2025-39957",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39957"
},
{
"name": "CVE-2025-39931",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39931"
},
{
"name": "CVE-2026-22977",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-22977"
},
{
"name": "CVE-2025-39937",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39937"
},
{
"name": "CVE-2025-68766",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68766"
},
{
"name": "CVE-2025-39817",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39817"
},
{
"name": "CVE-2025-40060",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40060"
},
{
"name": "CVE-2025-39891",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39891"
},
{
"name": "CVE-2025-40059",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40059"
},
{
"name": "CVE-2025-68168",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68168"
},
{
"name": "CVE-2025-39897",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39897"
},
{
"name": "CVE-2025-68326",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68326"
},
{
"name": "CVE-2025-68372",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68372"
},
{
"name": "CVE-2025-22124",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22124"
},
{
"name": "CVE-2025-68313",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68313"
},
{
"name": "CVE-2025-71137",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71137"
},
{
"name": "CVE-2025-40123",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40123"
},
{
"name": "CVE-2025-68301",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68301"
},
{
"name": "CVE-2025-39854",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39854"
},
{
"name": "CVE-2025-68217",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68217"
},
{
"name": "CVE-2025-40178",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40178"
},
{
"name": "CVE-2025-68212",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68212"
},
{
"name": "CVE-2025-68289",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68289"
},
{
"name": "CVE-2025-40363",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40363"
},
{
"name": "CVE-2025-39869",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39869"
},
{
"name": "CVE-2025-40253",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40253"
},
{
"name": "CVE-2025-39985",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39985"
},
{
"name": "CVE-2025-68245",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68245"
},
{
"name": "CVE-2025-68730",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68730"
},
{
"name": "CVE-2025-68213",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68213"
},
{
"name": "CVE-2025-39952",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39952"
},
{
"name": "CVE-2025-40317",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40317"
},
{
"name": "CVE-2025-68233",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68233"
},
{
"name": "CVE-2025-71120",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71120"
},
{
"name": "CVE-2026-23060",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23060"
},
{
"name": "CVE-2025-68282",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68282"
},
{
"name": "CVE-2025-68225",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68225"
},
{
"name": "CVE-2025-68787",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68787"
},
{
"name": "CVE-2025-23133",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-23133"
},
{
"name": "CVE-2025-68782",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68782"
},
{
"name": "CVE-2025-68177",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68177"
},
{
"name": "CVE-2025-68758",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68758"
},
{
"name": "CVE-2025-68191",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68191"
},
{
"name": "CVE-2025-71113",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71113"
},
{
"name": "CVE-2025-71127",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71127"
},
{
"name": "CVE-2025-40141",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40141"
},
{
"name": "CVE-2025-68340",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68340"
},
{
"name": "CVE-2025-39678",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39678"
},
{
"name": "CVE-2025-68219",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68219"
},
{
"name": "CVE-2025-40288",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40288"
},
{
"name": "CVE-2025-40258",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40258"
},
{
"name": "CVE-2021-47145",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47145"
},
{
"name": "CVE-2025-40281",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40281"
},
{
"name": "CVE-2025-68185",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68185"
},
{
"name": "CVE-2025-40304",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40304"
},
{
"name": "CVE-2025-40110",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40110"
},
{
"name": "CVE-2025-40268",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40268"
},
{
"name": "CVE-2026-23111",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23111"
},
{
"name": "CVE-2025-39980",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39980"
},
{
"name": "CVE-2025-40009",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40009"
},
{
"name": "CVE-2025-68336",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68336"
},
{
"name": "CVE-2025-40303",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40303"
},
{
"name": "CVE-2025-68323",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68323"
},
{
"name": "CVE-2025-68178",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68178"
},
{
"name": "CVE-2025-40337",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40337"
},
{
"name": "CVE-2025-40346",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40346"
},
{
"name": "CVE-2025-40036",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40036"
},
{
"name": "CVE-2025-68221",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68221"
},
{
"name": "CVE-2025-39832",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39832"
},
{
"name": "CVE-2025-40000",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40000"
},
{
"name": "CVE-2025-40262",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40262"
},
{
"name": "CVE-2025-68262",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68262"
},
{
"name": "CVE-2025-39813",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39813"
},
{
"name": "CVE-2025-68819",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68819"
},
{
"name": "CVE-2025-40261",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40261"
},
{
"name": "CVE-2025-38643",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38643"
},
{
"name": "CVE-2025-40030",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40030"
},
{
"name": "CVE-2025-40244",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40244"
},
{
"name": "CVE-2025-39995",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39995"
},
{
"name": "CVE-2025-68735",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68735"
},
{
"name": "CVE-2026-23021",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23021"
},
{
"name": "CVE-2025-39847",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39847"
},
{
"name": "CVE-2025-39819",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39819"
},
{
"name": "CVE-2025-68732",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68732"
},
{
"name": "CVE-2025-40323",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40323"
},
{
"name": "CVE-2025-39835",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39835"
},
{
"name": "CVE-2025-68285",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68285"
},
{
"name": "CVE-2025-40096",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40096"
},
{
"name": "CVE-2025-37849",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37849"
},
{
"name": "CVE-2025-39841",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39841"
},
{
"name": "CVE-2025-68371",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68371"
},
{
"name": "CVE-2025-40275",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40275"
},
{
"name": "CVE-2025-39907",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39907"
},
{
"name": "CVE-2025-39829",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39829"
},
{
"name": "CVE-2025-71091",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71091"
},
{
"name": "CVE-2025-39909",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39909"
},
{
"name": "CVE-2025-68227",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68227"
},
{
"name": "CVE-2025-40339",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40339"
},
{
"name": "CVE-2025-40140",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40140"
},
{
"name": "CVE-2025-40223",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40223"
},
{
"name": "CVE-2025-40061",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40061"
},
{
"name": "CVE-2025-68263",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68263"
},
{
"name": "CVE-2025-68293",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68293"
},
{
"name": "CVE-2025-68800",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68800"
},
{
"name": "CVE-2024-53114",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53114"
},
{
"name": "CVE-2025-68261",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68261"
},
{
"name": "CVE-2025-68755",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68755"
},
{
"name": "CVE-2025-68767",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68767"
},
{
"name": "CVE-2025-39873",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39873"
},
{
"name": "CVE-2025-40159",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40159"
},
{
"name": "CVE-2025-40319",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40319"
},
{
"name": "CVE-2025-68727",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68727"
},
{
"name": "CVE-2025-39836",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39836"
},
{
"name": "CVE-2025-40051",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40051"
},
{
"name": "CVE-2025-38248",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38248"
},
{
"name": "CVE-2025-40351",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40351"
},
{
"name": "CVE-2025-68264",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68264"
},
{
"name": "CVE-2025-40087",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40087"
},
{
"name": "CVE-2025-68762",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68762"
},
{
"name": "CVE-2025-68764",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68764"
}
],
"initial_release_date": "2026-04-03T00:00:00",
"last_revision_date": "2026-04-03T00:00:00",
"links": [],
"reference": "CERTFR-2026-AVI-0397",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2026-04-03T00:00:00.000000"
}
],
"risks": [
{
"description": "Atteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es"
},
{
"description": "Ex\u00e9cution de code arbitraire"
},
{
"description": "Non sp\u00e9cifi\u00e9 par l\u0027\u00e9diteur"
},
{
"description": "D\u00e9ni de service"
},
{
"description": "Contournement de la politique de s\u00e9curit\u00e9"
},
{
"description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
},
{
"description": "\u00c9l\u00e9vation de privil\u00e8ges"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans le noyau Linux d\u0027Ubuntu. Certaines d\u0027entre elles permettent \u00e0 un attaquant de provoquer une ex\u00e9cution de code arbitraire, une \u00e9l\u00e9vation de privil\u00e8ges et une atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es.",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans le noyau Linux d\u0027Ubuntu",
"vendor_advisories": [
{
"published_at": "2026-04-01",
"title": "Bulletin de s\u00e9curit\u00e9 Ubuntu USN-8095-5",
"url": "https://ubuntu.com/security/notices/USN-8095-5"
},
{
"published_at": "2026-04-02",
"title": "Bulletin de s\u00e9curit\u00e9 Ubuntu USN-8149-1",
"url": "https://ubuntu.com/security/notices/USN-8149-1"
},
{
"published_at": "2026-04-01",
"title": "Bulletin de s\u00e9curit\u00e9 Ubuntu USN-8141-1",
"url": "https://ubuntu.com/security/notices/USN-8141-1"
},
{
"published_at": "2026-04-02",
"title": "Bulletin de s\u00e9curit\u00e9 Ubuntu USN-8148-3",
"url": "https://ubuntu.com/security/notices/USN-8148-3"
},
{
"published_at": "2026-04-01",
"title": "Bulletin de s\u00e9curit\u00e9 Ubuntu USN-8143-1",
"url": "https://ubuntu.com/security/notices/USN-8143-1"
},
{
"published_at": "2026-04-02",
"title": "Bulletin de s\u00e9curit\u00e9 Ubuntu USN-8145-2",
"url": "https://ubuntu.com/security/notices/USN-8145-2"
},
{
"published_at": "2026-04-02",
"title": "Bulletin de s\u00e9curit\u00e9 Ubuntu USN-8148-1",
"url": "https://ubuntu.com/security/notices/USN-8148-1"
},
{
"published_at": "2026-04-02",
"title": "Bulletin de s\u00e9curit\u00e9 Ubuntu USN-8148-2",
"url": "https://ubuntu.com/security/notices/USN-8148-2"
},
{
"published_at": "2026-04-02",
"title": "Bulletin de s\u00e9curit\u00e9 Ubuntu USN-8143-2",
"url": "https://ubuntu.com/security/notices/USN-8143-2"
},
{
"published_at": "2026-04-02",
"title": "Bulletin de s\u00e9curit\u00e9 Ubuntu USN-8145-1",
"url": "https://ubuntu.com/security/notices/USN-8145-1"
},
{
"published_at": "2026-04-01",
"title": "Bulletin de s\u00e9curit\u00e9 Ubuntu USN-8094-5",
"url": "https://ubuntu.com/security/notices/USN-8094-5"
},
{
"published_at": "2026-04-01",
"title": "Bulletin de s\u00e9curit\u00e9 Ubuntu USN-8142-1",
"url": "https://ubuntu.com/security/notices/USN-8142-1"
}
]
}
CERTFR-2026-AVI-0194
Vulnerability from certfr_avis - Published: 2026-02-20 - Updated: 2026-02-20
De multiples vulnérabilités ont été découvertes dans le noyau Linux d'Ubuntu. Certaines d'entre elles permettent à un attaquant de provoquer une atteinte à la confidentialité des données, une atteinte à l'intégrité des données et un contournement de la politique de sécurité.
Solutions
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
None| Title | Publication Time | Tags | ||||||||||||||||||||||||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
||||||||||||||||||||||||||||||||||||||||||||||||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "Ubuntu 20.04 ESM",
"product": {
"name": "Ubuntu",
"vendor": {
"name": "Ubuntu",
"scada": false
}
}
},
{
"description": "Ubuntu 24.04 LTS",
"product": {
"name": "Ubuntu",
"vendor": {
"name": "Ubuntu",
"scada": false
}
}
},
{
"description": "Ubuntu 18.04 ESM",
"product": {
"name": "Ubuntu",
"vendor": {
"name": "Ubuntu",
"scada": false
}
}
},
{
"description": "Ubuntu 25.10",
"product": {
"name": "Ubuntu",
"vendor": {
"name": "Ubuntu",
"scada": false
}
}
},
{
"description": "Ubuntu 22.04 LTS",
"product": {
"name": "Ubuntu",
"vendor": {
"name": "Ubuntu",
"scada": false
}
}
}
],
"affected_systems_content": null,
"content": "## Solutions\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des correctifs (cf. section Documentation).",
"cves": [
{
"name": "CVE-2025-40296",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40296"
},
{
"name": "CVE-2025-40225",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40225"
},
{
"name": "CVE-2025-40166",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40166"
},
{
"name": "CVE-2025-40273",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40273"
},
{
"name": "CVE-2025-40064",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40064"
},
{
"name": "CVE-2025-38490",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38490"
},
{
"name": "CVE-2025-37850",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37850"
},
{
"name": "CVE-2025-38485",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38485"
},
{
"name": "CVE-2025-22026",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22026"
},
{
"name": "CVE-2025-39987",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39987"
},
{
"name": "CVE-2025-38579",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38579"
},
{
"name": "CVE-2025-68196",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68196"
},
{
"name": "CVE-2025-37761",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37761"
},
{
"name": "CVE-2025-21861",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21861"
},
{
"name": "CVE-2025-37865",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37865"
},
{
"name": "CVE-2025-38328",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38328"
},
{
"name": "CVE-2025-40156",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40156"
},
{
"name": "CVE-2025-38711",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38711"
},
{
"name": "CVE-2025-38487",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38487"
},
{
"name": "CVE-2025-40137",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40137"
},
{
"name": "CVE-2025-37775",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37775"
},
{
"name": "CVE-2025-38335",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38335"
},
{
"name": "CVE-2025-38304",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38304"
},
{
"name": "CVE-2025-37892",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37892"
},
{
"name": "CVE-2025-38100",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38100"
},
{
"name": "CVE-2025-37859",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37859"
},
{
"name": "CVE-2025-40002",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40002"
},
{
"name": "CVE-2025-40057",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40057"
},
{
"name": "CVE-2025-38043",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38043"
},
{
"name": "CVE-2025-38471",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38471"
},
{
"name": "CVE-2025-38520",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38520"
},
{
"name": "CVE-2025-37792",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37792"
},
{
"name": "CVE-2025-68240",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68240"
},
{
"name": "CVE-2025-38108",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38108"
},
{
"name": "CVE-2025-38230",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38230"
},
{
"name": "CVE-2025-38229",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38229"
},
{
"name": "CVE-2025-40055",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40055"
},
{
"name": "CVE-2025-38158",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38158"
},
{
"name": "CVE-2025-40151",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40151"
},
{
"name": "CVE-2025-37872",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37872"
},
{
"name": "CVE-2025-38588",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38588"
},
{
"name": "CVE-2025-39876",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39876"
},
{
"name": "CVE-2025-40314",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40314"
},
{
"name": "CVE-2025-40029",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40029"
},
{
"name": "CVE-2025-40037",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40037"
},
{
"name": "CVE-2025-38279",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38279"
},
{
"name": "CVE-2025-38561",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38561"
},
{
"name": "CVE-2025-38574",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38574"
},
{
"name": "CVE-2025-40306",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40306"
},
{
"name": "CVE-2025-68210",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68210"
},
{
"name": "CVE-2025-40239",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40239"
},
{
"name": "CVE-2025-40147",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40147"
},
{
"name": "CVE-2025-40048",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40048"
},
{
"name": "CVE-2025-38147",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38147"
},
{
"name": "CVE-2025-23155",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-23155"
},
{
"name": "CVE-2025-38286",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38286"
},
{
"name": "CVE-2025-40219",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40219"
},
{
"name": "CVE-2025-39757",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39757"
},
{
"name": "CVE-2025-68200",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68200"
},
{
"name": "CVE-2025-38501",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38501"
},
{
"name": "CVE-2025-38474",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38474"
},
{
"name": "CVE-2025-37979",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37979"
},
{
"name": "CVE-2025-40043",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40043"
},
{
"name": "CVE-2025-68176",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68176"
},
{
"name": "CVE-2025-37777",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37777"
},
{
"name": "CVE-2025-39772",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39772"
},
{
"name": "CVE-2025-68199",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68199"
},
{
"name": "CVE-2025-37936",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37936"
},
{
"name": "CVE-2025-68204",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68204"
},
{
"name": "CVE-2025-38601",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38601"
},
{
"name": "CVE-2025-37766",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37766"
},
{
"name": "CVE-2025-38104",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38104"
},
{
"name": "CVE-2025-37844",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37844"
},
{
"name": "CVE-2025-21931",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21931"
},
{
"name": "CVE-2025-37871",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37871"
},
{
"name": "CVE-2025-37778",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37778"
},
{
"name": "CVE-2025-39716",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39716"
},
{
"name": "CVE-2025-39702",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39702"
},
{
"name": "CVE-2025-39973",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39973"
},
{
"name": "CVE-2025-38515",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38515"
},
{
"name": "CVE-2025-38645",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38645"
},
{
"name": "CVE-2025-38163",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38163"
},
{
"name": "CVE-2025-22126",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22126"
},
{
"name": "CVE-2025-38444",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38444"
},
{
"name": "CVE-2025-38109",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38109"
},
{
"name": "CVE-2025-39779",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39779"
},
{
"name": "CVE-2025-37755",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37755"
},
{
"name": "CVE-2025-39685",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39685"
},
{
"name": "CVE-2025-38660",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38660"
},
{
"name": "CVE-2025-39761",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39761"
},
{
"name": "CVE-2025-68246",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68246"
},
{
"name": "CVE-2025-40287",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40287"
},
{
"name": "CVE-2025-39943",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39943"
},
{
"name": "CVE-2025-39945",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39945"
},
{
"name": "CVE-2025-39883",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39883"
},
{
"name": "CVE-2025-39720",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39720"
},
{
"name": "CVE-2025-38624",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38624"
},
{
"name": "CVE-2025-40100",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40100"
},
{
"name": "CVE-2025-40285",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40285"
},
{
"name": "CVE-2025-38388",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38388"
},
{
"name": "CVE-2025-38157",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38157"
},
{
"name": "CVE-2025-40063",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40063"
},
{
"name": "CVE-2025-37790",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37790"
},
{
"name": "CVE-2025-40208",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40208"
},
{
"name": "CVE-2025-39746",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39746"
},
{
"name": "CVE-2025-38323",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38323"
},
{
"name": "CVE-2025-40019",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40019"
},
{
"name": "CVE-2025-40039",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40039"
},
{
"name": "CVE-2025-38208",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38208"
},
{
"name": "CVE-2025-40240",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40240"
},
{
"name": "CVE-2025-38219",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38219"
},
{
"name": "CVE-2025-39889",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39889"
},
{
"name": "CVE-2025-38099",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38099"
},
{
"name": "CVE-2025-38524",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38524"
},
{
"name": "CVE-2025-38466",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38466"
},
{
"name": "CVE-2025-40117",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40117"
},
{
"name": "CVE-2025-37758",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37758"
},
{
"name": "CVE-2025-40081",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40081"
},
{
"name": "CVE-2025-38087",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38087"
},
{
"name": "CVE-2024-58011",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58011"
},
{
"name": "CVE-2025-38039",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38039"
},
{
"name": "CVE-2025-40026",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40026"
},
{
"name": "CVE-2025-40153",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40153"
},
{
"name": "CVE-2025-40103",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40103"
},
{
"name": "CVE-2025-40294",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40294"
},
{
"name": "CVE-2025-38595",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38595"
},
{
"name": "CVE-2025-38626",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38626"
},
{
"name": "CVE-2025-40356",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40356"
},
{
"name": "CVE-2025-40121",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40121"
},
{
"name": "CVE-2025-40312",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40312"
},
{
"name": "CVE-2025-40204",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40204"
},
{
"name": "CVE-2025-37852",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37852"
},
{
"name": "CVE-2025-37841",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37841"
},
{
"name": "CVE-2025-40171",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40171"
},
{
"name": "CVE-2025-37918",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37918"
},
{
"name": "CVE-2025-37917",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37917"
},
{
"name": "CVE-2025-38290",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38290"
},
{
"name": "CVE-2025-68243",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68243"
},
{
"name": "CVE-2025-38063",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38063"
},
{
"name": "CVE-2025-37770",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37770"
},
{
"name": "CVE-2025-37773",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37773"
},
{
"name": "CVE-2025-68175",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68175"
},
{
"name": "CVE-2025-40221",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40221"
},
{
"name": "CVE-2025-38578",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38578"
},
{
"name": "CVE-2025-40139",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40139"
},
{
"name": "CVE-2025-40056",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40056"
},
{
"name": "CVE-2025-38675",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38675"
},
{
"name": "CVE-2025-39911",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39911"
},
{
"name": "CVE-2025-38646",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38646"
},
{
"name": "CVE-2025-38491",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38491"
},
{
"name": "CVE-2025-38708",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38708"
},
{
"name": "CVE-2025-37961",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37961"
},
{
"name": "CVE-2025-68248",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68248"
},
{
"name": "CVE-2025-40125",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40125"
},
{
"name": "CVE-2025-40350",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40350"
},
{
"name": "CVE-2025-40309",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40309"
},
{
"name": "CVE-2025-38313",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38313"
},
{
"name": "CVE-2025-38336",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38336"
},
{
"name": "CVE-2025-40349",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40349"
},
{
"name": "CVE-2025-40052",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40052"
},
{
"name": "CVE-2025-38408",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38408"
},
{
"name": "CVE-2025-40343",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40343"
},
{
"name": "CVE-2025-38644",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38644"
},
{
"name": "CVE-2025-38692",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38692"
},
{
"name": "CVE-2025-38061",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38061"
},
{
"name": "CVE-2025-68173",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68173"
},
{
"name": "CVE-2025-37983",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37983"
},
{
"name": "CVE-2025-38127",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38127"
},
{
"name": "CVE-2025-38375",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38375"
},
{
"name": "CVE-2025-37784",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37784"
},
{
"name": "CVE-2025-39701",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39701"
},
{
"name": "CVE-2025-40308",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40308"
},
{
"name": "CVE-2025-40187",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40187"
},
{
"name": "CVE-2025-37920",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37920"
},
{
"name": "CVE-2025-40315",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40315"
},
{
"name": "CVE-2025-37815",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37815"
},
{
"name": "CVE-2025-38686",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38686"
},
{
"name": "CVE-2025-37819",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37819"
},
{
"name": "CVE-2025-39913",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39913"
},
{
"name": "CVE-2025-40092",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40092"
},
{
"name": "CVE-2025-40298",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40298"
},
{
"name": "CVE-2025-40355",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40355"
},
{
"name": "CVE-2025-38609",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38609"
},
{
"name": "CVE-2025-68186",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68186"
},
{
"name": "CVE-2025-39967",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39967"
},
{
"name": "CVE-2025-40054",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40054"
},
{
"name": "CVE-2025-68184",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68184"
},
{
"name": "CVE-2024-36357",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36357"
},
{
"name": "CVE-2025-38463",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38463"
},
{
"name": "CVE-2025-40115",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40115"
},
{
"name": "CVE-2025-38112",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38112"
},
{
"name": "CVE-2025-38521",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38521"
},
{
"name": "CVE-2025-38023",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38023"
},
{
"name": "CVE-2025-39709",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39709"
},
{
"name": "CVE-2025-38282",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38282"
},
{
"name": "CVE-2025-39689",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39689"
},
{
"name": "CVE-2025-38215",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38215"
},
{
"name": "CVE-2025-39787",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39787"
},
{
"name": "CVE-2025-37943",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37943"
},
{
"name": "CVE-2025-37745",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37745"
},
{
"name": "CVE-2025-40058",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40058"
},
{
"name": "CVE-2025-39731",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39731"
},
{
"name": "CVE-2025-38734",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38734"
},
{
"name": "CVE-2025-38653",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38653"
},
{
"name": "CVE-2025-38571",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38571"
},
{
"name": "CVE-2025-37789",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37789"
},
{
"name": "CVE-2025-40347",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40347"
},
{
"name": "CVE-2025-38695",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38695"
},
{
"name": "CVE-2025-38004",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38004"
},
{
"name": "CVE-2025-39749",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39749"
},
{
"name": "CVE-2025-40198",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40198"
},
{
"name": "CVE-2025-68310",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68310"
},
{
"name": "CVE-2025-68179",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68179"
},
{
"name": "CVE-2025-40145",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40145"
},
{
"name": "CVE-2025-39949",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39949"
},
{
"name": "CVE-2025-38387",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38387"
},
{
"name": "CVE-2025-68169",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68169"
},
{
"name": "CVE-2025-38362",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38362"
},
{
"name": "CVE-2025-40173",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40173"
},
{
"name": "CVE-2025-68316",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68316"
},
{
"name": "CVE-2025-68321",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68321"
},
{
"name": "CVE-2025-37924",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37924"
},
{
"name": "CVE-2025-40004",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40004"
},
{
"name": "CVE-2025-38371",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38371"
},
{
"name": "CVE-2024-56538",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56538"
},
{
"name": "CVE-2025-39923",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39923"
},
{
"name": "CVE-2025-38445",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38445"
},
{
"name": "CVE-2025-38456",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38456"
},
{
"name": "CVE-2025-38538",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38538"
},
{
"name": "CVE-2025-37867",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37867"
},
{
"name": "CVE-2025-23160",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-23160"
},
{
"name": "CVE-2025-40311",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40311"
},
{
"name": "CVE-2025-38295",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38295"
},
{
"name": "CVE-2025-38461",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38461"
},
{
"name": "CVE-2025-37857",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37857"
},
{
"name": "CVE-2025-37842",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37842"
},
{
"name": "CVE-2025-40237",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40237"
},
{
"name": "CVE-2025-39953",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39953"
},
{
"name": "CVE-2025-38710",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38710"
},
{
"name": "CVE-2025-39681",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39681"
},
{
"name": "CVE-2025-38060",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38060"
},
{
"name": "CVE-2025-40167",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40167"
},
{
"name": "CVE-2025-38159",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38159"
},
{
"name": "CVE-2025-38066",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38066"
},
{
"name": "CVE-2025-39770",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39770"
},
{
"name": "CVE-2025-39969",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39969"
},
{
"name": "CVE-2025-37744",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37744"
},
{
"name": "CVE-2025-38705",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38705"
},
{
"name": "CVE-2025-40194",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40194"
},
{
"name": "CVE-2025-38706",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38706"
},
{
"name": "CVE-2025-40333",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40333"
},
{
"name": "CVE-2025-38305",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38305"
},
{
"name": "CVE-2025-37884",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37884"
},
{
"name": "CVE-2025-38067",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38067"
},
{
"name": "CVE-2025-39750",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39750"
},
{
"name": "CVE-2025-38699",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38699"
},
{
"name": "CVE-2025-37927",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37927"
},
{
"name": "CVE-2025-38707",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38707"
},
{
"name": "CVE-2025-38562",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38562"
},
{
"name": "CVE-2025-37897",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37897"
},
{
"name": "CVE-2025-40256",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40256"
},
{
"name": "CVE-2025-37911",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37911"
},
{
"name": "CVE-2025-40245",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40245"
},
{
"name": "CVE-2025-38587",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38587"
},
{
"name": "CVE-2025-37869",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37869"
},
{
"name": "CVE-2025-39692",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39692"
},
{
"name": "CVE-2025-40360",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40360"
},
{
"name": "CVE-2025-40332",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40332"
},
{
"name": "CVE-2025-40082",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40082"
},
{
"name": "CVE-2025-38068",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38068"
},
{
"name": "CVE-2025-38436",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38436"
},
{
"name": "CVE-2025-37930",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37930"
},
{
"name": "CVE-2025-40104",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40104"
},
{
"name": "CVE-2025-38401",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38401"
},
{
"name": "CVE-2025-38677",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38677"
},
{
"name": "CVE-2025-38097",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38097"
},
{
"name": "CVE-2025-37810",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37810"
},
{
"name": "CVE-2025-38253",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38253"
},
{
"name": "CVE-2025-40097",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40097"
},
{
"name": "CVE-2025-38123",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38123"
},
{
"name": "CVE-2025-38338",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38338"
},
{
"name": "CVE-2025-38555",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38555"
},
{
"name": "CVE-2025-38239",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38239"
},
{
"name": "CVE-2025-40001",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40001"
},
{
"name": "CVE-2025-38590",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38590"
},
{
"name": "CVE-2025-38027",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38027"
},
{
"name": "CVE-2025-38102",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38102"
},
{
"name": "CVE-2025-40035",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40035"
},
{
"name": "CVE-2025-68187",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68187"
},
{
"name": "CVE-2025-38283",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38283"
},
{
"name": "CVE-2025-40322",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40322"
},
{
"name": "CVE-2025-68209",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68209"
},
{
"name": "CVE-2025-40045",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40045"
},
{
"name": "CVE-2025-23159",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-23159"
},
{
"name": "CVE-2025-39988",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39988"
},
{
"name": "CVE-2025-38455",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38455"
},
{
"name": "CVE-2025-40313",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40313"
},
{
"name": "CVE-2025-40089",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40089"
},
{
"name": "CVE-2025-38584",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38584"
},
{
"name": "CVE-2025-38015",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38015"
},
{
"name": "CVE-2025-39675",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39675"
},
{
"name": "CVE-2025-39679",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39679"
},
{
"name": "CVE-2025-38527",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38527"
},
{
"name": "CVE-2025-38449",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38449"
},
{
"name": "CVE-2025-40233",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40233"
},
{
"name": "CVE-2025-40172",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40172"
},
{
"name": "CVE-2025-37853",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37853"
},
{
"name": "CVE-2025-38126",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38126"
},
{
"name": "CVE-2025-38149",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38149"
},
{
"name": "CVE-2025-39763",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39763"
},
{
"name": "CVE-2025-38399",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38399"
},
{
"name": "CVE-2025-40020",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40020"
},
{
"name": "CVE-2025-38065",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38065"
},
{
"name": "CVE-2025-38693",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38693"
},
{
"name": "CVE-2025-38679",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38679"
},
{
"name": "CVE-2025-38459",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38459"
},
{
"name": "CVE-2025-40188",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40188"
},
{
"name": "CVE-2025-40271",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40271"
},
{
"name": "CVE-2025-40291",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40291"
},
{
"name": "CVE-2025-38685",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38685"
},
{
"name": "CVE-2025-40359",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40359"
},
{
"name": "CVE-2025-38412",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38412"
},
{
"name": "CVE-2025-38031",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38031"
},
{
"name": "CVE-2025-40186",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40186"
},
{
"name": "CVE-2025-38293",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38293"
},
{
"name": "CVE-2025-40073",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40073"
},
{
"name": "CVE-2025-38648",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38648"
},
{
"name": "CVE-2025-38278",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38278"
},
{
"name": "CVE-2025-37764",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37764"
},
{
"name": "CVE-2025-38184",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38184"
},
{
"name": "CVE-2025-37741",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37741"
},
{
"name": "CVE-2025-38053",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38053"
},
{
"name": "CVE-2025-40242",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40242"
},
{
"name": "CVE-2025-37822",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37822"
},
{
"name": "CVE-2025-37912",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37912"
},
{
"name": "CVE-2025-38482",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38482"
},
{
"name": "CVE-2025-37820",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37820"
},
{
"name": "CVE-2025-68198",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68198"
},
{
"name": "CVE-2025-37985",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37985"
},
{
"name": "CVE-2025-68314",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68314"
},
{
"name": "CVE-2025-38634",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38634"
},
{
"name": "CVE-2025-40212",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40212"
},
{
"name": "CVE-2025-37787",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37787"
},
{
"name": "CVE-2025-38008",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38008"
},
{
"name": "CVE-2025-38458",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38458"
},
{
"name": "CVE-2025-39730",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39730"
},
{
"name": "CVE-2025-38011",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38011"
},
{
"name": "CVE-2025-68190",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68190"
},
{
"name": "CVE-2025-38034",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38034"
},
{
"name": "CVE-2025-40086",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40086"
},
{
"name": "CVE-2025-68242",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68242"
},
{
"name": "CVE-2025-38135",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38135"
},
{
"name": "CVE-2025-38619",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38619"
},
{
"name": "CVE-2025-40169",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40169"
},
{
"name": "CVE-2025-38312",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38312"
},
{
"name": "CVE-2025-38095",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38095"
},
{
"name": "CVE-2025-37878",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37878"
},
{
"name": "CVE-2025-39737",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39737"
},
{
"name": "CVE-2025-38464",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38464"
},
{
"name": "CVE-2025-40049",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40049"
},
{
"name": "CVE-2025-68322",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68322"
},
{
"name": "CVE-2025-38363",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38363"
},
{
"name": "CVE-2025-38702",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38702"
},
{
"name": "CVE-2025-38319",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38319"
},
{
"name": "CVE-2022-49698",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49698"
},
{
"name": "CVE-2025-40238",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40238"
},
{
"name": "CVE-2025-38724",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38724"
},
{
"name": "CVE-2025-68205",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68205"
},
{
"name": "CVE-2025-40277",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40277"
},
{
"name": "CVE-2025-40070",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40070"
},
{
"name": "CVE-2025-38250",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38250"
},
{
"name": "CVE-2025-38457",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38457"
},
{
"name": "CVE-2025-38582",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38582"
},
{
"name": "CVE-2025-37813",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37813"
},
{
"name": "CVE-2025-38543",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38543"
},
{
"name": "CVE-2025-38698",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38698"
},
{
"name": "CVE-2025-38212",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38212"
},
{
"name": "CVE-2025-40106",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40106"
},
{
"name": "CVE-2025-68174",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68174"
},
{
"name": "CVE-2025-38298",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38298"
},
{
"name": "CVE-2025-40272",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40272"
},
{
"name": "CVE-2025-39739",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39739"
},
{
"name": "CVE-2025-38024",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38024"
},
{
"name": "CVE-2025-40047",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40047"
},
{
"name": "CVE-2025-38496",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38496"
},
{
"name": "CVE-2025-38078",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38078"
},
{
"name": "CVE-2025-38419",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38419"
},
{
"name": "CVE-2025-40136",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40136"
},
{
"name": "CVE-2025-38533",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38533"
},
{
"name": "CVE-2025-40344",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40344"
},
{
"name": "CVE-2025-40205",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40205"
},
{
"name": "CVE-2025-40354",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40354"
},
{
"name": "CVE-2025-38169",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38169"
},
{
"name": "CVE-2025-37931",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37931"
},
{
"name": "CVE-2025-38511",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38511"
},
{
"name": "CVE-2025-38537",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38537"
},
{
"name": "CVE-2025-38546",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38546"
},
{
"name": "CVE-2025-38211",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38211"
},
{
"name": "CVE-2025-40033",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40033"
},
{
"name": "CVE-2025-38057",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38057"
},
{
"name": "CVE-2025-40122",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40122"
},
{
"name": "CVE-2025-68188",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68188"
},
{
"name": "CVE-2025-40269",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40269"
},
{
"name": "CVE-2025-37887",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37887"
},
{
"name": "CVE-2025-38077",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38077"
},
{
"name": "CVE-2025-38251",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38251"
},
{
"name": "CVE-2025-37861",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37861"
},
{
"name": "CVE-2025-68319",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68319"
},
{
"name": "CVE-2025-40119",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40119"
},
{
"name": "CVE-2025-38120",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38120"
},
{
"name": "CVE-2025-38285",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38285"
},
{
"name": "CVE-2025-39743",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39743"
},
{
"name": "CVE-2025-39718",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39718"
},
{
"name": "CVE-2025-37938",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37938"
},
{
"name": "CVE-2025-38005",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38005"
},
{
"name": "CVE-2025-38368",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38368"
},
{
"name": "CVE-2025-40075",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40075"
},
{
"name": "CVE-2025-38161",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38161"
},
{
"name": "CVE-2025-38331",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38331"
},
{
"name": "CVE-2025-38354",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38354"
},
{
"name": "CVE-2025-40138",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40138"
},
{
"name": "CVE-2025-38712",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38712"
},
{
"name": "CVE-2025-38732",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38732"
},
{
"name": "CVE-2025-39773",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39773"
},
{
"name": "CVE-2025-38696",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38696"
},
{
"name": "CVE-2025-40143",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40143"
},
{
"name": "CVE-2025-68189",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68189"
},
{
"name": "CVE-2025-38274",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38274"
},
{
"name": "CVE-2025-40076",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40076"
},
{
"name": "CVE-2025-40027",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40027"
},
{
"name": "CVE-2025-39885",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39885"
},
{
"name": "CVE-2025-68180",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68180"
},
{
"name": "CVE-2025-37874",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37874"
},
{
"name": "CVE-2025-38115",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38115"
},
{
"name": "CVE-2025-38632",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38632"
},
{
"name": "CVE-2025-37988",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37988"
},
{
"name": "CVE-2025-23158",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-23158"
},
{
"name": "CVE-2025-23144",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-23144"
},
{
"name": "CVE-2025-38153",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38153"
},
{
"name": "CVE-2025-37969",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37969"
},
{
"name": "CVE-2025-38548",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38548"
},
{
"name": "CVE-2025-37816",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37816"
},
{
"name": "CVE-2025-40362",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40362"
},
{
"name": "CVE-2025-37742",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37742"
},
{
"name": "CVE-2025-68201",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68201"
},
{
"name": "CVE-2025-40289",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40289"
},
{
"name": "CVE-2025-37765",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37765"
},
{
"name": "CVE-2025-38395",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38395"
},
{
"name": "CVE-2025-37921",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37921"
},
{
"name": "CVE-2025-38507",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38507"
},
{
"name": "CVE-2025-40230",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40230"
},
{
"name": "CVE-2025-39989",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39989"
},
{
"name": "CVE-2025-38337",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38337"
},
{
"name": "CVE-2025-38014",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38014"
},
{
"name": "CVE-2025-38258",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38258"
},
{
"name": "CVE-2025-37828",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37828"
},
{
"name": "CVE-2025-37769",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37769"
},
{
"name": "CVE-2025-38465",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38465"
},
{
"name": "CVE-2025-38513",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38513"
},
{
"name": "CVE-2025-39970",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39970"
},
{
"name": "CVE-2025-40292",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40292"
},
{
"name": "CVE-2025-38086",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38086"
},
{
"name": "CVE-2025-68181",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68181"
},
{
"name": "CVE-2025-37935",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37935"
},
{
"name": "CVE-2025-40032",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40032"
},
{
"name": "CVE-2025-38396",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38396"
},
{
"name": "CVE-2025-23161",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-23161"
},
{
"name": "CVE-2025-38407",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38407"
},
{
"name": "CVE-2025-39994",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39994"
},
{
"name": "CVE-2025-38493",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38493"
},
{
"name": "CVE-2025-37803",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37803"
},
{
"name": "CVE-2025-40228",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40228"
},
{
"name": "CVE-2025-40150",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40150"
},
{
"name": "CVE-2025-38670",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38670"
},
{
"name": "CVE-2025-39732",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39732"
},
{
"name": "CVE-2025-37824",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37824"
},
{
"name": "CVE-2025-40274",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40274"
},
{
"name": "CVE-2025-38602",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38602"
},
{
"name": "CVE-2025-38003",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38003"
},
{
"name": "CVE-2025-38441",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38441"
},
{
"name": "CVE-2025-40206",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40206"
},
{
"name": "CVE-2025-40218",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40218"
},
{
"name": "CVE-2025-38007",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38007"
},
{
"name": "CVE-2025-37923",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37923"
},
{
"name": "CVE-2025-40088",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40088"
},
{
"name": "CVE-2025-40220",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40220"
},
{
"name": "CVE-2025-38142",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38142"
},
{
"name": "CVE-2025-37739",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37739"
},
{
"name": "CVE-2025-38478",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38478"
},
{
"name": "CVE-2025-38568",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38568"
},
{
"name": "CVE-2025-38583",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38583"
},
{
"name": "CVE-2025-39788",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39788"
},
{
"name": "CVE-2025-22058",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22058"
},
{
"name": "CVE-2025-37831",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37831"
},
{
"name": "CVE-2025-38499",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38499"
},
{
"name": "CVE-2025-68312",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68312"
},
{
"name": "CVE-2025-40062",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40062"
},
{
"name": "CVE-2025-68194",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68194"
},
{
"name": "CVE-2025-38269",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38269"
},
{
"name": "CVE-2025-38079",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38079"
},
{
"name": "CVE-2025-37940",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37940"
},
{
"name": "CVE-2025-40336",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40336"
},
{
"name": "CVE-2025-37945",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37945"
},
{
"name": "CVE-2025-40067",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40067"
},
{
"name": "CVE-2025-40109",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40109"
},
{
"name": "CVE-2025-40101",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40101"
},
{
"name": "CVE-2025-38735",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38735"
},
{
"name": "CVE-2025-40006",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40006"
},
{
"name": "CVE-2025-68251",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68251"
},
{
"name": "CVE-2025-38652",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38652"
},
{
"name": "CVE-2025-38110",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38110"
},
{
"name": "CVE-2025-38422",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38422"
},
{
"name": "CVE-2025-38402",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38402"
},
{
"name": "CVE-2025-39698",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39698"
},
{
"name": "CVE-2025-40038",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40038"
},
{
"name": "CVE-2025-37915",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37915"
},
{
"name": "CVE-2025-68183",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68183"
},
{
"name": "CVE-2025-23146",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-23146"
},
{
"name": "CVE-2025-37903",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37903"
},
{
"name": "CVE-2025-40353",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40353"
},
{
"name": "CVE-2025-40222",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40222"
},
{
"name": "CVE-2025-23142",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-23142"
},
{
"name": "CVE-2025-37738",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37738"
},
{
"name": "CVE-2025-40011",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40011"
},
{
"name": "CVE-2025-38303",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38303"
},
{
"name": "CVE-2025-38074",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38074"
},
{
"name": "CVE-2025-40085",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40085"
},
{
"name": "CVE-2025-38119",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38119"
},
{
"name": "CVE-2025-38232",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38232"
},
{
"name": "CVE-2025-38245",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38245"
},
{
"name": "CVE-2025-40184",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40184"
},
{
"name": "CVE-2025-68244",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68244"
},
{
"name": "CVE-2025-40231",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40231"
},
{
"name": "CVE-2025-38324",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38324"
},
{
"name": "CVE-2025-40278",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40278"
},
{
"name": "CVE-2025-38018",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38018"
},
{
"name": "CVE-2025-40176",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40176"
},
{
"name": "CVE-2025-40342",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40342"
},
{
"name": "CVE-2025-37830",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37830"
},
{
"name": "CVE-2025-38614",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38614"
},
{
"name": "CVE-2025-37991",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37991"
},
{
"name": "CVE-2025-38425",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38425"
},
{
"name": "CVE-2025-40210",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40210"
},
{
"name": "CVE-2025-37978",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37978"
},
{
"name": "CVE-2025-37781",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37781"
},
{
"name": "CVE-2025-38210",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38210"
},
{
"name": "CVE-2025-38542",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38542"
},
{
"name": "CVE-2025-38664",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38664"
},
{
"name": "CVE-2025-38344",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38344"
},
{
"name": "CVE-2025-23145",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-23145"
},
{
"name": "CVE-2025-23143",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-23143"
},
{
"name": "CVE-2025-38322",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38322"
},
{
"name": "CVE-2025-38088",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38088"
},
{
"name": "CVE-2025-23141",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-23141"
},
{
"name": "CVE-2025-40193",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40193"
},
{
"name": "CVE-2025-37823",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37823"
},
{
"name": "CVE-2025-38332",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38332"
},
{
"name": "CVE-2025-40148",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40148"
},
{
"name": "CVE-2025-40326",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40326"
},
{
"name": "CVE-2025-38386",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38386"
},
{
"name": "CVE-2025-40279",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40279"
},
{
"name": "CVE-2025-38385",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38385"
},
{
"name": "CVE-2025-40201",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40201"
},
{
"name": "CVE-2025-37952",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37952"
},
{
"name": "CVE-2025-38694",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38694"
},
{
"name": "CVE-2025-37793",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37793"
},
{
"name": "CVE-2025-40084",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40084"
},
{
"name": "CVE-2025-68311",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68311"
},
{
"name": "CVE-2025-37740",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37740"
},
{
"name": "CVE-2025-38676",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38676"
},
{
"name": "CVE-2025-38530",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38530"
},
{
"name": "CVE-2025-38174",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38174"
},
{
"name": "CVE-2025-37826",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37826"
},
{
"name": "CVE-2025-37986",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37986"
},
{
"name": "CVE-2025-37829",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37829"
},
{
"name": "CVE-2025-68320",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68320"
},
{
"name": "CVE-2025-40341",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40341"
},
{
"name": "CVE-2025-38409",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38409"
},
{
"name": "CVE-2025-40199",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40199"
},
{
"name": "CVE-2025-40183",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40183"
},
{
"name": "CVE-2025-38019",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38019"
},
{
"name": "CVE-2025-38729",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38729"
},
{
"name": "CVE-2025-68172",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68172"
},
{
"name": "CVE-2025-23151",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-23151"
},
{
"name": "CVE-2025-38037",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38037"
},
{
"name": "CVE-2025-39998",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39998"
},
{
"name": "CVE-2025-40338",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40338"
},
{
"name": "CVE-2025-40195",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40195"
},
{
"name": "CVE-2025-37796",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37796"
},
{
"name": "CVE-2025-37962",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37962"
},
{
"name": "CVE-2025-40134",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40134"
},
{
"name": "CVE-2025-38681",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38681"
},
{
"name": "CVE-2025-37799",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37799"
},
{
"name": "CVE-2025-38593",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38593"
},
{
"name": "CVE-2025-39968",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39968"
},
{
"name": "CVE-2025-38342",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38342"
},
{
"name": "CVE-2025-39795",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39795"
},
{
"name": "CVE-2025-37801",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37801"
},
{
"name": "CVE-2025-38167",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38167"
},
{
"name": "CVE-2025-37883",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37883"
},
{
"name": "CVE-2025-40302",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40302"
},
{
"name": "CVE-2025-37863",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37863"
},
{
"name": "CVE-2025-37901",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37901"
},
{
"name": "CVE-2025-38687",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38687"
},
{
"name": "CVE-2025-40358",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40358"
},
{
"name": "CVE-2025-37811",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37811"
},
{
"name": "CVE-2025-40165",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40165"
},
{
"name": "CVE-2025-38257",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38257"
},
{
"name": "CVE-2025-68318",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68318"
},
{
"name": "CVE-2025-37864",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37864"
},
{
"name": "CVE-2025-38307",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38307"
},
{
"name": "CVE-2025-40161",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40161"
},
{
"name": "CVE-2025-40357",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40357"
},
{
"name": "CVE-2025-40328",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40328"
},
{
"name": "CVE-2025-37916",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37916"
},
{
"name": "CVE-2025-40340",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40340"
},
{
"name": "CVE-2025-38111",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38111"
},
{
"name": "CVE-2025-39986",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39986"
},
{
"name": "CVE-2025-37767",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37767"
},
{
"name": "CVE-2025-40283",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40283"
},
{
"name": "CVE-2025-39955",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39955"
},
{
"name": "CVE-2025-40324",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40324"
},
{
"name": "CVE-2025-37989",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37989"
},
{
"name": "CVE-2025-38529",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38529"
},
{
"name": "CVE-2025-40131",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40131"
},
{
"name": "CVE-2025-40146",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40146"
},
{
"name": "CVE-2025-38326",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38326"
},
{
"name": "CVE-2025-40177",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40177"
},
{
"name": "CVE-2025-38055",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38055"
},
{
"name": "CVE-2025-38129",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38129"
},
{
"name": "CVE-2025-38384",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38384"
},
{
"name": "CVE-2025-38334",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38334"
},
{
"name": "CVE-2025-38728",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38728"
},
{
"name": "CVE-2025-38424",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38424"
},
{
"name": "CVE-2025-38430",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38430"
},
{
"name": "CVE-2025-38715",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38715"
},
{
"name": "CVE-2025-39734",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39734"
},
{
"name": "CVE-2025-38089",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38089"
},
{
"name": "CVE-2025-40226",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40226"
},
{
"name": "CVE-2025-40078",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40078"
},
{
"name": "CVE-2025-38382",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38382"
},
{
"name": "CVE-2025-40074",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40074"
},
{
"name": "CVE-2025-38608",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38608"
},
{
"name": "CVE-2025-40321",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40321"
},
{
"name": "CVE-2025-38650",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38650"
},
{
"name": "CVE-2025-40069",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40069"
},
{
"name": "CVE-2025-39710",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39710"
},
{
"name": "CVE-2025-40116",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40116"
},
{
"name": "CVE-2025-68249",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68249"
},
{
"name": "CVE-2025-38124",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38124"
},
{
"name": "CVE-2025-39934",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39934"
},
{
"name": "CVE-2025-37925",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37925"
},
{
"name": "CVE-2025-40158",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40158"
},
{
"name": "CVE-2025-39683",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39683"
},
{
"name": "CVE-2025-38420",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38420"
},
{
"name": "CVE-2025-38071",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38071"
},
{
"name": "CVE-2025-40327",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40327"
},
{
"name": "CVE-2025-40130",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40130"
},
{
"name": "CVE-2025-40179",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40179"
},
{
"name": "CVE-2025-37972",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37972"
},
{
"name": "CVE-2025-38183",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38183"
},
{
"name": "CVE-2025-40127",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40127"
},
{
"name": "CVE-2025-37768",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37768"
},
{
"name": "CVE-2025-40282",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40282"
},
{
"name": "CVE-2025-39794",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39794"
},
{
"name": "CVE-2025-38160",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38160"
},
{
"name": "CVE-2025-37984",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37984"
},
{
"name": "CVE-2025-38528",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38528"
},
{
"name": "CVE-2025-39996",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39996"
},
{
"name": "CVE-2025-40168",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40168"
},
{
"name": "CVE-2025-37856",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37856"
},
{
"name": "CVE-2025-38107",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38107"
},
{
"name": "CVE-2025-38292",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38292"
},
{
"name": "CVE-2025-40053",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40053"
},
{
"name": "CVE-2025-38085",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38085"
},
{
"name": "CVE-2025-38222",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38222"
},
{
"name": "CVE-2025-38010",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38010"
},
{
"name": "CVE-2025-38197",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38197"
},
{
"name": "CVE-2025-39951",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39951"
},
{
"name": "CVE-2025-38468",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38468"
},
{
"name": "CVE-2025-40120",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40120"
},
{
"name": "CVE-2025-40185",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40185"
},
{
"name": "CVE-2025-38688",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38688"
},
{
"name": "CVE-2025-38333",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38333"
},
{
"name": "CVE-2025-40295",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40295"
},
{
"name": "CVE-2025-68192",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68192"
},
{
"name": "CVE-2025-37970",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37970"
},
{
"name": "CVE-2025-21884",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21884"
},
{
"name": "CVE-2025-37905",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37905"
},
{
"name": "CVE-2025-38390",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38390"
},
{
"name": "CVE-2025-38013",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38013"
},
{
"name": "CVE-2025-40098",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40098"
},
{
"name": "CVE-2025-38059",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38059"
},
{
"name": "CVE-2025-38713",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38713"
},
{
"name": "CVE-2025-37956",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37956"
},
{
"name": "CVE-2025-40243",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40243"
},
{
"name": "CVE-2025-40196",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40196"
},
{
"name": "CVE-2025-38148",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38148"
},
{
"name": "CVE-2025-40129",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40129"
},
{
"name": "CVE-2025-38467",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38467"
},
{
"name": "CVE-2025-38117",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38117"
},
{
"name": "CVE-2025-38094",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38094"
},
{
"name": "CVE-2025-68171",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68171"
},
{
"name": "CVE-2025-38072",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38072"
},
{
"name": "CVE-2025-37967",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37967"
},
{
"name": "CVE-2025-40301",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40301"
},
{
"name": "CVE-2025-38300",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38300"
},
{
"name": "CVE-2025-40040",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40040"
},
{
"name": "CVE-2025-38289",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38289"
},
{
"name": "CVE-2025-39782",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39782"
},
{
"name": "CVE-2025-68207",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68207"
},
{
"name": "CVE-2025-40066",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40066"
},
{
"name": "CVE-2025-38075",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38075"
},
{
"name": "CVE-2025-37885",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37885"
},
{
"name": "CVE-2025-38697",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38697"
},
{
"name": "CVE-2025-37949",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37949"
},
{
"name": "CVE-2025-68167",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68167"
},
{
"name": "CVE-2025-38691",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38691"
},
{
"name": "CVE-2025-40207",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40207"
},
{
"name": "CVE-2025-38373",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38373"
},
{
"name": "CVE-2025-38489",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38489"
},
{
"name": "CVE-2025-40095",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40095"
},
{
"name": "CVE-2025-37957",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37957"
},
{
"name": "CVE-2025-38058",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38058"
},
{
"name": "CVE-2025-38483",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38483"
},
{
"name": "CVE-2025-38369",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38369"
},
{
"name": "CVE-2025-39759",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39759"
},
{
"name": "CVE-2025-38639",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38639"
},
{
"name": "CVE-2025-38122",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38122"
},
{
"name": "CVE-2025-38612",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38612"
},
{
"name": "CVE-2025-40299",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40299"
},
{
"name": "CVE-2025-38173",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38173"
},
{
"name": "CVE-2025-40286",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40286"
},
{
"name": "CVE-2025-38143",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38143"
},
{
"name": "CVE-2025-38098",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38098"
},
{
"name": "CVE-2025-40091",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40091"
},
{
"name": "CVE-2025-40318",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40318"
},
{
"name": "CVE-2025-38566",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38566"
},
{
"name": "CVE-2025-39721",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39721"
},
{
"name": "CVE-2025-68241",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68241"
},
{
"name": "CVE-2025-39760",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39760"
},
{
"name": "CVE-2025-40118",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40118"
},
{
"name": "CVE-2025-38718",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38718"
},
{
"name": "CVE-2025-38392",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38392"
},
{
"name": "CVE-2025-39673",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39673"
},
{
"name": "CVE-2025-38259",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38259"
},
{
"name": "CVE-2025-38663",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38663"
},
{
"name": "CVE-2025-40021",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40021"
},
{
"name": "CVE-2025-40135",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40135"
},
{
"name": "CVE-2025-38156",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38156"
},
{
"name": "CVE-2025-37951",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37951"
},
{
"name": "CVE-2025-37840",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37840"
},
{
"name": "CVE-2025-68253",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68253"
},
{
"name": "CVE-2025-68734",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68734"
},
{
"name": "CVE-2025-37947",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37947"
},
{
"name": "CVE-2025-38416",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38416"
},
{
"name": "CVE-2025-37846",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37846"
},
{
"name": "CVE-2025-38722",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38722"
},
{
"name": "CVE-2025-38192",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38192"
},
{
"name": "CVE-2025-39800",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39800"
},
{
"name": "CVE-2025-40044",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40044"
},
{
"name": "CVE-2025-38343",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38343"
},
{
"name": "CVE-2025-40105",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40105"
},
{
"name": "CVE-2025-38202",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38202"
},
{
"name": "CVE-2025-40050",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40050"
},
{
"name": "CVE-2025-40072",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40072"
},
{
"name": "CVE-2025-40112",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40112"
},
{
"name": "CVE-2025-40079",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40079"
},
{
"name": "CVE-2025-22101",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22101"
},
{
"name": "CVE-2025-38374",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38374"
},
{
"name": "CVE-2025-39703",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39703"
},
{
"name": "CVE-2025-38194",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38194"
},
{
"name": "CVE-2025-68182",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68182"
},
{
"name": "CVE-2025-38549",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38549"
},
{
"name": "CVE-2025-40310",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40310"
},
{
"name": "CVE-2025-38665",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38665"
},
{
"name": "CVE-2025-38101",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38101"
},
{
"name": "CVE-2025-37982",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37982"
},
{
"name": "CVE-2025-37992",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37992"
},
{
"name": "CVE-2025-38577",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38577"
},
{
"name": "CVE-2025-38671",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38671"
},
{
"name": "CVE-2025-68317",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68317"
},
{
"name": "CVE-2025-39971",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39971"
},
{
"name": "CVE-2025-38299",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38299"
},
{
"name": "CVE-2025-40154",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40154"
},
{
"name": "CVE-2025-40331",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40331"
},
{
"name": "CVE-2025-38635",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38635"
},
{
"name": "CVE-2025-38704",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38704"
},
{
"name": "CVE-2025-38348",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38348"
},
{
"name": "CVE-2025-40270",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40270"
},
{
"name": "CVE-2025-40191",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40191"
},
{
"name": "CVE-2025-38488",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38488"
},
{
"name": "CVE-2025-40189",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40189"
},
{
"name": "CVE-2025-40093",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40093"
},
{
"name": "CVE-2025-38540",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38540"
},
{
"name": "CVE-2025-38040",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38040"
},
{
"name": "CVE-2025-38265",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38265"
},
{
"name": "CVE-2025-23149",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-23149"
},
{
"name": "CVE-2025-38403",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38403"
},
{
"name": "CVE-2025-21726",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21726"
},
{
"name": "CVE-2025-38552",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38552"
},
{
"name": "CVE-2025-40335",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40335"
},
{
"name": "CVE-2025-40149",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40149"
},
{
"name": "CVE-2025-37914",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37914"
},
{
"name": "CVE-2025-40164",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40164"
},
{
"name": "CVE-2025-37873",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37873"
},
{
"name": "CVE-2025-37928",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37928"
},
{
"name": "CVE-2025-40267",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40267"
},
{
"name": "CVE-2025-40235",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40235"
},
{
"name": "CVE-2025-39766",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39766"
},
{
"name": "CVE-2025-39801",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39801"
},
{
"name": "CVE-2025-37922",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37922"
},
{
"name": "CVE-2025-38146",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38146"
},
{
"name": "CVE-2025-68208",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68208"
},
{
"name": "CVE-2025-39724",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39724"
},
{
"name": "CVE-2025-39687",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39687"
},
{
"name": "CVE-2025-37794",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37794"
},
{
"name": "CVE-2025-38510",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38510"
},
{
"name": "CVE-2025-38246",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38246"
},
{
"name": "CVE-2025-39758",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39758"
},
{
"name": "CVE-2025-39694",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39694"
},
{
"name": "CVE-2025-38220",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38220"
},
{
"name": "CVE-2025-38405",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38405"
},
{
"name": "CVE-2025-38418",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38418"
},
{
"name": "CVE-2025-40352",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40352"
},
{
"name": "CVE-2025-38090",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38090"
},
{
"name": "CVE-2025-38429",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38429"
},
{
"name": "CVE-2025-38225",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38225"
},
{
"name": "CVE-2025-40280",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40280"
},
{
"name": "CVE-2025-38155",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38155"
},
{
"name": "CVE-2025-40099",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40099"
},
{
"name": "CVE-2025-71162",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71162"
},
{
"name": "CVE-2025-37977",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37977"
},
{
"name": "CVE-2025-38365",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38365"
},
{
"name": "CVE-2025-38415",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38415"
},
{
"name": "CVE-2025-40031",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40031"
},
{
"name": "CVE-2025-40180",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40180"
},
{
"name": "CVE-2025-40293",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40293"
},
{
"name": "CVE-2025-38668",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38668"
},
{
"name": "CVE-2025-37973",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37973"
},
{
"name": "CVE-2025-40330",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40330"
},
{
"name": "CVE-2025-68750",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68750"
},
{
"name": "CVE-2025-38260",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38260"
},
{
"name": "CVE-2025-37827",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37827"
},
{
"name": "CVE-2025-38721",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38721"
},
{
"name": "CVE-2025-38244",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38244"
},
{
"name": "CVE-2025-38080",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38080"
},
{
"name": "CVE-2025-40126",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40126"
},
{
"name": "CVE-2025-39972",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39972"
},
{
"name": "CVE-2025-37748",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37748"
},
{
"name": "CVE-2025-38364",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38364"
},
{
"name": "CVE-2025-38615",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38615"
},
{
"name": "CVE-2025-39684",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39684"
},
{
"name": "CVE-2025-37836",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37836"
},
{
"name": "CVE-2025-38526",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38526"
},
{
"name": "CVE-2025-38472",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38472"
},
{
"name": "CVE-2025-37944",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37944"
},
{
"name": "CVE-2025-38506",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38506"
},
{
"name": "CVE-2025-40320",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40320"
},
{
"name": "CVE-2025-38703",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38703"
},
{
"name": "CVE-2025-38494",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38494"
},
{
"name": "CVE-2025-39753",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39753"
},
{
"name": "CVE-2025-38604",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38604"
},
{
"name": "CVE-2025-40203",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40203"
},
{
"name": "CVE-2025-38623",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38623"
},
{
"name": "CVE-2025-38193",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38193"
},
{
"name": "CVE-2025-38400",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38400"
},
{
"name": "CVE-2025-38136",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38136"
},
{
"name": "CVE-2025-40192",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40192"
},
{
"name": "CVE-2025-38544",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38544"
},
{
"name": "CVE-2025-37771",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37771"
},
{
"name": "CVE-2025-39797",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39797"
},
{
"name": "CVE-2025-40200",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40200"
},
{
"name": "CVE-2025-38236",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38236"
},
{
"name": "CVE-2025-38725",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38725"
},
{
"name": "CVE-2025-37975",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37975"
},
{
"name": "CVE-2025-40124",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40124"
},
{
"name": "CVE-2025-38347",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38347"
},
{
"name": "CVE-2025-39776",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39776"
},
{
"name": "CVE-2025-39880",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39880"
},
{
"name": "CVE-2025-37998",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37998"
},
{
"name": "CVE-2025-38198",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38198"
},
{
"name": "CVE-2025-23163",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-23163"
},
{
"name": "CVE-2025-40094",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40094"
},
{
"name": "CVE-2025-37968",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37968"
},
{
"name": "CVE-2025-38376",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38376"
},
{
"name": "CVE-2025-38006",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38006"
},
{
"name": "CVE-2025-40102",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40102"
},
{
"name": "CVE-2025-40170",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40170"
},
{
"name": "CVE-2025-38437",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38437"
},
{
"name": "CVE-2025-40160",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40160"
},
{
"name": "CVE-2025-40284",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40284"
},
{
"name": "CVE-2025-38125",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38125"
},
{
"name": "CVE-2025-40209",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40209"
},
{
"name": "CVE-2025-40077",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40077"
},
{
"name": "CVE-2025-38351",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38351"
},
{
"name": "CVE-2025-38048",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38048"
},
{
"name": "CVE-2025-40071",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40071"
},
{
"name": "CVE-2025-38683",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38683"
},
{
"name": "CVE-2025-40113",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40113"
},
{
"name": "CVE-2025-39736",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39736"
},
{
"name": "CVE-2025-40234",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40234"
},
{
"name": "CVE-2025-37757",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37757"
},
{
"name": "CVE-2025-68247",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68247"
},
{
"name": "CVE-2025-40305",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40305"
},
{
"name": "CVE-2025-40080",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40080"
},
{
"name": "CVE-2025-40041",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40041"
},
{
"name": "CVE-2025-38009",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38009"
},
{
"name": "CVE-2025-40215",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40215"
},
{
"name": "CVE-2025-40307",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40307"
},
{
"name": "CVE-2025-40111",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40111"
},
{
"name": "CVE-2025-38081",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38081"
},
{
"name": "CVE-2025-37809",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37809"
},
{
"name": "CVE-2024-36350",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36350"
},
{
"name": "CVE-2025-40211",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40211"
},
{
"name": "CVE-2025-40068",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40068"
},
{
"name": "CVE-2025-38185",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38185"
},
{
"name": "CVE-2025-39691",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39691"
},
{
"name": "CVE-2025-38406",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38406"
},
{
"name": "CVE-2025-68315",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68315"
},
{
"name": "CVE-2025-40163",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40163"
},
{
"name": "CVE-2025-40042",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40042"
},
{
"name": "CVE-2025-37817",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37817"
},
{
"name": "CVE-2025-40155",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40155"
},
{
"name": "CVE-2025-39890",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39890"
},
{
"name": "CVE-2025-39742",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39742"
},
{
"name": "CVE-2025-40217",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40217"
},
{
"name": "CVE-2025-22102",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22102"
},
{
"name": "CVE-2025-37987",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37987"
},
{
"name": "CVE-2025-37749",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37749"
},
{
"name": "CVE-2024-36331",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36331"
},
{
"name": "CVE-2025-39748",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39748"
},
{
"name": "CVE-2025-40133",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40133"
},
{
"name": "CVE-2025-38263",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38263"
},
{
"name": "CVE-2025-38610",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38610"
},
{
"name": "CVE-2025-37772",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37772"
},
{
"name": "CVE-2025-38214",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38214"
},
{
"name": "CVE-2025-38560",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38560"
},
{
"name": "CVE-2025-37994",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37994"
},
{
"name": "CVE-2025-38551",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38551"
},
{
"name": "CVE-2025-38701",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38701"
},
{
"name": "CVE-2025-38218",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38218"
},
{
"name": "CVE-2025-40329",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40329"
},
{
"name": "CVE-2025-38349",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38349"
},
{
"name": "CVE-2025-39726",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39726"
},
{
"name": "CVE-2025-38393",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38393"
},
{
"name": "CVE-2025-37891",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37891"
},
{
"name": "CVE-2025-38249",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38249"
},
{
"name": "CVE-2025-38716",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38716"
},
{
"name": "CVE-2025-39937",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39937"
},
{
"name": "CVE-2025-37858",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37858"
},
{
"name": "CVE-2025-38154",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38154"
},
{
"name": "CVE-2025-38469",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38469"
},
{
"name": "CVE-2025-38581",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38581"
},
{
"name": "CVE-2025-40034",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40034"
},
{
"name": "CVE-2025-40060",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40060"
},
{
"name": "CVE-2025-39790",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39790"
},
{
"name": "CVE-2025-38389",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38389"
},
{
"name": "CVE-2025-38448",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38448"
},
{
"name": "CVE-2025-37780",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37780"
},
{
"name": "CVE-2025-37995",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37995"
},
{
"name": "CVE-2025-38680",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38680"
},
{
"name": "CVE-2025-37754",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37754"
},
{
"name": "CVE-2025-40059",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40059"
},
{
"name": "CVE-2025-38497",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38497"
},
{
"name": "CVE-2025-68168",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68168"
},
{
"name": "CVE-2025-23156",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-23156"
},
{
"name": "CVE-2025-23157",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-23157"
},
{
"name": "CVE-2025-68206",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68206"
},
{
"name": "CVE-2025-68309",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68309"
},
{
"name": "CVE-2025-38684",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38684"
},
{
"name": "CVE-2025-38165",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38165"
},
{
"name": "CVE-2025-40003",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40003"
},
{
"name": "CVE-2025-39686",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39686"
},
{
"name": "CVE-2025-39798",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39798"
},
{
"name": "CVE-2025-38495",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38495"
},
{
"name": "CVE-2025-37808",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37808"
},
{
"name": "CVE-2025-38730",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38730"
},
{
"name": "CVE-2025-38052",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38052"
},
{
"name": "CVE-2025-38377",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38377"
},
{
"name": "CVE-2025-40175",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40175"
},
{
"name": "CVE-2025-68170",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68170"
},
{
"name": "CVE-2025-39747",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39747"
},
{
"name": "CVE-2025-68313",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68313"
},
{
"name": "CVE-2025-38516",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38516"
},
{
"name": "CVE-2025-38462",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38462"
},
{
"name": "CVE-2025-38428",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38428"
},
{
"name": "CVE-2025-39714",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39714"
},
{
"name": "CVE-2025-38262",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38262"
},
{
"name": "CVE-2025-38138",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38138"
},
{
"name": "CVE-2025-38035",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38035"
},
{
"name": "CVE-2025-37759",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37759"
},
{
"name": "CVE-2025-38414",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38414"
},
{
"name": "CVE-2025-68197",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68197"
},
{
"name": "CVE-2025-40123",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40123"
},
{
"name": "CVE-2025-37933",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37933"
},
{
"name": "CVE-2025-38310",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38310"
},
{
"name": "CVE-2025-37886",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37886"
},
{
"name": "CVE-2025-37963",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37963"
},
{
"name": "CVE-2025-40297",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40297"
},
{
"name": "CVE-2025-38226",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38226"
},
{
"name": "CVE-2025-39706",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39706"
},
{
"name": "CVE-2025-40178",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40178"
},
{
"name": "CVE-2025-40363",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40363"
},
{
"name": "CVE-2025-38443",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38443"
},
{
"name": "CVE-2025-38576",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38576"
},
{
"name": "CVE-2025-39869",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39869"
},
{
"name": "CVE-2025-37800",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37800"
},
{
"name": "CVE-2025-39985",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39985"
},
{
"name": "CVE-2025-40276",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40276"
},
{
"name": "CVE-2025-37900",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37900"
},
{
"name": "CVE-2025-40224",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40224"
},
{
"name": "CVE-2025-38439",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38439"
},
{
"name": "CVE-2025-37805",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37805"
},
{
"name": "CVE-2025-68245",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68245"
},
{
"name": "CVE-2025-39719",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39719"
},
{
"name": "CVE-2025-40317",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40317"
},
{
"name": "CVE-2025-40236",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40236"
},
{
"name": "CVE-2025-37990",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37990"
},
{
"name": "CVE-2025-38553",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38553"
},
{
"name": "CVE-2025-38190",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38190"
},
{
"name": "CVE-2025-38180",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38180"
},
{
"name": "CVE-2025-39738",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39738"
},
{
"name": "CVE-2025-68202",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68202"
},
{
"name": "CVE-2025-38145",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38145"
},
{
"name": "CVE-2025-40174",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40174"
},
{
"name": "CVE-2025-37948",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37948"
},
{
"name": "CVE-2025-38166",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38166"
},
{
"name": "CVE-2025-40227",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40227"
},
{
"name": "CVE-2025-37862",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37862"
},
{
"name": "CVE-2025-38321",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38321"
},
{
"name": "CVE-2025-39705",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39705"
},
{
"name": "CVE-2025-40316",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40316"
},
{
"name": "CVE-2025-37960",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37960"
},
{
"name": "CVE-2025-38045",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38045"
},
{
"name": "CVE-2025-38051",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38051"
},
{
"name": "CVE-2025-39713",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39713"
},
{
"name": "CVE-2025-37763",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37763"
},
{
"name": "CVE-2025-37954",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37954"
},
{
"name": "CVE-2025-22128",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22128"
},
{
"name": "CVE-2025-40065",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40065"
},
{
"name": "CVE-2025-37839",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37839"
},
{
"name": "CVE-2025-39744",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39744"
},
{
"name": "CVE-2025-38277",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38277"
},
{
"name": "CVE-2025-37913",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37913"
},
{
"name": "CVE-2025-68177",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68177"
},
{
"name": "CVE-2025-39756",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39756"
},
{
"name": "CVE-2025-38539",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38539"
},
{
"name": "CVE-2025-40181",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40181"
},
{
"name": "CVE-2025-68191",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68191"
},
{
"name": "CVE-2025-38044",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38044"
},
{
"name": "CVE-2025-68250",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68250"
},
{
"name": "CVE-2025-37786",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37786"
},
{
"name": "CVE-2025-40141",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40141"
},
{
"name": "CVE-2025-38200",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38200"
},
{
"name": "CVE-2025-38480",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38480"
},
{
"name": "CVE-2025-40132",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40132"
},
{
"name": "CVE-2025-38346",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38346"
},
{
"name": "CVE-2025-40152",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40152"
},
{
"name": "CVE-2025-37959",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37959"
},
{
"name": "CVE-2025-38191",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38191"
},
{
"name": "CVE-2025-39946",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39946"
},
{
"name": "CVE-2025-38062",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38062"
},
{
"name": "CVE-2025-38531",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38531"
},
{
"name": "CVE-2025-40288",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40288"
},
{
"name": "CVE-2025-68239",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68239"
},
{
"name": "CVE-2025-39693",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39693"
},
{
"name": "CVE-2025-40281",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40281"
},
{
"name": "CVE-2025-68185",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68185"
},
{
"name": "CVE-2025-40304",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40304"
},
{
"name": "CVE-2025-38503",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38503"
},
{
"name": "CVE-2025-40110",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40110"
},
{
"name": "CVE-2025-40162",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40162"
},
{
"name": "CVE-2025-38630",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38630"
},
{
"name": "CVE-2025-38131",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38131"
},
{
"name": "CVE-2025-40268",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40268"
},
{
"name": "CVE-2025-39980",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39980"
},
{
"name": "CVE-2025-37851",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37851"
},
{
"name": "CVE-2025-38481",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38481"
},
{
"name": "CVE-2025-38585",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38585"
},
{
"name": "CVE-2025-38320",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38320"
},
{
"name": "CVE-2025-38625",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38625"
},
{
"name": "CVE-2025-38164",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38164"
},
{
"name": "CVE-2025-40303",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40303"
},
{
"name": "CVE-2025-68178",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68178"
},
{
"name": "CVE-2025-40337",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40337"
},
{
"name": "CVE-2025-40346",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40346"
},
{
"name": "CVE-2025-38264",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38264"
},
{
"name": "CVE-2025-40036",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40036"
},
{
"name": "CVE-2025-39676",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39676"
},
{
"name": "CVE-2025-40241",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40241"
},
{
"name": "CVE-2025-37980",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37980"
},
{
"name": "CVE-2025-38280",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38280"
},
{
"name": "CVE-2025-37788",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37788"
},
{
"name": "CVE-2025-38427",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38427"
},
{
"name": "CVE-2025-38084",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38084"
},
{
"name": "CVE-2025-40046",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40046"
},
{
"name": "CVE-2025-37879",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37879"
},
{
"name": "CVE-2025-38217",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38217"
},
{
"name": "CVE-2025-40030",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40030"
},
{
"name": "CVE-2025-40244",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40244"
},
{
"name": "CVE-2025-37881",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37881"
},
{
"name": "CVE-2025-39995",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39995"
},
{
"name": "CVE-2025-38103",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38103"
},
{
"name": "CVE-2025-38514",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38514"
},
{
"name": "CVE-2025-39783",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39783"
},
{
"name": "CVE-2025-39715",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39715"
},
{
"name": "CVE-2025-40323",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40323"
},
{
"name": "CVE-2025-38569",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38569"
},
{
"name": "CVE-2025-38255",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38255"
},
{
"name": "CVE-2025-38512",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38512"
},
{
"name": "CVE-2025-40096",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40096"
},
{
"name": "CVE-2025-38622",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38622"
},
{
"name": "CVE-2025-37909",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37909"
},
{
"name": "CVE-2025-38700",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38700"
},
{
"name": "CVE-2025-37849",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37849"
},
{
"name": "CVE-2025-38162",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38162"
},
{
"name": "CVE-2025-38532",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38532"
},
{
"name": "CVE-2025-39712",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39712"
},
{
"name": "CVE-2025-37812",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37812"
},
{
"name": "CVE-2025-39707",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39707"
},
{
"name": "CVE-2025-40275",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40275"
},
{
"name": "CVE-2025-37875",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37875"
},
{
"name": "CVE-2025-38410",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38410"
},
{
"name": "CVE-2025-39907",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39907"
},
{
"name": "CVE-2025-40182",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40182"
},
{
"name": "CVE-2025-68211",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68211"
},
{
"name": "CVE-2025-39781",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39781"
},
{
"name": "CVE-2025-38640",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38640"
},
{
"name": "CVE-2025-38476",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38476"
},
{
"name": "CVE-2025-38659",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38659"
},
{
"name": "CVE-2025-40339",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40339"
},
{
"name": "CVE-2025-40140",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40140"
},
{
"name": "CVE-2025-38020",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38020"
},
{
"name": "CVE-2025-40223",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40223"
},
{
"name": "CVE-2025-38572",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38572"
},
{
"name": "CVE-2025-23140",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-23140"
},
{
"name": "CVE-2025-23150",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-23150"
},
{
"name": "CVE-2025-38460",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38460"
},
{
"name": "CVE-2025-40061",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40061"
},
{
"name": "CVE-2025-38182",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38182"
},
{
"name": "CVE-2025-38550",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38550"
},
{
"name": "CVE-2024-53114",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53114"
},
{
"name": "CVE-2025-38275",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38275"
},
{
"name": "CVE-2025-40213",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40213"
},
{
"name": "CVE-2025-38345",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38345"
},
{
"name": "CVE-2025-40334",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40334"
},
{
"name": "CVE-2025-38170",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38170"
},
{
"name": "CVE-2025-39711",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39711"
},
{
"name": "CVE-2025-22115",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22115"
},
{
"name": "CVE-2025-22120",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22120"
},
{
"name": "CVE-2025-38535",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38535"
},
{
"name": "CVE-2025-38231",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38231"
},
{
"name": "CVE-2025-37854",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37854"
},
{
"name": "CVE-2025-40142",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40142"
},
{
"name": "CVE-2025-39873",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39873"
},
{
"name": "CVE-2025-40159",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40159"
},
{
"name": "CVE-2025-40319",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40319"
},
{
"name": "CVE-2025-68193",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68193"
},
{
"name": "CVE-2025-38473",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38473"
},
{
"name": "CVE-2025-38113",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38113"
},
{
"name": "CVE-2025-38714",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38714"
},
{
"name": "CVE-2025-23148",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-23148"
},
{
"name": "CVE-2025-38361",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38361"
},
{
"name": "CVE-2025-38470",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38470"
},
{
"name": "CVE-2025-38181",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38181"
},
{
"name": "CVE-2025-40051",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40051"
},
{
"name": "CVE-2025-38391",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38391"
},
{
"name": "CVE-2025-38248",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38248"
},
{
"name": "CVE-2025-40351",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40351"
},
{
"name": "CVE-2025-40087",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40087"
},
{
"name": "CVE-2025-40229",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40229"
},
{
"name": "CVE-2025-23147",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-23147"
},
{
"name": "CVE-2025-39752",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39752"
}
],
"initial_release_date": "2026-02-20T00:00:00",
"last_revision_date": "2026-02-20T00:00:00",
"links": [],
"reference": "CERTFR-2026-AVI-0194",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2026-02-20T00:00:00.000000"
}
],
"risks": [
{
"description": "Atteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es"
},
{
"description": "Non sp\u00e9cifi\u00e9 par l\u0027\u00e9diteur"
},
{
"description": "D\u00e9ni de service"
},
{
"description": "Contournement de la politique de s\u00e9curit\u00e9"
},
{
"description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans le noyau Linux d\u0027Ubuntu. Certaines d\u0027entre elles permettent \u00e0 un attaquant de provoquer une atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es, une atteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es et un contournement de la politique de s\u00e9curit\u00e9.",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans le noyau Linux d\u0027Ubuntu",
"vendor_advisories": [
{
"published_at": "2026-02-17",
"title": "Bulletin de s\u00e9curit\u00e9 Ubuntu USN-8048-1",
"url": "https://ubuntu.com/security/notices/USN-8048-1"
},
{
"published_at": "2026-02-17",
"title": "Bulletin de s\u00e9curit\u00e9 Ubuntu USN-8028-5",
"url": "https://ubuntu.com/security/notices/USN-8028-5"
},
{
"published_at": "2026-02-19",
"title": "Bulletin de s\u00e9curit\u00e9 Ubuntu USN-8052-1",
"url": "https://ubuntu.com/security/notices/USN-8052-1"
},
{
"published_at": "2026-02-19",
"title": "Bulletin de s\u00e9curit\u00e9 Ubuntu USN-8028-7",
"url": "https://ubuntu.com/security/notices/USN-8028-7"
},
{
"published_at": "2026-02-17",
"title": "Bulletin de s\u00e9curit\u00e9 Ubuntu USN-8033-5",
"url": "https://ubuntu.com/security/notices/USN-8033-5"
},
{
"published_at": "2026-02-17",
"title": "Bulletin de s\u00e9curit\u00e9 Ubuntu USN-8033-6",
"url": "https://ubuntu.com/security/notices/USN-8033-6"
},
{
"published_at": "2026-02-17",
"title": "Bulletin de s\u00e9curit\u00e9 Ubuntu USN-8028-3",
"url": "https://ubuntu.com/security/notices/USN-8028-3"
},
{
"published_at": "2026-02-20",
"title": "Bulletin de s\u00e9curit\u00e9 Ubuntu USN-7990-5",
"url": "https://ubuntu.com/security/notices/USN-7990-5"
},
{
"published_at": "2026-02-17",
"title": "Bulletin de s\u00e9curit\u00e9 Ubuntu USN-8029-2",
"url": "https://ubuntu.com/security/notices/USN-8029-2"
},
{
"published_at": "2026-02-17",
"title": "Bulletin de s\u00e9curit\u00e9 Ubuntu USN-8034-2",
"url": "https://ubuntu.com/security/notices/USN-8034-2"
},
{
"published_at": "2026-02-17",
"title": "Bulletin de s\u00e9curit\u00e9 Ubuntu USN-8028-4",
"url": "https://ubuntu.com/security/notices/USN-8028-4"
},
{
"published_at": "2026-02-19",
"title": "Bulletin de s\u00e9curit\u00e9 Ubuntu USN-8031-3",
"url": "https://ubuntu.com/security/notices/USN-8031-3"
},
{
"published_at": "2026-02-18",
"title": "Bulletin de s\u00e9curit\u00e9 Ubuntu USN-8031-2",
"url": "https://ubuntu.com/security/notices/USN-8031-2"
},
{
"published_at": "2026-02-19",
"title": "Bulletin de s\u00e9curit\u00e9 Ubuntu USN-8028-6",
"url": "https://ubuntu.com/security/notices/USN-8028-6"
},
{
"published_at": "2026-02-19",
"title": "Bulletin de s\u00e9curit\u00e9 Ubuntu USN-8033-7",
"url": "https://ubuntu.com/security/notices/USN-8033-7"
},
{
"published_at": "2026-02-19",
"title": "Bulletin de s\u00e9curit\u00e9 Ubuntu USN-8033-8",
"url": "https://ubuntu.com/security/notices/USN-8033-8"
}
]
}
GHSA-R7M4-WPP2-9F3X
Vulnerability from github – Published: 2025-11-13 00:30 – Updated: 2025-11-13 00:30In the Linux kernel, the following vulnerability has been resolved:
kernel/sys.c: fix the racy usage of task_lock(tsk->group_leader) in sys_prlimit64() paths
The usage of task_lock(tsk->group_leader) in sys_prlimit64()->do_prlimit() path is very broken.
sys_prlimit64() does get_task_struct(tsk) but this only protects task_struct itself. If tsk != current and tsk is not a leader, this process can exit/exec and task_lock(tsk->group_leader) may use the already freed task_struct.
Another problem is that sys_prlimit64() can race with mt-exec which changes ->group_leader. In this case do_prlimit() may take the wrong lock, or (worse) ->group_leader may change between task_lock() and task_unlock().
Change sys_prlimit64() to take tasklist_lock when necessary. This is not nice, but I don't see a better fix for -stable.
{
"affected": [],
"aliases": [
"CVE-2025-40201"
],
"database_specific": {
"cwe_ids": [],
"github_reviewed": false,
"github_reviewed_at": null,
"nvd_published_at": "2025-11-12T22:15:47Z",
"severity": null
},
"details": "In the Linux kernel, the following vulnerability has been resolved:\n\nkernel/sys.c: fix the racy usage of task_lock(tsk-\u003egroup_leader) in sys_prlimit64() paths\n\nThe usage of task_lock(tsk-\u003egroup_leader) in sys_prlimit64()-\u003edo_prlimit()\npath is very broken.\n\nsys_prlimit64() does get_task_struct(tsk) but this only protects task_struct\nitself. If tsk != current and tsk is not a leader, this process can exit/exec\nand task_lock(tsk-\u003egroup_leader) may use the already freed task_struct.\n\nAnother problem is that sys_prlimit64() can race with mt-exec which changes\n-\u003egroup_leader. In this case do_prlimit() may take the wrong lock, or (worse)\n-\u003egroup_leader may change between task_lock() and task_unlock().\n\nChange sys_prlimit64() to take tasklist_lock when necessary. This is not\nnice, but I don\u0027t see a better fix for -stable.",
"id": "GHSA-r7m4-wpp2-9f3x",
"modified": "2025-11-13T00:30:18Z",
"published": "2025-11-13T00:30:18Z",
"references": [
{
"type": "ADVISORY",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-40201"
},
{
"type": "WEB",
"url": "https://git.kernel.org/stable/c/132f827e7bac7373e1522e89709d70b43cae5342"
},
{
"type": "WEB",
"url": "https://git.kernel.org/stable/c/19b45c84bd9fd42fa97ff80c6350d604cb871c75"
},
{
"type": "WEB",
"url": "https://git.kernel.org/stable/c/1bc0d9315ef5296abb2c9fd840336255850ded18"
},
{
"type": "WEB",
"url": "https://git.kernel.org/stable/c/6796412decd2d8de8ec708213bbc958fab72f143"
},
{
"type": "WEB",
"url": "https://git.kernel.org/stable/c/a15f37a40145c986cdf289a4b88390f35efdecc4"
}
],
"schema_version": "1.4.0",
"severity": []
}
WID-SEC-W-2025-2595
Vulnerability from csaf_certbund - Published: 2025-11-12 23:00 - Updated: 2026-03-25 23:00| URL | Category | |||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
{
"document": {
"aggregate_severity": {
"text": "hoch"
},
"category": "csaf_base",
"csaf_version": "2.0",
"distribution": {
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "de-DE",
"notes": [
{
"category": "legal_disclaimer",
"text": "Das BSI ist als Anbieter f\u00fcr die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch daf\u00fcr verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgf\u00e4ltig im Einzelfall zu pr\u00fcfen."
},
{
"category": "description",
"text": "Der Kernel stellt den Kern des Linux Betriebssystems dar.",
"title": "Produktbeschreibung"
},
{
"category": "summary",
"text": "Ein Angreifer kann mehrere Schwachstellen im Linux-Kernel ausnutzen, um nicht n\u00e4her spezifizierte Angriffe durchzuf\u00fchren, die m\u00f6glicherweise zu einer Denial-of-Service- Bedingung f\u00fchren oder eine Speicherbesch\u00e4digung verursachen k\u00f6nnen.",
"title": "Angriff"
},
{
"category": "general",
"text": "- Linux",
"title": "Betroffene Betriebssysteme"
}
],
"publisher": {
"category": "other",
"contact_details": "csaf-provider@cert-bund.de",
"name": "Bundesamt f\u00fcr Sicherheit in der Informationstechnik",
"namespace": "https://www.bsi.bund.de"
},
"references": [
{
"category": "self",
"summary": "WID-SEC-W-2025-2595 - CSAF Version",
"url": "https://wid.cert-bund.de/.well-known/csaf/white/2025/wid-sec-w-2025-2595.json"
},
{
"category": "self",
"summary": "WID-SEC-2025-2595 - Portal Version",
"url": "https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2025-2595"
},
{
"category": "external",
"summary": "Kernel CVE Announce Mailingliste",
"url": "https://lore.kernel.org/linux-cve-announce/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-40178",
"url": "https://lore.kernel.org/linux-cve-announce/2025111240-CVE-2025-40178-8673@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-40179",
"url": "https://lore.kernel.org/linux-cve-announce/2025111243-CVE-2025-40179-6d22@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-40180",
"url": "https://lore.kernel.org/linux-cve-announce/2025111243-CVE-2025-40180-8258@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-40181",
"url": "https://lore.kernel.org/linux-cve-announce/2025111243-CVE-2025-40181-f51c@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-40182",
"url": "https://lore.kernel.org/linux-cve-announce/2025111243-CVE-2025-40182-fa1b@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-40183",
"url": "https://lore.kernel.org/linux-cve-announce/2025111243-CVE-2025-40183-fb2f@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-40184",
"url": "https://lore.kernel.org/linux-cve-announce/2025111243-CVE-2025-40184-9760@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-40185",
"url": "https://lore.kernel.org/linux-cve-announce/2025111244-CVE-2025-40185-0689@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-40186",
"url": "https://lore.kernel.org/linux-cve-announce/2025111244-CVE-2025-40186-b204@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-40187",
"url": "https://lore.kernel.org/linux-cve-announce/2025111244-CVE-2025-40187-7826@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-40188",
"url": "https://lore.kernel.org/linux-cve-announce/2025111244-CVE-2025-40188-86c5@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-40189",
"url": "https://lore.kernel.org/linux-cve-announce/2025111244-CVE-2025-40189-c4ca@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-40190",
"url": "https://lore.kernel.org/linux-cve-announce/2025111244-CVE-2025-40190-b6bc@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-40191",
"url": "https://lore.kernel.org/linux-cve-announce/2025111245-CVE-2025-40191-1ea5@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-40192",
"url": "https://lore.kernel.org/linux-cve-announce/2025111245-CVE-2025-40192-6344@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-40193",
"url": "https://lore.kernel.org/linux-cve-announce/2025111245-CVE-2025-40193-6519@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-40194",
"url": "https://lore.kernel.org/linux-cve-announce/2025111245-CVE-2025-40194-d959@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-40195",
"url": "https://lore.kernel.org/linux-cve-announce/2025111245-CVE-2025-40195-f91e@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-40196",
"url": "https://lore.kernel.org/linux-cve-announce/2025111245-CVE-2025-40196-f1fa@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-40197",
"url": "https://lore.kernel.org/linux-cve-announce/2025111246-CVE-2025-40197-e5de@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-40198",
"url": "https://lore.kernel.org/linux-cve-announce/2025111246-CVE-2025-40198-7a99@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-40199",
"url": "https://lore.kernel.org/linux-cve-announce/2025111246-CVE-2025-40199-054c@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-40200",
"url": "https://lore.kernel.org/linux-cve-announce/2025111246-CVE-2025-40200-c514@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-40201",
"url": "https://lore.kernel.org/linux-cve-announce/2025111246-CVE-2025-40201-b8fe@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-40202",
"url": "https://lore.kernel.org/linux-cve-announce/2025111246-CVE-2025-40202-f5ad@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-40203",
"url": "https://lore.kernel.org/linux-cve-announce/2025111247-CVE-2025-40203-c83b@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-40204",
"url": "https://lore.kernel.org/linux-cve-announce/2025111247-CVE-2025-40204-0f06@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-40205",
"url": "https://lore.kernel.org/linux-cve-announce/2025111247-CVE-2025-40205-ad43@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-40206",
"url": "https://lore.kernel.org/linux-cve-announce/2025111247-CVE-2025-40206-b396@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-40207",
"url": "https://lore.kernel.org/linux-cve-announce/2025111247-CVE-2025-40207-3528@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-40208",
"url": "https://lore.kernel.org/linux-cve-announce/2025111247-CVE-2025-40208-ded6@gregkh/"
},
{
"category": "external",
"summary": "Debian Security Advisory DLA-4379 vom 2025-11-25",
"url": "https://lists.debian.org/debian-lts-announce/2025/11/msg00022.html"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2025:22392 vom 2025-12-01",
"url": "https://access.redhat.com/errata/RHSA-2025:22392"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2025:22405 vom 2025-12-01",
"url": "https://access.redhat.com/errata/RHSA-2025:22405"
},
{
"category": "external",
"summary": "Oracle Linux Security Advisory ELSA-2025-22405 vom 2025-12-02",
"url": "https://linux.oracle.com/errata/ELSA-2025-22405.html"
},
{
"category": "external",
"summary": "Container-Optimized OS release notes vom 2025-12-03",
"url": "https://docs.cloud.google.com/container-optimized-os/docs/release-notes#December_02_2025"
},
{
"category": "external",
"summary": "Rocky Linux Security Advisory RLSA-2025:22405 vom 2025-12-04",
"url": "https://errata.build.resf.org/RLSA-2025:22405"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2025:22854 vom 2025-12-08",
"url": "https://access.redhat.com/errata/RHSA-2025:22854"
},
{
"category": "external",
"summary": "Oracle Linux Security Advisory ELSA-2025-22854 vom 2025-12-09",
"url": "https://linux.oracle.com/errata/ELSA-2025-22854.html"
},
{
"category": "external",
"summary": "Amazon Linux Security Advisory ALAS2KERNEL-5.15-2025-095 vom 2025-12-08",
"url": "https://alas.aws.amazon.com/AL2/ALAS2KERNEL-5.15-2025-095.html"
},
{
"category": "external",
"summary": "Oracle Linux Security Advisory ELSA-2025-28048 vom 2025-12-12",
"url": "https://linux.oracle.com/errata/ELSA-2025-28048.html"
},
{
"category": "external",
"summary": "Oracle Linux Security Advisory ELSA-2025-28049 vom 2025-12-15",
"url": "https://oss.oracle.com/pipermail/el-errata/2025-December/019260.html"
},
{
"category": "external",
"summary": "Rocky Linux Security Advisory RLSA-2025:22854 vom 2025-12-14",
"url": "https://errata.build.resf.org/RLSA-2025:22854"
},
{
"category": "external",
"summary": "Debian Security Advisory DLA-4404 vom 2025-12-12",
"url": "https://lists.debian.org/debian-lts-announce/2025/12/msg00015.html"
},
{
"category": "external",
"summary": "Oracle Linux Security Advisory ELSA-2025-28049 vom 2025-12-15",
"url": "https://linux.oracle.com/errata/ELSA-2025-28049.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:4393-1 vom 2025-12-15",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-December/023538.html"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2025:23424 vom 2025-12-17",
"url": "https://access.redhat.com/errata/RHSA-2025:23424"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2025:23450 vom 2025-12-17",
"url": "https://access.redhat.com/errata/RHSA-2025:23450"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2025:23422 vom 2025-12-17",
"url": "https://access.redhat.com/errata/RHSA-2025:23422"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2025:23426 vom 2025-12-17",
"url": "https://access.redhat.com/errata/RHSA-2025:23426"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2025:23423 vom 2025-12-17",
"url": "https://access.redhat.com/errata/RHSA-2025:23423"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2025:23427 vom 2025-12-17",
"url": "https://access.redhat.com/errata/RHSA-2025:23427"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2025:23425 vom 2025-12-17",
"url": "https://access.redhat.com/errata/RHSA-2025:23425"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:4422-1 vom 2025-12-17",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-December/023573.html"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2025:23463 vom 2025-12-17",
"url": "https://access.redhat.com/errata/RHSA-2025:23463"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:4506-1 vom 2025-12-23",
"url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/WTUJ36GACHYQN5EBFUNRPSW63S3SZXJ5/"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:4505-1 vom 2025-12-23",
"url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/3D5W2444LYTUJVXYGB63LTMU25GRLRJR/"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:4515-1 vom 2025-12-24",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-December/023647.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:4516-1 vom 2025-12-24",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-December/023646.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:4517-1 vom 2025-12-24",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-December/023649.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:4521-1 vom 2025-12-24",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-December/023651.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:4530-1 vom 2025-12-29",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-December/023658.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:4530-1 vom 2025-12-29",
"url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/3ZJXHV4TJM3LRAHWS7AE4LY344HKKW3D/"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2026:0029-1 vom 2026-01-05",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-January/023679.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2026:0033-1 vom 2026-01-06",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-January/023686.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2026:0034-1 vom 2026-01-06",
"url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/SD42TBT2POVOPEQIWTZDVKRXUBRUUL3W/"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2026:0032-1 vom 2026-01-06",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-January/023687.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2026:20021-1 vom 2026-01-09",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-January/023723.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2026:20015-1 vom 2026-01-09",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-January/023727.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2026:20012-1 vom 2026-01-09",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-January/023715.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2026:20059-1 vom 2026-01-15",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-January/023751.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2026:20039-1 vom 2026-01-15",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-January/023767.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2026:0144-1 vom 2026-01-19",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-January/023788.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2026:0146-1 vom 2026-01-19",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-January/023786.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2026:0145-1 vom 2026-01-19",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-January/023787.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2026:0148-1 vom 2026-01-19",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-January/023784.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2026:0154-1 vom 2026-01-19",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-January/023797.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2026:0166-1 vom 2026-01-19",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-January/023794.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2026:0163-1 vom 2026-01-19",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-January/023795.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2026:0155-1 vom 2026-01-19",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-January/023796.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2026:0176-1 vom 2026-01-20",
"url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/PSMTB6JYSBEU2CF3OD7SW3ZIJGKEKBZA/"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2026:0173-1 vom 2026-01-20",
"url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/C7EZZMG5MOJB6A2OZ4KLGVN4SVE4LWEL/"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2026:0168-1 vom 2026-01-20",
"url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/DUZFNORTIL7FT4JAMWNYAWMBHYUP24BR/"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2026:0174-1 vom 2026-01-20",
"url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/EYNRLMEYZG4OCUWVVR7BLL22PT3MTAV7/"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2026:0169-1 vom 2026-01-20",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-January/023802.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2026:0171-1 vom 2026-01-20",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-January/023801.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2026:0180-1 vom 2026-01-20",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-January/023805.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2026:0185-1 vom 2026-01-20",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-January/023821.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2026:0186-1 vom 2026-01-21",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-January/023825.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2026:0184-1 vom 2026-01-20",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-January/023822.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2026:0188-1 vom 2026-01-21",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-January/023823.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2026:0187-1 vom 2026-01-21",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-January/023824.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2026:0202-1 vom 2026-01-21",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-January/023839.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2026:0191-1 vom 2026-01-21",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-January/023827.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2026:0206-1 vom 2026-01-21",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-January/023836.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2026:0200-1 vom 2026-01-21",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-January/023840.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2026:0204-1 vom 2026-01-21",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-January/023837.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2026:0203-1 vom 2026-01-21",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-January/023838.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2026:0209-1 vom 2026-01-22",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-January/023841.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2026:0246-1 vom 2026-01-22",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-January/023844.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2026:0247-1 vom 2026-01-22",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-January/023843.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2026:0262-1 vom 2026-01-23",
"url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/AWNTVMXJYTURBPUXSIOYGW72SXW3YMXY/"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2026:0269-1 vom 2026-01-23",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-January/023901.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2026:0278-1 vom 2026-01-23",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-January/023906.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2026:0270-1 vom 2026-01-23",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-January/023900.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2026:0274-1 vom 2026-01-23",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-January/023907.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2026:0281-1 vom 2026-01-26",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-January/023914.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2026:0283-1 vom 2026-01-26",
"url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/RL3G7CGUCYSV3BWUFT3T7JKBIRLXKROU/"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2026:0293-1 vom 2026-01-26",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-January/023915.html"
},
{
"category": "external",
"summary": "Oracle Linux Security Advisory ELSA-2026-50071 vom 2026-01-26",
"url": "https://linux.oracle.com/errata/ELSA-2026-50071.html"
},
{
"category": "external",
"summary": "openSUSE Security Update OPENSUSE-SU-2026:20112-1 vom 2026-01-27",
"url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/VAR5E3K2CEDVGJPL4HSCKQYB2XQD7AYZ/"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2026:20149-1 vom 2026-01-28",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-January/023950.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2026:0316-1 vom 2026-01-28",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-January/023970.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2026:0315-1 vom 2026-01-29",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-January/023971.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2026:20169-1 vom 2026-01-28",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-January/023938.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2026:20168-1 vom 2026-01-28",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-January/023939.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2026:20164-1 vom 2026-01-28",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-January/023942.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2026:20171-1 vom 2026-02-02",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-February/024010.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2026:20202-1 vom 2026-02-03",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-February/024017.html"
},
{
"category": "external",
"summary": "openSUSE Security Update OPENSUSE-SU-2026:20120-1 vom 2026-02-03",
"url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/PEJKNNWOBXY6QH746YIQRZDAHVNYS7TJ/"
},
{
"category": "external",
"summary": "openSUSE Security Update OPENSUSE-SU-2026:20145-1 vom 2026-02-03",
"url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/FIKVKDA42VXBWDNHA6WP345IDVA2E3XU/"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2026:20207-1 vom 2026-02-04",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-February/024052.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2026:20228-1 vom 2026-02-05",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-February/024063.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2026:20220-1 vom 2026-02-05",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-February/024067.html"
},
{
"category": "external",
"summary": "Oracle Linux Security Advisory ELSA-2026-50100 vom 2026-02-10",
"url": "http://linux.oracle.com/errata/ELSA-2026-50100.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2026:0447-1 vom 2026-02-11",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-February/024124.html"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-8033-3 vom 2026-02-12",
"url": "https://ubuntu.com/security/notices/USN-8033-3"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-8030-1 vom 2026-02-12",
"url": "https://ubuntu.com/security/notices/USN-8030-1"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-8033-1 vom 2026-02-12",
"url": "https://ubuntu.com/security/notices/USN-8033-1"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-8033-2 vom 2026-02-12",
"url": "https://ubuntu.com/security/notices/USN-8033-2"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-8034-1 vom 2026-02-12",
"url": "https://ubuntu.com/security/notices/USN-8034-1"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2026:0471-1 vom 2026-02-12",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-February/024142.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2026:0472-1 vom 2026-02-12",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-February/024141.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2026:0473-1 vom 2026-02-12",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-February/024136.html"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-8033-4 vom 2026-02-13",
"url": "https://ubuntu.com/security/notices/USN-8033-4"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2026:20259-1 vom 2026-02-13",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-February/024216.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2026:0518-1 vom 2026-02-16",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-February/024257.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2026:0515-1 vom 2026-02-16",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-February/024264.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2026:20334-1 vom 2026-02-13",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-February/024161.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2026:0546-1 vom 2026-02-16",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-February/024245.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2026:20265-1 vom 2026-02-13",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-February/024218.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2026:20250-1 vom 2026-02-13",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-February/024232.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2026:20263-1 vom 2026-02-13",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-February/024220.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2026:20248-1 vom 2026-02-13",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-February/024230.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2026:20251-1 vom 2026-02-13",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-February/024231.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2026:20261-1 vom 2026-02-13",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-February/024224.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2026:0489-1 vom 2026-02-13",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-February/024153.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2026:0490-1 vom 2026-02-13",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-February/024152.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2026:0491-1 vom 2026-02-13",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-February/024151.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2026:20255-1 vom 2026-02-13",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-February/024228.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2026:20258-1 vom 2026-02-13",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-February/024219.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2026:20252-1 vom 2026-02-13",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-February/024225.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2026:20253-1 vom 2026-02-13",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-February/024223.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2026:20262-1 vom 2026-02-13",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-February/024222.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2026:20256-1 vom 2026-02-13",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-February/024221.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2026:20254-1 vom 2026-02-13",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-February/024229.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2026:0524-1 vom 2026-02-16",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-February/024255.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2026:0525-1 vom 2026-02-16",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-February/024254.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2026:20260-1 vom 2026-02-13",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-February/024215.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2026:0521-1 vom 2026-02-16",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-February/024256.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2026:0543-1 vom 2026-02-16",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-February/024247.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2026:20266-1 vom 2026-02-13",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-February/024217.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2026:20257-1 vom 2026-02-13",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-February/024226.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2026:20249-1 vom 2026-02-13",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-February/024227.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2026:0561-1 vom 2026-02-16",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-February/024276.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2026:0560-1 vom 2026-02-16",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-February/024277.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2026:0556-1 vom 2026-02-16",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-February/024269.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2026:0550-1 vom 2026-02-16",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-February/024266.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2026:0551-1 vom 2026-02-16",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-February/024265.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2026:0554-1 vom 2026-02-16",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-February/024271.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2026:0555-1 vom 2026-02-16",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-February/024270.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2026:0557-1 vom 2026-02-16",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-February/024268.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2026:0548-1 vom 2026-02-16",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-February/024267.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2026:20400-1 vom 2026-02-17",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-February/024292.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2026:20376-1 vom 2026-02-17",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-February/024316.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2026:20383-1 vom 2026-02-17",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-February/024309.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2026:20382-1 vom 2026-02-17",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-February/024310.html"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-8048-1 vom 2026-02-17",
"url": "https://ubuntu.com/security/notices/USN-8048-1"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2026:20381-1 vom 2026-02-17",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-February/024311.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2026:20397-1 vom 2026-02-17",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-February/024295.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2026:20396-1 vom 2026-02-17",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-February/024296.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2026:20384-1 vom 2026-02-17",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-February/024308.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2026:20385-1 vom 2026-02-17",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-February/024307.html"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-8033-5 vom 2026-02-17",
"url": "https://ubuntu.com/security/notices/USN-8033-5"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2026:20398-1 vom 2026-02-17",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-February/024294.html"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-8034-2 vom 2026-02-17",
"url": "https://ubuntu.com/security/notices/USN-8034-2"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2026:20399-1 vom 2026-02-17",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-February/024293.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2026:20380-1 vom 2026-02-17",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-February/024312.html"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-8029-1 vom 2026-02-17",
"url": "https://ubuntu.com/security/notices/USN-8029-1"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2026:20379-1 vom 2026-02-17",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-February/024313.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2026:20392-1 vom 2026-02-17",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-February/024300.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2026:20393-1 vom 2026-02-17",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-February/024299.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2026:20378-1 vom 2026-02-17",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-February/024314.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2026:20394-1 vom 2026-02-17",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-February/024298.html"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-8033-6 vom 2026-02-17",
"url": "https://ubuntu.com/security/notices/USN-8033-6"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2026:20377-1 vom 2026-02-17",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-February/024315.html"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-8029-2 vom 2026-02-17",
"url": "https://ubuntu.com/security/notices/USN-8029-2"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2026:20395-1 vom 2026-02-17",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-February/024297.html"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-8033-7 vom 2026-02-19",
"url": "https://ubuntu.com/security/notices/USN-8033-7"
},
{
"category": "external",
"summary": "Amazon Linux Security Advisory ALAS2KERNEL-5.10-2026-112 vom 2026-02-19",
"url": "https://alas.aws.amazon.com/AL2/ALAS2KERNEL-5.10-2026-112.html"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-8033-8 vom 2026-02-19",
"url": "https://ubuntu.com/security/notices/USN-8033-8"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2026:0587-1 vom 2026-02-20",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-February/024356.html"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-8029-3 vom 2026-02-24",
"url": "https://ubuntu.com/security/notices/USN-8029-3"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2026:20464-1 vom 2026-02-26",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-February/024420.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2026:20478-1 vom 2026-02-26",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-February/024408.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2026:20462-1 vom 2026-02-26",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-February/024422.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2026:20477-1 vom 2026-02-26",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-February/024409.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2026:20473-1 vom 2026-02-26",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-February/024411.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2026:20455-1 vom 2026-02-26",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-February/024429.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2026:20456-1 vom 2026-02-26",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-February/024428.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2026:20457-1 vom 2026-02-26",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-February/024427.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2026:20458-1 vom 2026-02-26",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-February/024426.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2026:20459-1 vom 2026-02-26",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-February/024425.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2026:20479-1 vom 2026-02-26",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-February/024407.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2026:20472-1 vom 2026-02-26",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-February/024412.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2026:20471-1 vom 2026-02-26",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-February/024413.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2026:20470-1 vom 2026-02-26",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-February/024414.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2026:20469-1 vom 2026-02-26",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-February/024415.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2026:20468-1 vom 2026-02-26",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-February/024416.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2026:20463-1 vom 2026-02-26",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-February/024421.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2026:20466-1 vom 2026-02-26",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-February/024418.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2026:20460-1 vom 2026-02-26",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-February/024424.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2026:20465-1 vom 2026-02-26",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-February/024419.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2026:20461-1 vom 2026-02-26",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-February/024423.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2026:20520-1 vom 2026-02-27",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-February/024455.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2026:20516-1 vom 2026-02-27",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-February/024459.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2026:20517-1 vom 2026-02-27",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-February/024458.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2026:20518-1 vom 2026-02-27",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-February/024457.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2026:20515-1 vom 2026-02-27",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-February/024460.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2026:20513-1 vom 2026-02-27",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-February/024462.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2026:20499-1 vom 2026-02-27",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-February/024475.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2026:20500-1 vom 2026-02-27",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-February/024474.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2026:20501-1 vom 2026-02-27",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-February/024473.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2026:20502-1 vom 2026-02-27",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-February/024472.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2026:20496-1 vom 2026-02-27",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-February/024477.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2026:20519-1 vom 2026-02-27",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-February/024456.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2026:20498-1 vom 2026-02-27",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-February/024476.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2026:20512-1 vom 2026-02-27",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-February/024463.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2026:20503-1 vom 2026-02-27",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-February/024471.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2026:20511-1 vom 2026-02-27",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-February/024464.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2026:20514-1 vom 2026-02-27",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-February/024461.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2026:20504-1 vom 2026-02-27",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-February/024470.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2026:20505-1 vom 2026-02-27",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-February/024469.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2026:20506-1 vom 2026-02-27",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-February/024468.html"
},
{
"category": "external",
"summary": "openSUSE Security Update OPENSUSE-SU-2026:20287-1 vom 2026-02-28",
"url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/K7KIWX7XP3UMVFSHT47OOZ24TQQYNNHI/"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2026:20507-1 vom 2026-02-27",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-February/024467.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2026:20508-1 vom 2026-02-27",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-February/024466.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2026:20541-1 vom 2026-03-05",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-March/024595.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2026:20570-1 vom 2026-03-05",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-March/024574.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2026:20558-1 vom 2026-03-05",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-March/024587.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2026:20606-1 vom 2026-03-05",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-March/024610.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2026:20615-1 vom 2026-03-05",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-March/024605.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2026:20599-1 vom 2026-03-05",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-March/024614.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2026:20555-1 vom 2026-03-05",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-March/024590.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2026:20564-1 vom 2026-03-05",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-March/024575.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2026:20562-1 vom 2026-03-05",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-March/024577.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2026:20635-1 vom 2026-03-06",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-March/024643.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2026:20644-1 vom 2026-03-09",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-March/024656.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2026:20645-1 vom 2026-03-09",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-March/024655.html"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-8100-1 vom 2026-03-17",
"url": "https://ubuntu.com/security/notices/USN-8100-1"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-8095-1 vom 2026-03-17",
"url": "https://ubuntu.com/security/notices/USN-8095-1"
},
{
"category": "external",
"summary": "Dell Security Advisory DSA-2026-114 vom 2026-03-17",
"url": "https://www.dell.com/support/kbdoc/000436206"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-8095-2 vom 2026-03-17",
"url": "https://ubuntu.com/security/notices/USN-8095-2"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-8095-3 vom 2026-03-17",
"url": "https://ubuntu.com/security/notices/USN-8095-3"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2026:0962-1 vom 2026-03-23",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-March/024803.html"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-8095-4 vom 2026-03-23",
"url": "https://ubuntu.com/security/notices/USN-8095-4"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2026:20794-1 vom 2026-03-25",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-March/024895.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2026:20772-1 vom 2026-03-24",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-March/024862.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2026:20819-1 vom 2026-03-24",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-March/024871.html"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-8126-1 vom 2026-03-25",
"url": "https://ubuntu.com/security/notices/USN-8126-1"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-8125-1 vom 2026-03-25",
"url": "https://ubuntu.com/security/notices/USN-8125-1"
}
],
"source_lang": "en-US",
"title": "Linux Kernel: Mehrere Schwachstellen",
"tracking": {
"current_release_date": "2026-03-25T23:00:00.000+00:00",
"generator": {
"date": "2026-03-26T08:06:52.390+00:00",
"engine": {
"name": "BSI-WID",
"version": "1.5.0"
}
},
"id": "WID-SEC-W-2025-2595",
"initial_release_date": "2025-11-12T23:00:00.000+00:00",
"revision_history": [
{
"date": "2025-11-12T23:00:00.000+00:00",
"number": "1",
"summary": "Initiale Fassung"
},
{
"date": "2025-11-25T23:00:00.000+00:00",
"number": "2",
"summary": "Neue Updates von Debian aufgenommen"
},
{
"date": "2025-11-30T23:00:00.000+00:00",
"number": "3",
"summary": "Neue Updates von Red Hat aufgenommen"
},
{
"date": "2025-12-02T23:00:00.000+00:00",
"number": "4",
"summary": "Neue Updates von Oracle Linux aufgenommen"
},
{
"date": "2025-12-03T23:00:00.000+00:00",
"number": "5",
"summary": "Neue Updates aufgenommen"
},
{
"date": "2025-12-08T23:00:00.000+00:00",
"number": "6",
"summary": "Neue Updates von Red Hat, Oracle Linux und Amazon aufgenommen"
},
{
"date": "2025-12-14T23:00:00.000+00:00",
"number": "7",
"summary": "Neue Updates von Oracle Linux, Rocky Enterprise Software Foundation und Debian aufgenommen"
},
{
"date": "2025-12-15T23:00:00.000+00:00",
"number": "8",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2025-12-16T23:00:00.000+00:00",
"number": "9",
"summary": "Neue Updates von Red Hat aufgenommen"
},
{
"date": "2025-12-17T23:00:00.000+00:00",
"number": "10",
"summary": "Neue Updates von Red Hat und SUSE aufgenommen"
},
{
"date": "2025-12-22T23:00:00.000+00:00",
"number": "11",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2025-12-23T23:00:00.000+00:00",
"number": "12",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2025-12-28T23:00:00.000+00:00",
"number": "13",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2025-12-29T23:00:00.000+00:00",
"number": "14",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2026-01-05T23:00:00.000+00:00",
"number": "15",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2026-01-11T23:00:00.000+00:00",
"number": "16",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2026-01-14T23:00:00.000+00:00",
"number": "17",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2026-01-18T23:00:00.000+00:00",
"number": "18",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2026-01-19T23:00:00.000+00:00",
"number": "19",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2026-01-20T23:00:00.000+00:00",
"number": "20",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2026-01-21T23:00:00.000+00:00",
"number": "21",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2026-01-22T23:00:00.000+00:00",
"number": "22",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2026-01-25T23:00:00.000+00:00",
"number": "23",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2026-01-26T23:00:00.000+00:00",
"number": "24",
"summary": "Neue Updates von SUSE und Oracle Linux aufgenommen"
},
{
"date": "2026-01-27T23:00:00.000+00:00",
"number": "25",
"summary": "Neue Updates von openSUSE aufgenommen"
},
{
"date": "2026-01-28T23:00:00.000+00:00",
"number": "26",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2026-02-02T23:00:00.000+00:00",
"number": "27",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2026-02-03T23:00:00.000+00:00",
"number": "28",
"summary": "Neue Updates von SUSE und openSUSE aufgenommen"
},
{
"date": "2026-02-04T23:00:00.000+00:00",
"number": "29",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2026-02-05T23:00:00.000+00:00",
"number": "30",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2026-02-09T23:00:00.000+00:00",
"number": "31",
"summary": "Neue Updates von Oracle Linux aufgenommen"
},
{
"date": "2026-02-11T23:00:00.000+00:00",
"number": "32",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2026-02-12T23:00:00.000+00:00",
"number": "33",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2026-02-15T23:00:00.000+00:00",
"number": "34",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2026-02-16T23:00:00.000+00:00",
"number": "35",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2026-02-17T23:00:00.000+00:00",
"number": "36",
"summary": "Neue Updates von SUSE und Ubuntu aufgenommen"
},
{
"date": "2026-02-18T23:00:00.000+00:00",
"number": "37",
"summary": "Neue Updates von Ubuntu und Amazon aufgenommen"
},
{
"date": "2026-02-19T23:00:00.000+00:00",
"number": "38",
"summary": "Neue Updates von Ubuntu aufgenommen"
},
{
"date": "2026-02-22T23:00:00.000+00:00",
"number": "39",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2026-02-23T23:00:00.000+00:00",
"number": "40",
"summary": "Neue Updates von Ubuntu aufgenommen"
},
{
"date": "2026-02-26T23:00:00.000+00:00",
"number": "41",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2026-03-01T23:00:00.000+00:00",
"number": "42",
"summary": "Neue Updates von SUSE und openSUSE aufgenommen"
},
{
"date": "2026-03-05T23:00:00.000+00:00",
"number": "43",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2026-03-08T23:00:00.000+00:00",
"number": "44",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2026-03-16T23:00:00.000+00:00",
"number": "45",
"summary": "Neue Updates von Ubuntu und Dell aufgenommen"
},
{
"date": "2026-03-17T23:00:00.000+00:00",
"number": "46",
"summary": "Neue Updates von Ubuntu aufgenommen"
},
{
"date": "2026-03-23T23:00:00.000+00:00",
"number": "47",
"summary": "Neue Updates von SUSE und Ubuntu aufgenommen"
},
{
"date": "2026-03-24T23:00:00.000+00:00",
"number": "48",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2026-03-25T23:00:00.000+00:00",
"number": "49",
"summary": "Neue Updates von Ubuntu aufgenommen"
}
],
"status": "final",
"version": "49"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Amazon Linux 2",
"product": {
"name": "Amazon Linux 2",
"product_id": "398363",
"product_identification_helper": {
"cpe": "cpe:/o:amazon:linux_2:-"
}
}
}
],
"category": "vendor",
"name": "Amazon"
},
{
"branches": [
{
"category": "product_name",
"name": "Debian Linux",
"product": {
"name": "Debian Linux",
"product_id": "2951",
"product_identification_helper": {
"cpe": "cpe:/o:debian:debian_linux:-"
}
}
}
],
"category": "vendor",
"name": "Debian"
},
{
"branches": [
{
"branches": [
{
"category": "product_version_range",
"name": "vProxy \u003c19.13.0.3",
"product": {
"name": "Dell NetWorker vProxy \u003c19.13.0.3",
"product_id": "T051763"
}
},
{
"category": "product_version",
"name": "vProxy 19.13.0.3",
"product": {
"name": "Dell NetWorker vProxy 19.13.0.3",
"product_id": "T051763-fixed",
"product_identification_helper": {
"cpe": "cpe:/a:dell:networker:vproxy__19.13.0.3"
}
}
}
],
"category": "product_name",
"name": "NetWorker"
}
],
"category": "vendor",
"name": "Dell"
},
{
"branches": [
{
"category": "product_name",
"name": "Google Container-Optimized OS",
"product": {
"name": "Google Container-Optimized OS",
"product_id": "1607324",
"product_identification_helper": {
"cpe": "cpe:/o:google:container-optimized_os:-"
}
}
}
],
"category": "vendor",
"name": "Google"
},
{
"branches": [
{
"category": "product_name",
"name": "Open Source Linux Kernel",
"product": {
"name": "Open Source Linux Kernel",
"product_id": "T028462",
"product_identification_helper": {
"cpe": "cpe:/o:linux:linux_kernel:unspecified"
}
}
}
],
"category": "vendor",
"name": "Open Source"
},
{
"branches": [
{
"category": "product_name",
"name": "Oracle Linux",
"product": {
"name": "Oracle Linux",
"product_id": "T004914",
"product_identification_helper": {
"cpe": "cpe:/o:oracle:linux:-"
}
}
}
],
"category": "vendor",
"name": "Oracle"
},
{
"branches": [
{
"category": "product_name",
"name": "RESF Rocky Linux",
"product": {
"name": "RESF Rocky Linux",
"product_id": "T032255",
"product_identification_helper": {
"cpe": "cpe:/o:resf:rocky_linux:-"
}
}
}
],
"category": "vendor",
"name": "RESF"
},
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux",
"product": {
"name": "Red Hat Enterprise Linux",
"product_id": "67646",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:-"
}
}
}
],
"category": "vendor",
"name": "Red Hat"
},
{
"branches": [
{
"category": "product_name",
"name": "SUSE Linux",
"product": {
"name": "SUSE Linux",
"product_id": "T002207",
"product_identification_helper": {
"cpe": "cpe:/o:suse:suse_linux:-"
}
}
},
{
"category": "product_name",
"name": "SUSE openSUSE",
"product": {
"name": "SUSE openSUSE",
"product_id": "T027843",
"product_identification_helper": {
"cpe": "cpe:/o:suse:opensuse:-"
}
}
}
],
"category": "vendor",
"name": "SUSE"
},
{
"branches": [
{
"category": "product_name",
"name": "Ubuntu Linux",
"product": {
"name": "Ubuntu Linux",
"product_id": "T000126",
"product_identification_helper": {
"cpe": "cpe:/o:canonical:ubuntu_linux:-"
}
}
}
],
"category": "vendor",
"name": "Ubuntu"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2025-40178",
"product_status": {
"known_affected": [
"T028462",
"2951",
"T002207",
"67646",
"T000126",
"T027843",
"398363",
"T051763",
"T004914",
"1607324",
"T032255"
]
},
"release_date": "2025-11-12T23:00:00.000+00:00",
"title": "CVE-2025-40178"
},
{
"cve": "CVE-2025-40179",
"product_status": {
"known_affected": [
"T028462",
"2951",
"T002207",
"67646",
"T000126",
"T027843",
"398363",
"T051763",
"T004914",
"1607324",
"T032255"
]
},
"release_date": "2025-11-12T23:00:00.000+00:00",
"title": "CVE-2025-40179"
},
{
"cve": "CVE-2025-40180",
"product_status": {
"known_affected": [
"T028462",
"2951",
"T002207",
"67646",
"T000126",
"T027843",
"398363",
"T051763",
"T004914",
"1607324",
"T032255"
]
},
"release_date": "2025-11-12T23:00:00.000+00:00",
"title": "CVE-2025-40180"
},
{
"cve": "CVE-2025-40181",
"product_status": {
"known_affected": [
"T028462",
"2951",
"T002207",
"67646",
"T000126",
"T027843",
"398363",
"T051763",
"T004914",
"1607324",
"T032255"
]
},
"release_date": "2025-11-12T23:00:00.000+00:00",
"title": "CVE-2025-40181"
},
{
"cve": "CVE-2025-40182",
"product_status": {
"known_affected": [
"T028462",
"2951",
"T002207",
"67646",
"T000126",
"T027843",
"398363",
"T051763",
"T004914",
"1607324",
"T032255"
]
},
"release_date": "2025-11-12T23:00:00.000+00:00",
"title": "CVE-2025-40182"
},
{
"cve": "CVE-2025-40183",
"product_status": {
"known_affected": [
"T028462",
"2951",
"T002207",
"67646",
"T000126",
"T027843",
"398363",
"T051763",
"T004914",
"1607324",
"T032255"
]
},
"release_date": "2025-11-12T23:00:00.000+00:00",
"title": "CVE-2025-40183"
},
{
"cve": "CVE-2025-40184",
"product_status": {
"known_affected": [
"T028462",
"2951",
"T002207",
"67646",
"T000126",
"T027843",
"398363",
"T051763",
"T004914",
"1607324",
"T032255"
]
},
"release_date": "2025-11-12T23:00:00.000+00:00",
"title": "CVE-2025-40184"
},
{
"cve": "CVE-2025-40185",
"product_status": {
"known_affected": [
"T028462",
"2951",
"T002207",
"67646",
"T000126",
"T027843",
"398363",
"T051763",
"T004914",
"1607324",
"T032255"
]
},
"release_date": "2025-11-12T23:00:00.000+00:00",
"title": "CVE-2025-40185"
},
{
"cve": "CVE-2025-40186",
"product_status": {
"known_affected": [
"T028462",
"2951",
"T002207",
"67646",
"T000126",
"T027843",
"398363",
"T051763",
"T004914",
"1607324",
"T032255"
]
},
"release_date": "2025-11-12T23:00:00.000+00:00",
"title": "CVE-2025-40186"
},
{
"cve": "CVE-2025-40187",
"product_status": {
"known_affected": [
"T028462",
"2951",
"T002207",
"67646",
"T000126",
"T027843",
"398363",
"T051763",
"T004914",
"1607324",
"T032255"
]
},
"release_date": "2025-11-12T23:00:00.000+00:00",
"title": "CVE-2025-40187"
},
{
"cve": "CVE-2025-40188",
"product_status": {
"known_affected": [
"T028462",
"2951",
"T002207",
"67646",
"T000126",
"T027843",
"398363",
"T051763",
"T004914",
"1607324",
"T032255"
]
},
"release_date": "2025-11-12T23:00:00.000+00:00",
"title": "CVE-2025-40188"
},
{
"cve": "CVE-2025-40189",
"product_status": {
"known_affected": [
"T028462",
"2951",
"T002207",
"67646",
"T000126",
"T027843",
"398363",
"T051763",
"T004914",
"1607324",
"T032255"
]
},
"release_date": "2025-11-12T23:00:00.000+00:00",
"title": "CVE-2025-40189"
},
{
"cve": "CVE-2025-40190",
"product_status": {
"known_affected": [
"T028462",
"2951",
"T002207",
"67646",
"T000126",
"T027843",
"398363",
"T051763",
"T004914",
"1607324",
"T032255"
]
},
"release_date": "2025-11-12T23:00:00.000+00:00",
"title": "CVE-2025-40190"
},
{
"cve": "CVE-2025-40191",
"product_status": {
"known_affected": [
"T028462",
"2951",
"T002207",
"67646",
"T000126",
"T027843",
"398363",
"T051763",
"T004914",
"1607324",
"T032255"
]
},
"release_date": "2025-11-12T23:00:00.000+00:00",
"title": "CVE-2025-40191"
},
{
"cve": "CVE-2025-40192",
"product_status": {
"known_affected": [
"T028462",
"2951",
"T002207",
"67646",
"T000126",
"T027843",
"398363",
"T051763",
"T004914",
"1607324",
"T032255"
]
},
"release_date": "2025-11-12T23:00:00.000+00:00",
"title": "CVE-2025-40192"
},
{
"cve": "CVE-2025-40193",
"product_status": {
"known_affected": [
"T028462",
"2951",
"T002207",
"67646",
"T000126",
"T027843",
"398363",
"T051763",
"T004914",
"1607324",
"T032255"
]
},
"release_date": "2025-11-12T23:00:00.000+00:00",
"title": "CVE-2025-40193"
},
{
"cve": "CVE-2025-40194",
"product_status": {
"known_affected": [
"T028462",
"2951",
"T002207",
"67646",
"T000126",
"T027843",
"398363",
"T051763",
"T004914",
"1607324",
"T032255"
]
},
"release_date": "2025-11-12T23:00:00.000+00:00",
"title": "CVE-2025-40194"
},
{
"cve": "CVE-2025-40195",
"product_status": {
"known_affected": [
"T028462",
"2951",
"T002207",
"67646",
"T000126",
"T027843",
"398363",
"T051763",
"T004914",
"1607324",
"T032255"
]
},
"release_date": "2025-11-12T23:00:00.000+00:00",
"title": "CVE-2025-40195"
},
{
"cve": "CVE-2025-40196",
"product_status": {
"known_affected": [
"T028462",
"2951",
"T002207",
"67646",
"T000126",
"T027843",
"398363",
"T051763",
"T004914",
"1607324",
"T032255"
]
},
"release_date": "2025-11-12T23:00:00.000+00:00",
"title": "CVE-2025-40196"
},
{
"cve": "CVE-2025-40197",
"product_status": {
"known_affected": [
"T028462",
"2951",
"T002207",
"67646",
"T000126",
"T027843",
"398363",
"T051763",
"T004914",
"1607324",
"T032255"
]
},
"release_date": "2025-11-12T23:00:00.000+00:00",
"title": "CVE-2025-40197"
},
{
"cve": "CVE-2025-40198",
"product_status": {
"known_affected": [
"T028462",
"2951",
"T002207",
"67646",
"T000126",
"T027843",
"398363",
"T051763",
"T004914",
"1607324",
"T032255"
]
},
"release_date": "2025-11-12T23:00:00.000+00:00",
"title": "CVE-2025-40198"
},
{
"cve": "CVE-2025-40199",
"product_status": {
"known_affected": [
"T028462",
"2951",
"T002207",
"67646",
"T000126",
"T027843",
"398363",
"T051763",
"T004914",
"1607324",
"T032255"
]
},
"release_date": "2025-11-12T23:00:00.000+00:00",
"title": "CVE-2025-40199"
},
{
"cve": "CVE-2025-40200",
"product_status": {
"known_affected": [
"T028462",
"2951",
"T002207",
"67646",
"T000126",
"T027843",
"398363",
"T051763",
"T004914",
"1607324",
"T032255"
]
},
"release_date": "2025-11-12T23:00:00.000+00:00",
"title": "CVE-2025-40200"
},
{
"cve": "CVE-2025-40201",
"product_status": {
"known_affected": [
"T028462",
"2951",
"T002207",
"67646",
"T000126",
"T027843",
"398363",
"T051763",
"T004914",
"1607324",
"T032255"
]
},
"release_date": "2025-11-12T23:00:00.000+00:00",
"title": "CVE-2025-40201"
},
{
"cve": "CVE-2025-40202",
"product_status": {
"known_affected": [
"T028462",
"2951",
"T002207",
"67646",
"T000126",
"T027843",
"398363",
"T051763",
"T004914",
"1607324",
"T032255"
]
},
"release_date": "2025-11-12T23:00:00.000+00:00",
"title": "CVE-2025-40202"
},
{
"cve": "CVE-2025-40203",
"product_status": {
"known_affected": [
"T028462",
"2951",
"T002207",
"67646",
"T000126",
"T027843",
"398363",
"T051763",
"T004914",
"1607324",
"T032255"
]
},
"release_date": "2025-11-12T23:00:00.000+00:00",
"title": "CVE-2025-40203"
},
{
"cve": "CVE-2025-40204",
"product_status": {
"known_affected": [
"T028462",
"2951",
"T002207",
"67646",
"T000126",
"T027843",
"398363",
"T051763",
"T004914",
"1607324",
"T032255"
]
},
"release_date": "2025-11-12T23:00:00.000+00:00",
"title": "CVE-2025-40204"
},
{
"cve": "CVE-2025-40205",
"product_status": {
"known_affected": [
"T028462",
"2951",
"T002207",
"67646",
"T000126",
"T027843",
"398363",
"T051763",
"T004914",
"1607324",
"T032255"
]
},
"release_date": "2025-11-12T23:00:00.000+00:00",
"title": "CVE-2025-40205"
},
{
"cve": "CVE-2025-40206",
"product_status": {
"known_affected": [
"T028462",
"2951",
"T002207",
"67646",
"T000126",
"T027843",
"398363",
"T051763",
"T004914",
"1607324",
"T032255"
]
},
"release_date": "2025-11-12T23:00:00.000+00:00",
"title": "CVE-2025-40206"
},
{
"cve": "CVE-2025-40207",
"product_status": {
"known_affected": [
"T028462",
"2951",
"T002207",
"67646",
"T000126",
"T027843",
"398363",
"T051763",
"T004914",
"1607324",
"T032255"
]
},
"release_date": "2025-11-12T23:00:00.000+00:00",
"title": "CVE-2025-40207"
},
{
"cve": "CVE-2025-40208",
"product_status": {
"known_affected": [
"T028462",
"2951",
"T002207",
"67646",
"T000126",
"T027843",
"398363",
"T051763",
"T004914",
"1607324",
"T032255"
]
},
"release_date": "2025-11-12T23:00:00.000+00:00",
"title": "CVE-2025-40208"
}
]
}
SUSE-SU-2026:20015-1
Vulnerability from csaf_suse - Published: 2025-12-19 16:46 - Updated: 2025-12-19 16:46| URL | Category | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
{
"document": {
"aggregate_severity": {
"namespace": "https://www.suse.com/support/security/rating/",
"text": "important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright 2024 SUSE LLC. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Security update for the Linux Kernel",
"title": "Title of the patch"
},
{
"category": "description",
"text": "\nThe SUSE Linux Enterprise 16.0 kernel was updated to fix various security issues\n\nThe following security issues were fixed:\n\n- CVE-2022-50253: bpf: make sure skb-\u003elen != 0 when redirecting to a tunneling device (bsc#1249912).\n- CVE-2025-37916: pds_core: remove write-after-free of client_id (bsc#1243474).\n- CVE-2025-38084: mm/hugetlb: unshare page tables during VMA split, not before (bsc#1245431 bsc#1245498).\n- CVE-2025-38085: mm/hugetlb: fix huge_pmd_unshare() vs GUP-fast race (bsc#1245431 bsc#1245499).\n- CVE-2025-38321: smb: Log an error when close_all_cached_dirs fails (bsc#1246328).\n- CVE-2025-38728: smb3: fix for slab out of bounds on mount to ksmbd (bsc#1249256).\n- CVE-2025-39805: net: macb: fix unregister_netdev call order in macb_remove() (bsc#1249982).\n- CVE-2025-39819: fs/smb: Fix inconsistent refcnt update (bsc#1250176).\n- CVE-2025-39822: io_uring/kbuf: fix signedness in this_len calculation (bsc#1250034).\n- CVE-2025-39831: fbnic: Move phylink resume out of service_task and into open/close (bsc#1249977).\n- CVE-2025-39859: ptp: ocp: fix use-after-free bugs causing by ptp_ocp_watchdog (bsc#1250252).\n- CVE-2025-39897: net: xilinx: axienet: Add error handling for RX metadata pointer retrieval (bsc#1250746).\n- CVE-2025-39917: bpf: Fix out-of-bounds dynptr write in bpf_crypto_crypt (bsc#1250723).\n- CVE-2025-39944: octeontx2-pf: Fix use-after-free bugs in otx2_sync_tstamp() (bsc#1251120).\n- CVE-2025-39961: iommu/amd/pgtbl: Fix possible race while increase page table level (bsc#1251817).\n- CVE-2025-39980: nexthop: Forbid FDB status change while nexthop is in a group (bsc#1252063).\n- CVE-2025-39990: bpf: Check the helper function is valid in get_helper_proto (bsc#1252054).\n- CVE-2025-40001: scsi: mvsas: Fix use-after-free bugs in mvs_work_queue (bsc#1252303).\n- CVE-2025-40003: net: mscc: ocelot: Fix use-after-free caused by cyclic delayed work (bsc#1252301).\n- CVE-2025-40006: mm/hugetlb: fix folio is still mapped when deleted (bsc#1252342).\n- CVE-2025-40021: tracing: dynevent: Add a missing lockdown check on dynevent (bsc#1252681).\n- CVE-2025-40024: vhost: Take a reference on the task in struct vhost_task (bsc#1252686).\n- CVE-2025-40027: net/9p: fix double req put in p9_fd_cancelled (bsc#1252763).\n- CVE-2025-40031: tee: fix register_shm_helper() (bsc#1252779).\n- CVE-2025-40033: remoteproc: pru: Fix potential NULL pointer dereference in pru_rproc_set_ctable() (bsc#1252824).\n- CVE-2025-40038: KVM: SVM: Skip fastpath emulation on VM-Exit if next RIP isn\u0027t valid (bsc#1252817).\n- CVE-2025-40047: io_uring/waitid: always prune wait queue entry in io_waitid_wait() (bsc#1252790).\n- CVE-2025-40053: net: dlink: handle copy_thresh allocation failure (bsc#1252808).\n- CVE-2025-40055: ocfs2: fix double free in user_cluster_connect() (bsc#1252821).\n- CVE-2025-40059: coresight: Fix incorrect handling for return value of devm_kzalloc (bsc#1252809).\n- CVE-2025-40064: smc: Fix use-after-free in __pnet_find_base_ndev() (bsc#1252845).\n- CVE-2025-40070: pps: fix warning in pps_register_cdev when register device fail (bsc#1252836).\n- CVE-2025-40074: tcp: convert to dev_net_rcu() (bsc#1252794).\n- CVE-2025-40075: tcp_metrics: use dst_dev_net_rcu() (bsc#1252795).\n- CVE-2025-40081: perf: arm_spe: Prevent overflow in PERF_IDX2OFF() (bsc#1252776).\n- CVE-2025-40083: net/sched: sch_qfq: Fix null-deref in agg_dequeue (bsc#1252912).\n- CVE-2025-40086: drm/xe: Don\u0027t allow evicting of BOs in same VM in array of VM binds (bsc#1252923).\n- CVE-2025-40098: ALSA: hda: cs35l41: Fix NULL pointer dereference in cs35l41_get_acpi_mute_state() (bsc#1252917).\n- CVE-2025-40101: btrfs: fix memory leaks when rejecting a non SINGLE data profile without an RST (bsc#1252901).\n- CVE-2025-40102: KVM: arm64: Prevent access to vCPU events before init (bsc#1252919).\n- CVE-2025-40105: vfs: Don\u0027t leak disconnected dentries on umount (bsc#1252928).\n- CVE-2025-40133: mptcp: Call dst_release() in mptcp_active_enable() (bsc#1253328).\n- CVE-2025-40134: dm: fix NULL pointer dereference in __dm_suspend() (bsc#1253386).\n- CVE-2025-40135: ipv6: use RCU in ip6_xmit() (bsc#1253342).\n- CVE-2025-40139: smc: Use __sk_dst_get() and dst_dev_rcu() in in smc_clc_prfx_set() (bsc#1253409).\n- CVE-2025-40149: tls: Use __sk_dst_get() and dst_dev_rcu() in get_netdev_for_sock() (bsc#1253355).\n- CVE-2025-40153: mm: hugetlb: avoid soft lockup when mprotect to large memory area (bsc#1253408).\n- CVE-2025-40157: EDAC/i10nm: Skip DIMM enumeration on a disabled memory controller (bsc#1253423).\n- CVE-2025-40158: ipv6: use RCU in ip6_output() (bsc#1253402).\n- CVE-2025-40159: xsk: Harden userspace-supplied xdp_desc validation (bsc#1253403).\n- CVE-2025-40168: smc: Use __sk_dst_get() and dst_dev_rcu() in smc_clc_prfx_match() (bsc#1253427).\n- CVE-2025-40169: bpf: Reject negative offsets for ALU ops (bsc#1253416).\n- CVE-2025-40173: net/ip6_tunnel: Prevent perpetual tunnel growth (bsc#1253421).\n- CVE-2025-40175: idpf: cleanup remaining SKBs in PTP flows (bsc#1253426).\n- CVE-2025-40176: tls: wait for pending async decryptions if tls_strp_msg_hold fails (bsc#1253425).\n- CVE-2025-40178: pid: Add a judgment for ns null in pid_nr_ns (bsc#1253463).\n- CVE-2025-40185: ice: ice_adapter: release xa entry on adapter allocation failure (bsc#1253394).\n- CVE-2025-40201: kernel/sys.c: fix the racy usage of task_lock(tsk-\u003egroup_leader) in sys_prlimit64() paths (bsc#1253455).\n- CVE-2025-40203: listmount: don\u0027t call path_put() under namespace semaphore (bsc#1253457).\n\nThe following non security issues were fixed:\n\n- ACPI: scan: Update honor list for RPMI System MSI (stable-fixes).\n- ACPICA: Update dsmethod.c to get rid of unused variable warning (stable-fixes).\n- Disable CONFIG_CPU5_WDT The cpu5wdt driver doesn\u0027t implement a\n proper watchdog interface and has many code issues. It only handles\n obscure and obsolete hardware. Stop building and supporting this driver\n (jsc#PED-14062).\n- Fix \"drm/xe: Don\u0027t allow evicting of BOs in same VM in array of VM binds\" (bsc#1252923)\n- KVM: SVM: Delete IRTE link from previous vCPU before setting new IRTE (git-fixes).\n- KVM: SVM: Delete IRTE link from previous vCPU irrespective of new routing (git-fixes).\n- KVM: SVM: Mark VMCB_LBR dirty when MSR_IA32_DEBUGCTLMSR is updated (git-fixes).\n- KVM: s390: improve interrupt cpu for wakeup (bsc#1235463).\n- KVM: s390: kABI backport for \u0027last_sleep_cpu\u0027 (bsc#1252352).\n- KVM: x86/mmu: Return -EAGAIN if userspace deletes/moves memslot during prefault (git-fixes).\n- PCI/ERR: Update device error_state already after reset (stable-fixes).\n- PM: EM: Slightly reduce em_check_capacity_update() overhead (stable-fixes).\n- Revert \"net/mlx5e: Update and set Xon/Xoff upon MTU set\" (git-fixes).\n- Revert \"net/mlx5e: Update and set Xon/Xoff upon port speed set\" (git-fixes).\n- Update config files: enable zstd module decompression (jsc#PED-14115).\n- bpf/selftests: Fix test_tcpnotify_user (bsc#1253635).\n- btrfs: do not clear read-only when adding sprout device (bsc#1253238).\n- btrfs: do not update last_log_commit when logging inode due to a new name (git-fixes).\n- dm: fix queue start/stop imbalance under suspend/load/resume races (bsc#1253386)\n- drm/amd/display: Add AVI infoframe copy in copy_stream_update_to_stream (stable-fixes).\n- drm/amd/display: update color on atomic commit time (stable-fixes).\n- drm/amd/display: update dpp/disp clock from smu clock table (stable-fixes).\n- drm/radeon: delete radeon_fence_process in is_signaled, no deadlock (stable-fixes).\n- hwmon: (lenovo-ec-sensors) Update P8 supprt (stable-fixes).\n- media: amphion: Delete v4l2_fh synchronously in .release() (stable-fixes).\n- mount: handle NULL values in mnt_ns_release() (bsc#1254308)\n- net/smc: Remove validation of reserved bits in CLC Decline (bsc#1252357).\n- net: phy: move realtek PHY driver to its own subdirectory (jsc#PED-14353).\n- net: phy: realtek: add defines for shadowed c45 standard registers (jsc#PED-14353).\n- net: phy: realtek: add helper RTL822X_VND2_C22_REG (jsc#PED-14353).\n- net: phy: realtek: change order of calls in C22 read_status() (jsc#PED-14353).\n- net: phy: realtek: clear 1000Base-T link partner advertisement (jsc#PED-14353).\n- net: phy: realtek: improve mmd register access for internal PHY\u0027s (jsc#PED-14353).\n- net: phy: realtek: read duplex and gbit master from PHYSR register (jsc#PED-14353).\n- net: phy: realtek: switch from paged to MMD ops in rtl822x functions (jsc#PED-14353).\n- net: phy: realtek: use string choices helpers (jsc#PED-14353).\n- net: xilinx: axienet: Fix IRQ coalescing packet count overflow (bsc#1250746)\n- net: xilinx: axienet: Fix RX skb ring management in DMAengine mode (bsc#1250746)\n- net: xilinx: axienet: Fix Tx skb circular buffer occupancy check in dmaengine xmit (bsc#1250746)\n- nvmet-auth: update sc_c in host response (git-fixes bsc#1249397).\n- nvmet-auth: update sc_c in target host hash calculation (git-fixes).\n- perf list: Add IBM z17 event descriptions (jsc#PED-13611).\n- platform/x86:intel/pmc: Update Arrow Lake telemetry GUID (git-fixes).\n- powercap: intel_rapl: Add support for Panther Lake platform (jsc#PED-13949).\n- pwm: pca9685: Use bulk write to atomicially update registers (stable-fixes).\n- r8169: add PHY c45 ops for MDIO_MMD_VENDOR2 registers (jsc#PED-14353).\n- r8169: add support for Intel Killer E5000 (jsc#PED-14353).\n- r8169: add support for RTL8125BP rev.b (jsc#PED-14353).\n- r8169: add support for RTL8125D rev.b (jsc#PED-14353).\n- r8169: adjust version numbering for RTL8126 (jsc#PED-14353).\n- r8169: align RTL8125 EEE config with vendor driver (jsc#PED-14353).\n- r8169: align RTL8125/RTL8126 PHY config with vendor driver (jsc#PED-14353).\n- r8169: align RTL8126 EEE config with vendor driver (jsc#PED-14353).\n- r8169: align WAKE_PHY handling with r8125/r8126 vendor drivers (jsc#PED-14353).\n- r8169: avoid duplicated messages if loading firmware fails and switch to warn level (jsc#PED-14353).\n- r8169: don\u0027t take RTNL lock in rtl_task() (jsc#PED-14353).\n- r8169: enable EEE at 2.5G per default on RTL8125B (jsc#PED-14353).\n- r8169: enable RTL8168H/RTL8168EP/RTL8168FP ASPM support (jsc#PED-14353).\n- r8169: fix inconsistent indenting in rtl8169_get_eth_mac_stats (jsc#PED-14353).\n- r8169: implement additional ethtool stats ops (jsc#PED-14353).\n- r8169: improve __rtl8169_set_wol (jsc#PED-14353).\n- r8169: improve initialization of RSS registers on RTL8125/RTL8126 (jsc#PED-14353).\n- r8169: improve rtl_set_d3_pll_down (jsc#PED-14353).\n- r8169: increase max jumbo packet size on RTL8125/RTL8126 (jsc#PED-14353).\n- r8169: remove leftover locks after reverted change (jsc#PED-14353).\n- r8169: remove original workaround for RTL8125 broken rx issue (jsc#PED-14353).\n- r8169: remove rtl_dash_loop_wait_high/low (jsc#PED-14353).\n- r8169: remove support for chip version 11 (jsc#PED-14353).\n- r8169: remove unused flag RTL_FLAG_TASK_RESET_NO_QUEUE_WAKE (jsc#PED-14353).\n- r8169: replace custom flag with disable_work() et al (jsc#PED-14353).\n- r8169: switch away from deprecated pcim_iomap_table (jsc#PED-14353).\n- r8169: use helper r8169_mod_reg8_cond to simplify rtl_jumbo_config (jsc#PED-14353).\n- ring-buffer: Update pages_touched to reflect persistent buffer content (git-fixes).\n- s390/mm: Fix __ptep_rdp() inline assembly (bsc#1253643).\n- sched/fair: Get rid of sched_domains_curr_level hack for tl-\u003ecpumask() (bsc#1246843).\n- sched/fair: Have SD_SERIALIZE affect newidle balancing (bsc#1248792).\n- sched/fair: Proportional newidle balance (bsc#1248792).\n- sched/fair: Proportional newidle balance -KABI (bsc#1248792).\n- sched/fair: Revert max_newidle_lb_cost bump (bsc#1248792).\n- sched/fair: Skip sched_balance_running cmpxchg when balance is not due (bsc#1248792).\n- sched/fair: Small cleanup to sched_balance_newidle() (bsc#1248792).\n- sched/fair: Small cleanup to update_newidle_cost() (bsc#1248792).\n- scsi: lpfc: Add capability to register Platform Name ID to fabric (bsc#1254119).\n- scsi: lpfc: Allow support for BB credit recovery in point-to-point topology (bsc#1254119).\n- scsi: lpfc: Ensure unregistration of rpis for received PLOGIs (bsc#1254119).\n- scsi: lpfc: Fix leaked ndlp krefs when in point-to-point topology (bsc#1254119).\n- scsi: lpfc: Fix reusing an ndlp that is marked NLP_DROPPED during FLOGI (bsc#1254119).\n- scsi: lpfc: Modify kref handling for Fabric Controller ndlps (bsc#1254119).\n- scsi: lpfc: Remove redundant NULL ptr assignment in lpfc_els_free_iocb() (bsc#1254119).\n- scsi: lpfc: Revise discovery related function headers and comments (bsc#1254119).\n- scsi: lpfc: Update lpfc version to 14.4.0.12 (bsc#1254119).\n- scsi: lpfc: Update various NPIV diagnostic log messaging (bsc#1254119).\n- selftests/run_kselftest.sh: Add `--skip` argument option (bsc#1254221).\n- smpboot: introduce SDTL_INIT() helper to tidy sched topology setup (bsc#1246843).\n- soc/tegra: fuse: speedo-tegra210: Update speedo IDs (git-fixes).\n- spi: tegra210-quad: Check hardware status on timeout (bsc#1253155)\n- spi: tegra210-quad: Fix timeout handling (bsc#1253155)\n- spi: tegra210-quad: Refactor error handling into helper functions (bsc#1253155)\n- spi: tegra210-quad: Update dummy sequence configuration (git-fixes)\n- tcp_bpf: Call sk_msg_free() when tcp_bpf_send_verdict() fails to allocate psock-\u003ecork (bsc#1250705).\n- wifi: ath11k: Add quirk entries for Thinkpad T14s Gen3 AMD (bsc#1254181).\n- wifi: mt76: do not add wcid entries to sta poll list during MCU reset (bsc#1254315).\n- wifi: mt76: introduce mt792x_config_mac_addr_list routine (bsc#1254315).\n- wifi: mt76: mt7925: Fix logical vs bitwise typo (bsc#1254315).\n- wifi: mt76: mt7925: Remove unnecessary if-check (bsc#1254315).\n- wifi: mt76: mt7925: Simplify HIF suspend handling to avoid suspend fail (bsc#1254315).\n- wifi: mt76: mt7925: add EHT control support based on the CLC data (bsc#1254315).\n- wifi: mt76: mt7925: add handler to hif suspend/resume event (bsc#1254315).\n- wifi: mt76: mt7925: add pci restore for hibernate (bsc#1254315).\n- wifi: mt76: mt7925: config the dwell time by firmware (bsc#1254315).\n- wifi: mt76: mt7925: extend MCU support for testmode (bsc#1254315).\n- wifi: mt76: mt7925: fix CLC command timeout when suspend/resume (bsc#1254315).\n- wifi: mt76: mt7925: fix missing hdr_trans_tlv command for broadcast wtbl (bsc#1254315).\n- wifi: mt76: mt7925: fix the unfinished command of regd_notifier before suspend (bsc#1254315).\n- wifi: mt76: mt7925: refine the txpower initialization flow (bsc#1254315).\n- wifi: mt76: mt7925: replace zero-length array with flexible-array member (bsc#1254315).\n- wifi: mt76: mt7925: update the channel usage when the regd domain changed (bsc#1254315).\n- wifi: mt76: mt7925e: fix too long of wifi resume time (bsc#1254315).\n- x86/smpboot: avoid SMT domain attach/destroy if SMT is not enabled (bsc#1246843).\n- x86/smpboot: moves x86_topology to static initialize and truncate (bsc#1246843).\n- x86/smpboot: remove redundant CONFIG_SCHED_SMT (bsc#1246843).\n",
"title": "Description of the patch"
},
{
"category": "details",
"text": "SUSE-SLES-16.0-113",
"title": "Patchnames"
},
{
"category": "legal_disclaimer",
"text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
"title": "Terms of use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://www.suse.com/support/security/contact/",
"name": "SUSE Product Security Team",
"namespace": "https://www.suse.com/"
},
"references": [
{
"category": "external",
"summary": "SUSE ratings",
"url": "https://www.suse.com/support/security/rating/"
},
{
"category": "self",
"summary": "URL of this CSAF notice",
"url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2026_20015-1.json"
},
{
"category": "self",
"summary": "URL for SUSE-SU-2026:20015-1",
"url": "https://www.suse.com/support/update/announcement/2026/suse-su-202620015-1/"
},
{
"category": "self",
"summary": "E-Mail link for SUSE-SU-2026:20015-1",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-January/023727.html"
},
{
"category": "self",
"summary": "SUSE Bug 1235463",
"url": "https://bugzilla.suse.com/1235463"
},
{
"category": "self",
"summary": "SUSE Bug 1243474",
"url": "https://bugzilla.suse.com/1243474"
},
{
"category": "self",
"summary": "SUSE Bug 1245193",
"url": "https://bugzilla.suse.com/1245193"
},
{
"category": "self",
"summary": "SUSE Bug 1245431",
"url": "https://bugzilla.suse.com/1245431"
},
{
"category": "self",
"summary": "SUSE Bug 1245498",
"url": "https://bugzilla.suse.com/1245498"
},
{
"category": "self",
"summary": "SUSE Bug 1245499",
"url": "https://bugzilla.suse.com/1245499"
},
{
"category": "self",
"summary": "SUSE Bug 1246328",
"url": "https://bugzilla.suse.com/1246328"
},
{
"category": "self",
"summary": "SUSE Bug 1246843",
"url": "https://bugzilla.suse.com/1246843"
},
{
"category": "self",
"summary": "SUSE Bug 1247500",
"url": "https://bugzilla.suse.com/1247500"
},
{
"category": "self",
"summary": "SUSE Bug 1248792",
"url": "https://bugzilla.suse.com/1248792"
},
{
"category": "self",
"summary": "SUSE Bug 1249256",
"url": "https://bugzilla.suse.com/1249256"
},
{
"category": "self",
"summary": "SUSE Bug 1249397",
"url": "https://bugzilla.suse.com/1249397"
},
{
"category": "self",
"summary": "SUSE Bug 1249912",
"url": "https://bugzilla.suse.com/1249912"
},
{
"category": "self",
"summary": "SUSE Bug 1249977",
"url": "https://bugzilla.suse.com/1249977"
},
{
"category": "self",
"summary": "SUSE Bug 1249982",
"url": "https://bugzilla.suse.com/1249982"
},
{
"category": "self",
"summary": "SUSE Bug 1250034",
"url": "https://bugzilla.suse.com/1250034"
},
{
"category": "self",
"summary": "SUSE Bug 1250176",
"url": "https://bugzilla.suse.com/1250176"
},
{
"category": "self",
"summary": "SUSE Bug 1250237",
"url": "https://bugzilla.suse.com/1250237"
},
{
"category": "self",
"summary": "SUSE Bug 1250252",
"url": "https://bugzilla.suse.com/1250252"
},
{
"category": "self",
"summary": "SUSE Bug 1250705",
"url": "https://bugzilla.suse.com/1250705"
},
{
"category": "self",
"summary": "SUSE Bug 1250723",
"url": "https://bugzilla.suse.com/1250723"
},
{
"category": "self",
"summary": "SUSE Bug 1250746",
"url": "https://bugzilla.suse.com/1250746"
},
{
"category": "self",
"summary": "SUSE Bug 1251120",
"url": "https://bugzilla.suse.com/1251120"
},
{
"category": "self",
"summary": "SUSE Bug 1251817",
"url": "https://bugzilla.suse.com/1251817"
},
{
"category": "self",
"summary": "SUSE Bug 1252054",
"url": "https://bugzilla.suse.com/1252054"
},
{
"category": "self",
"summary": "SUSE Bug 1252063",
"url": "https://bugzilla.suse.com/1252063"
},
{
"category": "self",
"summary": "SUSE Bug 1252301",
"url": "https://bugzilla.suse.com/1252301"
},
{
"category": "self",
"summary": "SUSE Bug 1252303",
"url": "https://bugzilla.suse.com/1252303"
},
{
"category": "self",
"summary": "SUSE Bug 1252342",
"url": "https://bugzilla.suse.com/1252342"
},
{
"category": "self",
"summary": "SUSE Bug 1252352",
"url": "https://bugzilla.suse.com/1252352"
},
{
"category": "self",
"summary": "SUSE Bug 1252357",
"url": "https://bugzilla.suse.com/1252357"
},
{
"category": "self",
"summary": "SUSE Bug 1252681",
"url": "https://bugzilla.suse.com/1252681"
},
{
"category": "self",
"summary": "SUSE Bug 1252686",
"url": "https://bugzilla.suse.com/1252686"
},
{
"category": "self",
"summary": "SUSE Bug 1252763",
"url": "https://bugzilla.suse.com/1252763"
},
{
"category": "self",
"summary": "SUSE Bug 1252776",
"url": "https://bugzilla.suse.com/1252776"
},
{
"category": "self",
"summary": "SUSE Bug 1252779",
"url": "https://bugzilla.suse.com/1252779"
},
{
"category": "self",
"summary": "SUSE Bug 1252790",
"url": "https://bugzilla.suse.com/1252790"
},
{
"category": "self",
"summary": "SUSE Bug 1252794",
"url": "https://bugzilla.suse.com/1252794"
},
{
"category": "self",
"summary": "SUSE Bug 1252795",
"url": "https://bugzilla.suse.com/1252795"
},
{
"category": "self",
"summary": "SUSE Bug 1252808",
"url": "https://bugzilla.suse.com/1252808"
},
{
"category": "self",
"summary": "SUSE Bug 1252809",
"url": "https://bugzilla.suse.com/1252809"
},
{
"category": "self",
"summary": "SUSE Bug 1252817",
"url": "https://bugzilla.suse.com/1252817"
},
{
"category": "self",
"summary": "SUSE Bug 1252821",
"url": "https://bugzilla.suse.com/1252821"
},
{
"category": "self",
"summary": "SUSE Bug 1252824",
"url": "https://bugzilla.suse.com/1252824"
},
{
"category": "self",
"summary": "SUSE Bug 1252836",
"url": "https://bugzilla.suse.com/1252836"
},
{
"category": "self",
"summary": "SUSE Bug 1252845",
"url": "https://bugzilla.suse.com/1252845"
},
{
"category": "self",
"summary": "SUSE Bug 1252901",
"url": "https://bugzilla.suse.com/1252901"
},
{
"category": "self",
"summary": "SUSE Bug 1252912",
"url": "https://bugzilla.suse.com/1252912"
},
{
"category": "self",
"summary": "SUSE Bug 1252917",
"url": "https://bugzilla.suse.com/1252917"
},
{
"category": "self",
"summary": "SUSE Bug 1252919",
"url": "https://bugzilla.suse.com/1252919"
},
{
"category": "self",
"summary": "SUSE Bug 1252923",
"url": "https://bugzilla.suse.com/1252923"
},
{
"category": "self",
"summary": "SUSE Bug 1252928",
"url": "https://bugzilla.suse.com/1252928"
},
{
"category": "self",
"summary": "SUSE Bug 1253018",
"url": "https://bugzilla.suse.com/1253018"
},
{
"category": "self",
"summary": "SUSE Bug 1253155",
"url": "https://bugzilla.suse.com/1253155"
},
{
"category": "self",
"summary": "SUSE Bug 1253176",
"url": "https://bugzilla.suse.com/1253176"
},
{
"category": "self",
"summary": "SUSE Bug 1253238",
"url": "https://bugzilla.suse.com/1253238"
},
{
"category": "self",
"summary": "SUSE Bug 1253275",
"url": "https://bugzilla.suse.com/1253275"
},
{
"category": "self",
"summary": "SUSE Bug 1253318",
"url": "https://bugzilla.suse.com/1253318"
},
{
"category": "self",
"summary": "SUSE Bug 1253324",
"url": "https://bugzilla.suse.com/1253324"
},
{
"category": "self",
"summary": "SUSE Bug 1253328",
"url": "https://bugzilla.suse.com/1253328"
},
{
"category": "self",
"summary": "SUSE Bug 1253330",
"url": "https://bugzilla.suse.com/1253330"
},
{
"category": "self",
"summary": "SUSE Bug 1253342",
"url": "https://bugzilla.suse.com/1253342"
},
{
"category": "self",
"summary": "SUSE Bug 1253348",
"url": "https://bugzilla.suse.com/1253348"
},
{
"category": "self",
"summary": "SUSE Bug 1253349",
"url": "https://bugzilla.suse.com/1253349"
},
{
"category": "self",
"summary": "SUSE Bug 1253352",
"url": "https://bugzilla.suse.com/1253352"
},
{
"category": "self",
"summary": "SUSE Bug 1253355",
"url": "https://bugzilla.suse.com/1253355"
},
{
"category": "self",
"summary": "SUSE Bug 1253360",
"url": "https://bugzilla.suse.com/1253360"
},
{
"category": "self",
"summary": "SUSE Bug 1253362",
"url": "https://bugzilla.suse.com/1253362"
},
{
"category": "self",
"summary": "SUSE Bug 1253363",
"url": "https://bugzilla.suse.com/1253363"
},
{
"category": "self",
"summary": "SUSE Bug 1253367",
"url": "https://bugzilla.suse.com/1253367"
},
{
"category": "self",
"summary": "SUSE Bug 1253369",
"url": "https://bugzilla.suse.com/1253369"
},
{
"category": "self",
"summary": "SUSE Bug 1253386",
"url": "https://bugzilla.suse.com/1253386"
},
{
"category": "self",
"summary": "SUSE Bug 1253394",
"url": "https://bugzilla.suse.com/1253394"
},
{
"category": "self",
"summary": "SUSE Bug 1253395",
"url": "https://bugzilla.suse.com/1253395"
},
{
"category": "self",
"summary": "SUSE Bug 1253402",
"url": "https://bugzilla.suse.com/1253402"
},
{
"category": "self",
"summary": "SUSE Bug 1253403",
"url": "https://bugzilla.suse.com/1253403"
},
{
"category": "self",
"summary": "SUSE Bug 1253405",
"url": "https://bugzilla.suse.com/1253405"
},
{
"category": "self",
"summary": "SUSE Bug 1253407",
"url": "https://bugzilla.suse.com/1253407"
},
{
"category": "self",
"summary": "SUSE Bug 1253408",
"url": "https://bugzilla.suse.com/1253408"
},
{
"category": "self",
"summary": "SUSE Bug 1253409",
"url": "https://bugzilla.suse.com/1253409"
},
{
"category": "self",
"summary": "SUSE Bug 1253410",
"url": "https://bugzilla.suse.com/1253410"
},
{
"category": "self",
"summary": "SUSE Bug 1253412",
"url": "https://bugzilla.suse.com/1253412"
},
{
"category": "self",
"summary": "SUSE Bug 1253416",
"url": "https://bugzilla.suse.com/1253416"
},
{
"category": "self",
"summary": "SUSE Bug 1253421",
"url": "https://bugzilla.suse.com/1253421"
},
{
"category": "self",
"summary": "SUSE Bug 1253422",
"url": "https://bugzilla.suse.com/1253422"
},
{
"category": "self",
"summary": "SUSE Bug 1253423",
"url": "https://bugzilla.suse.com/1253423"
},
{
"category": "self",
"summary": "SUSE Bug 1253424",
"url": "https://bugzilla.suse.com/1253424"
},
{
"category": "self",
"summary": "SUSE Bug 1253425",
"url": "https://bugzilla.suse.com/1253425"
},
{
"category": "self",
"summary": "SUSE Bug 1253426",
"url": "https://bugzilla.suse.com/1253426"
},
{
"category": "self",
"summary": "SUSE Bug 1253427",
"url": "https://bugzilla.suse.com/1253427"
},
{
"category": "self",
"summary": "SUSE Bug 1253428",
"url": "https://bugzilla.suse.com/1253428"
},
{
"category": "self",
"summary": "SUSE Bug 1253431",
"url": "https://bugzilla.suse.com/1253431"
},
{
"category": "self",
"summary": "SUSE Bug 1253433",
"url": "https://bugzilla.suse.com/1253433"
},
{
"category": "self",
"summary": "SUSE Bug 1253436",
"url": "https://bugzilla.suse.com/1253436"
},
{
"category": "self",
"summary": "SUSE Bug 1253438",
"url": "https://bugzilla.suse.com/1253438"
},
{
"category": "self",
"summary": "SUSE Bug 1253440",
"url": "https://bugzilla.suse.com/1253440"
},
{
"category": "self",
"summary": "SUSE Bug 1253441",
"url": "https://bugzilla.suse.com/1253441"
},
{
"category": "self",
"summary": "SUSE Bug 1253443",
"url": "https://bugzilla.suse.com/1253443"
},
{
"category": "self",
"summary": "SUSE Bug 1253445",
"url": "https://bugzilla.suse.com/1253445"
},
{
"category": "self",
"summary": "SUSE Bug 1253448",
"url": "https://bugzilla.suse.com/1253448"
},
{
"category": "self",
"summary": "SUSE Bug 1253449",
"url": "https://bugzilla.suse.com/1253449"
},
{
"category": "self",
"summary": "SUSE Bug 1253450",
"url": "https://bugzilla.suse.com/1253450"
},
{
"category": "self",
"summary": "SUSE Bug 1253451",
"url": "https://bugzilla.suse.com/1253451"
},
{
"category": "self",
"summary": "SUSE Bug 1253453",
"url": "https://bugzilla.suse.com/1253453"
},
{
"category": "self",
"summary": "SUSE Bug 1253455",
"url": "https://bugzilla.suse.com/1253455"
},
{
"category": "self",
"summary": "SUSE Bug 1253456",
"url": "https://bugzilla.suse.com/1253456"
},
{
"category": "self",
"summary": "SUSE Bug 1253457",
"url": "https://bugzilla.suse.com/1253457"
},
{
"category": "self",
"summary": "SUSE Bug 1253463",
"url": "https://bugzilla.suse.com/1253463"
},
{
"category": "self",
"summary": "SUSE Bug 1253472",
"url": "https://bugzilla.suse.com/1253472"
},
{
"category": "self",
"summary": "SUSE Bug 1253622",
"url": "https://bugzilla.suse.com/1253622"
},
{
"category": "self",
"summary": "SUSE Bug 1253624",
"url": "https://bugzilla.suse.com/1253624"
},
{
"category": "self",
"summary": "SUSE Bug 1253635",
"url": "https://bugzilla.suse.com/1253635"
},
{
"category": "self",
"summary": "SUSE Bug 1253643",
"url": "https://bugzilla.suse.com/1253643"
},
{
"category": "self",
"summary": "SUSE Bug 1253647",
"url": "https://bugzilla.suse.com/1253647"
},
{
"category": "self",
"summary": "SUSE Bug 1254119",
"url": "https://bugzilla.suse.com/1254119"
},
{
"category": "self",
"summary": "SUSE Bug 1254181",
"url": "https://bugzilla.suse.com/1254181"
},
{
"category": "self",
"summary": "SUSE Bug 1254221",
"url": "https://bugzilla.suse.com/1254221"
},
{
"category": "self",
"summary": "SUSE Bug 1254308",
"url": "https://bugzilla.suse.com/1254308"
},
{
"category": "self",
"summary": "SUSE Bug 1254315",
"url": "https://bugzilla.suse.com/1254315"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-50253 page",
"url": "https://www.suse.com/security/cve/CVE-2022-50253/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-37916 page",
"url": "https://www.suse.com/security/cve/CVE-2025-37916/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-38084 page",
"url": "https://www.suse.com/security/cve/CVE-2025-38084/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-38085 page",
"url": "https://www.suse.com/security/cve/CVE-2025-38085/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-38321 page",
"url": "https://www.suse.com/security/cve/CVE-2025-38321/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-38728 page",
"url": "https://www.suse.com/security/cve/CVE-2025-38728/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-39805 page",
"url": "https://www.suse.com/security/cve/CVE-2025-39805/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-39819 page",
"url": "https://www.suse.com/security/cve/CVE-2025-39819/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-39822 page",
"url": "https://www.suse.com/security/cve/CVE-2025-39822/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-39831 page",
"url": "https://www.suse.com/security/cve/CVE-2025-39831/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-39859 page",
"url": "https://www.suse.com/security/cve/CVE-2025-39859/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-39897 page",
"url": "https://www.suse.com/security/cve/CVE-2025-39897/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-39917 page",
"url": "https://www.suse.com/security/cve/CVE-2025-39917/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-39944 page",
"url": "https://www.suse.com/security/cve/CVE-2025-39944/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-39961 page",
"url": "https://www.suse.com/security/cve/CVE-2025-39961/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-39980 page",
"url": "https://www.suse.com/security/cve/CVE-2025-39980/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-39990 page",
"url": "https://www.suse.com/security/cve/CVE-2025-39990/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40001 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40001/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40003 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40003/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40006 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40006/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40021 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40021/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40024 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40024/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40027 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40027/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40031 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40031/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40033 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40033/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40038 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40038/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40047 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40047/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40053 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40053/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40055 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40055/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40059 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40059/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40064 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40064/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40070 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40070/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40074 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40074/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40075 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40075/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40081 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40081/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40083 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40083/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40086 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40086/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40098 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40098/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40101 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40101/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40102 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40102/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40105 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40105/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40107 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40107/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40109 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40109/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40110 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40110/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40111 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40111/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40115 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40115/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40116 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40116/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40118 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40118/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40120 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40120/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40121 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40121/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40127 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40127/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40129 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40129/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40132 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40132/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40133 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40133/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40134 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40134/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40135 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40135/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40139 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40139/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40140 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40140/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40141 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40141/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40142 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40142/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40149 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40149/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40153 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40153/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40154 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40154/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40156 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40156/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40157 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40157/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40158 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40158/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40159 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40159/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40161 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40161/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40162 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40162/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40164 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40164/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40165 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40165/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40166 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40166/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40168 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40168/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40169 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40169/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40171 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40171/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40172 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40172/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40173 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40173/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40175 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40175/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40176 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40176/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40177 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40177/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40178 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40178/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40180 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40180/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40183 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40183/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40185 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40185/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40186 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40186/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40187 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40187/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40188 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40188/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40192 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40192/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40194 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40194/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40196 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40196/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40197 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40197/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40198 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40198/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40200 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40200/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40201 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40201/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40202 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40202/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40203 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40203/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40204 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40204/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40205 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40205/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40206 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40206/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40207 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40207/"
}
],
"title": "Security update for the Linux Kernel",
"tracking": {
"current_release_date": "2025-12-19T16:46:47Z",
"generator": {
"date": "2025-12-19T16:46:47Z",
"engine": {
"name": "cve-database.git:bin/generate-csaf.pl",
"version": "1"
}
},
"id": "SUSE-SU-2026:20015-1",
"initial_release_date": "2025-12-19T16:46:47Z",
"revision_history": [
{
"date": "2025-12-19T16:46:47Z",
"number": "1",
"summary": "Current version"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "kernel-64kb-6.12.0-160000.8.1.aarch64",
"product": {
"name": "kernel-64kb-6.12.0-160000.8.1.aarch64",
"product_id": "kernel-64kb-6.12.0-160000.8.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"product": {
"name": "kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"product_id": "kernel-64kb-devel-6.12.0-160000.8.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"product": {
"name": "kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"product_id": "kernel-64kb-extra-6.12.0-160000.8.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-default-6.12.0-160000.8.1.aarch64",
"product": {
"name": "kernel-default-6.12.0-160000.8.1.aarch64",
"product_id": "kernel-default-6.12.0-160000.8.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"product": {
"name": "kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"product_id": "kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-default-devel-6.12.0-160000.8.1.aarch64",
"product": {
"name": "kernel-default-devel-6.12.0-160000.8.1.aarch64",
"product_id": "kernel-default-devel-6.12.0-160000.8.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-default-extra-6.12.0-160000.8.1.aarch64",
"product": {
"name": "kernel-default-extra-6.12.0-160000.8.1.aarch64",
"product_id": "kernel-default-extra-6.12.0-160000.8.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"product": {
"name": "kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"product_id": "kernel-kvmsmall-6.12.0-160000.8.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"product": {
"name": "kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"product_id": "kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"product": {
"name": "kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"product_id": "kernel-obs-qa-6.12.0-160000.8.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-syms-6.12.0-160000.8.1.aarch64",
"product": {
"name": "kernel-syms-6.12.0-160000.8.1.aarch64",
"product_id": "kernel-syms-6.12.0-160000.8.1.aarch64"
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-devel-6.12.0-160000.8.1.noarch",
"product": {
"name": "kernel-devel-6.12.0-160000.8.1.noarch",
"product_id": "kernel-devel-6.12.0-160000.8.1.noarch"
}
},
{
"category": "product_version",
"name": "kernel-docs-6.12.0-160000.8.1.noarch",
"product": {
"name": "kernel-docs-6.12.0-160000.8.1.noarch",
"product_id": "kernel-docs-6.12.0-160000.8.1.noarch"
}
},
{
"category": "product_version",
"name": "kernel-docs-html-6.12.0-160000.8.1.noarch",
"product": {
"name": "kernel-docs-html-6.12.0-160000.8.1.noarch",
"product_id": "kernel-docs-html-6.12.0-160000.8.1.noarch"
}
},
{
"category": "product_version",
"name": "kernel-macros-6.12.0-160000.8.1.noarch",
"product": {
"name": "kernel-macros-6.12.0-160000.8.1.noarch",
"product_id": "kernel-macros-6.12.0-160000.8.1.noarch"
}
},
{
"category": "product_version",
"name": "kernel-source-6.12.0-160000.8.1.noarch",
"product": {
"name": "kernel-source-6.12.0-160000.8.1.noarch",
"product_id": "kernel-source-6.12.0-160000.8.1.noarch"
}
},
{
"category": "product_version",
"name": "kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"product": {
"name": "kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"product_id": "kernel-source-vanilla-6.12.0-160000.8.1.noarch"
}
}
],
"category": "architecture",
"name": "noarch"
},
{
"branches": [
{
"category": "product_version",
"name": "cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"product": {
"name": "cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"product_id": "cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le"
}
},
{
"category": "product_version",
"name": "dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"product": {
"name": "dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"product_id": "dlm-kmp-default-6.12.0-160000.8.1.ppc64le"
}
},
{
"category": "product_version",
"name": "gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"product": {
"name": "gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"product_id": "gfs2-kmp-default-6.12.0-160000.8.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-default-6.12.0-160000.8.1.ppc64le",
"product": {
"name": "kernel-default-6.12.0-160000.8.1.ppc64le",
"product_id": "kernel-default-6.12.0-160000.8.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"product": {
"name": "kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"product_id": "kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"product": {
"name": "kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"product_id": "kernel-default-devel-6.12.0-160000.8.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"product": {
"name": "kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"product_id": "kernel-default-extra-6.12.0-160000.8.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"product": {
"name": "kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"product_id": "kernel-default-livepatch-6.12.0-160000.8.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"product": {
"name": "kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"product_id": "kernel-kvmsmall-6.12.0-160000.8.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"product": {
"name": "kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"product_id": "kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"product": {
"name": "kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"product_id": "kernel-obs-qa-6.12.0-160000.8.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-syms-6.12.0-160000.8.1.ppc64le",
"product": {
"name": "kernel-syms-6.12.0-160000.8.1.ppc64le",
"product_id": "kernel-syms-6.12.0-160000.8.1.ppc64le"
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-default-6.12.0-160000.8.1.s390x",
"product": {
"name": "kernel-default-6.12.0-160000.8.1.s390x",
"product_id": "kernel-default-6.12.0-160000.8.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-default-devel-6.12.0-160000.8.1.s390x",
"product": {
"name": "kernel-default-devel-6.12.0-160000.8.1.s390x",
"product_id": "kernel-default-devel-6.12.0-160000.8.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-default-extra-6.12.0-160000.8.1.s390x",
"product": {
"name": "kernel-default-extra-6.12.0-160000.8.1.s390x",
"product_id": "kernel-default-extra-6.12.0-160000.8.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"product": {
"name": "kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"product_id": "kernel-default-livepatch-6.12.0-160000.8.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-obs-qa-6.12.0-160000.8.1.s390x",
"product": {
"name": "kernel-obs-qa-6.12.0-160000.8.1.s390x",
"product_id": "kernel-obs-qa-6.12.0-160000.8.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-syms-6.12.0-160000.8.1.s390x",
"product": {
"name": "kernel-syms-6.12.0-160000.8.1.s390x",
"product_id": "kernel-syms-6.12.0-160000.8.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"product": {
"name": "kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"product_id": "kernel-zfcpdump-6.12.0-160000.8.1.s390x"
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"product": {
"name": "cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"product_id": "cluster-md-kmp-default-6.12.0-160000.8.1.x86_64"
}
},
{
"category": "product_version",
"name": "dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"product": {
"name": "dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"product_id": "dlm-kmp-default-6.12.0-160000.8.1.x86_64"
}
},
{
"category": "product_version",
"name": "gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"product": {
"name": "gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"product_id": "gfs2-kmp-default-6.12.0-160000.8.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-default-6.12.0-160000.8.1.x86_64",
"product": {
"name": "kernel-default-6.12.0-160000.8.1.x86_64",
"product_id": "kernel-default-6.12.0-160000.8.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"product": {
"name": "kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"product_id": "kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-default-devel-6.12.0-160000.8.1.x86_64",
"product": {
"name": "kernel-default-devel-6.12.0-160000.8.1.x86_64",
"product_id": "kernel-default-devel-6.12.0-160000.8.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-default-extra-6.12.0-160000.8.1.x86_64",
"product": {
"name": "kernel-default-extra-6.12.0-160000.8.1.x86_64",
"product_id": "kernel-default-extra-6.12.0-160000.8.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"product": {
"name": "kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"product_id": "kernel-default-livepatch-6.12.0-160000.8.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"product": {
"name": "kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"product_id": "kernel-default-vdso-6.12.0-160000.8.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"product": {
"name": "kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"product_id": "kernel-kvmsmall-6.12.0-160000.8.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"product": {
"name": "kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"product_id": "kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"product": {
"name": "kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"product_id": "kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"product": {
"name": "kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"product_id": "kernel-obs-qa-6.12.0-160000.8.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-syms-6.12.0-160000.8.1.x86_64",
"product": {
"name": "kernel-syms-6.12.0-160000.8.1.x86_64",
"product_id": "kernel-syms-6.12.0-160000.8.1.x86_64"
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_name",
"name": "SUSE Linux Enterprise Server 16.0",
"product": {
"name": "SUSE Linux Enterprise Server 16.0",
"product_id": "SUSE Linux Enterprise Server 16.0",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sles:16.0"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Server for SAP applications 16.0",
"product": {
"name": "SUSE Linux Enterprise Server for SAP applications 16.0",
"product_id": "SUSE Linux Enterprise Server for SAP applications 16.0",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sles:16:16.0:server-sap"
}
}
}
],
"category": "product_family",
"name": "SUSE Linux Enterprise"
}
],
"category": "vendor",
"name": "SUSE"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le as component of SUSE Linux Enterprise Server 16.0",
"product_id": "SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le"
},
"product_reference": "cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cluster-md-kmp-default-6.12.0-160000.8.1.x86_64 as component of SUSE Linux Enterprise Server 16.0",
"product_id": "SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64"
},
"product_reference": "cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dlm-kmp-default-6.12.0-160000.8.1.ppc64le as component of SUSE Linux Enterprise Server 16.0",
"product_id": "SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le"
},
"product_reference": "dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dlm-kmp-default-6.12.0-160000.8.1.x86_64 as component of SUSE Linux Enterprise Server 16.0",
"product_id": "SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64"
},
"product_reference": "dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "gfs2-kmp-default-6.12.0-160000.8.1.ppc64le as component of SUSE Linux Enterprise Server 16.0",
"product_id": "SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le"
},
"product_reference": "gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "gfs2-kmp-default-6.12.0-160000.8.1.x86_64 as component of SUSE Linux Enterprise Server 16.0",
"product_id": "SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64"
},
"product_reference": "gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-64kb-6.12.0-160000.8.1.aarch64 as component of SUSE Linux Enterprise Server 16.0",
"product_id": "SUSE Linux Enterprise Server 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64"
},
"product_reference": "kernel-64kb-6.12.0-160000.8.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-64kb-devel-6.12.0-160000.8.1.aarch64 as component of SUSE Linux Enterprise Server 16.0",
"product_id": "SUSE Linux Enterprise Server 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64"
},
"product_reference": "kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-64kb-extra-6.12.0-160000.8.1.aarch64 as component of SUSE Linux Enterprise Server 16.0",
"product_id": "SUSE Linux Enterprise Server 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64"
},
"product_reference": "kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-6.12.0-160000.8.1.aarch64 as component of SUSE Linux Enterprise Server 16.0",
"product_id": "SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.aarch64"
},
"product_reference": "kernel-default-6.12.0-160000.8.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-6.12.0-160000.8.1.ppc64le as component of SUSE Linux Enterprise Server 16.0",
"product_id": "SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.ppc64le"
},
"product_reference": "kernel-default-6.12.0-160000.8.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-6.12.0-160000.8.1.s390x as component of SUSE Linux Enterprise Server 16.0",
"product_id": "SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.s390x"
},
"product_reference": "kernel-default-6.12.0-160000.8.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-6.12.0-160000.8.1.x86_64 as component of SUSE Linux Enterprise Server 16.0",
"product_id": "SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.x86_64"
},
"product_reference": "kernel-default-6.12.0-160000.8.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64 as component of SUSE Linux Enterprise Server 16.0",
"product_id": "SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64"
},
"product_reference": "kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le as component of SUSE Linux Enterprise Server 16.0",
"product_id": "SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le"
},
"product_reference": "kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64 as component of SUSE Linux Enterprise Server 16.0",
"product_id": "SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64"
},
"product_reference": "kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-devel-6.12.0-160000.8.1.aarch64 as component of SUSE Linux Enterprise Server 16.0",
"product_id": "SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64"
},
"product_reference": "kernel-default-devel-6.12.0-160000.8.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-devel-6.12.0-160000.8.1.ppc64le as component of SUSE Linux Enterprise Server 16.0",
"product_id": "SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le"
},
"product_reference": "kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-devel-6.12.0-160000.8.1.s390x as component of SUSE Linux Enterprise Server 16.0",
"product_id": "SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x"
},
"product_reference": "kernel-default-devel-6.12.0-160000.8.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-devel-6.12.0-160000.8.1.x86_64 as component of SUSE Linux Enterprise Server 16.0",
"product_id": "SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64"
},
"product_reference": "kernel-default-devel-6.12.0-160000.8.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-extra-6.12.0-160000.8.1.aarch64 as component of SUSE Linux Enterprise Server 16.0",
"product_id": "SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64"
},
"product_reference": "kernel-default-extra-6.12.0-160000.8.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-extra-6.12.0-160000.8.1.ppc64le as component of SUSE Linux Enterprise Server 16.0",
"product_id": "SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le"
},
"product_reference": "kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-extra-6.12.0-160000.8.1.s390x as component of SUSE Linux Enterprise Server 16.0",
"product_id": "SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x"
},
"product_reference": "kernel-default-extra-6.12.0-160000.8.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-extra-6.12.0-160000.8.1.x86_64 as component of SUSE Linux Enterprise Server 16.0",
"product_id": "SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64"
},
"product_reference": "kernel-default-extra-6.12.0-160000.8.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-livepatch-6.12.0-160000.8.1.ppc64le as component of SUSE Linux Enterprise Server 16.0",
"product_id": "SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le"
},
"product_reference": "kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-livepatch-6.12.0-160000.8.1.s390x as component of SUSE Linux Enterprise Server 16.0",
"product_id": "SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x"
},
"product_reference": "kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-livepatch-6.12.0-160000.8.1.x86_64 as component of SUSE Linux Enterprise Server 16.0",
"product_id": "SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64"
},
"product_reference": "kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-vdso-6.12.0-160000.8.1.x86_64 as component of SUSE Linux Enterprise Server 16.0",
"product_id": "SUSE Linux Enterprise Server 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64"
},
"product_reference": "kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-6.12.0-160000.8.1.noarch as component of SUSE Linux Enterprise Server 16.0",
"product_id": "SUSE Linux Enterprise Server 16.0:kernel-devel-6.12.0-160000.8.1.noarch"
},
"product_reference": "kernel-devel-6.12.0-160000.8.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Server 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-docs-6.12.0-160000.8.1.noarch as component of SUSE Linux Enterprise Server 16.0",
"product_id": "SUSE Linux Enterprise Server 16.0:kernel-docs-6.12.0-160000.8.1.noarch"
},
"product_reference": "kernel-docs-6.12.0-160000.8.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Server 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-docs-html-6.12.0-160000.8.1.noarch as component of SUSE Linux Enterprise Server 16.0",
"product_id": "SUSE Linux Enterprise Server 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch"
},
"product_reference": "kernel-docs-html-6.12.0-160000.8.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Server 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kvmsmall-6.12.0-160000.8.1.aarch64 as component of SUSE Linux Enterprise Server 16.0",
"product_id": "SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64"
},
"product_reference": "kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kvmsmall-6.12.0-160000.8.1.ppc64le as component of SUSE Linux Enterprise Server 16.0",
"product_id": "SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le"
},
"product_reference": "kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kvmsmall-6.12.0-160000.8.1.x86_64 as component of SUSE Linux Enterprise Server 16.0",
"product_id": "SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64"
},
"product_reference": "kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64 as component of SUSE Linux Enterprise Server 16.0",
"product_id": "SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64"
},
"product_reference": "kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le as component of SUSE Linux Enterprise Server 16.0",
"product_id": "SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le"
},
"product_reference": "kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64 as component of SUSE Linux Enterprise Server 16.0",
"product_id": "SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64"
},
"product_reference": "kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64 as component of SUSE Linux Enterprise Server 16.0",
"product_id": "SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64"
},
"product_reference": "kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-macros-6.12.0-160000.8.1.noarch as component of SUSE Linux Enterprise Server 16.0",
"product_id": "SUSE Linux Enterprise Server 16.0:kernel-macros-6.12.0-160000.8.1.noarch"
},
"product_reference": "kernel-macros-6.12.0-160000.8.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Server 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-obs-qa-6.12.0-160000.8.1.aarch64 as component of SUSE Linux Enterprise Server 16.0",
"product_id": "SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64"
},
"product_reference": "kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-obs-qa-6.12.0-160000.8.1.ppc64le as component of SUSE Linux Enterprise Server 16.0",
"product_id": "SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le"
},
"product_reference": "kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-obs-qa-6.12.0-160000.8.1.s390x as component of SUSE Linux Enterprise Server 16.0",
"product_id": "SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x"
},
"product_reference": "kernel-obs-qa-6.12.0-160000.8.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-obs-qa-6.12.0-160000.8.1.x86_64 as component of SUSE Linux Enterprise Server 16.0",
"product_id": "SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64"
},
"product_reference": "kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-source-6.12.0-160000.8.1.noarch as component of SUSE Linux Enterprise Server 16.0",
"product_id": "SUSE Linux Enterprise Server 16.0:kernel-source-6.12.0-160000.8.1.noarch"
},
"product_reference": "kernel-source-6.12.0-160000.8.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Server 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-source-vanilla-6.12.0-160000.8.1.noarch as component of SUSE Linux Enterprise Server 16.0",
"product_id": "SUSE Linux Enterprise Server 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch"
},
"product_reference": "kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Server 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-syms-6.12.0-160000.8.1.aarch64 as component of SUSE Linux Enterprise Server 16.0",
"product_id": "SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.aarch64"
},
"product_reference": "kernel-syms-6.12.0-160000.8.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-syms-6.12.0-160000.8.1.ppc64le as component of SUSE Linux Enterprise Server 16.0",
"product_id": "SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le"
},
"product_reference": "kernel-syms-6.12.0-160000.8.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-syms-6.12.0-160000.8.1.s390x as component of SUSE Linux Enterprise Server 16.0",
"product_id": "SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.s390x"
},
"product_reference": "kernel-syms-6.12.0-160000.8.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-syms-6.12.0-160000.8.1.x86_64 as component of SUSE Linux Enterprise Server 16.0",
"product_id": "SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.x86_64"
},
"product_reference": "kernel-syms-6.12.0-160000.8.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-zfcpdump-6.12.0-160000.8.1.s390x as component of SUSE Linux Enterprise Server 16.0",
"product_id": "SUSE Linux Enterprise Server 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x"
},
"product_reference": "kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le as component of SUSE Linux Enterprise Server for SAP applications 16.0",
"product_id": "SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le"
},
"product_reference": "cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP applications 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cluster-md-kmp-default-6.12.0-160000.8.1.x86_64 as component of SUSE Linux Enterprise Server for SAP applications 16.0",
"product_id": "SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64"
},
"product_reference": "cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP applications 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dlm-kmp-default-6.12.0-160000.8.1.ppc64le as component of SUSE Linux Enterprise Server for SAP applications 16.0",
"product_id": "SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le"
},
"product_reference": "dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP applications 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dlm-kmp-default-6.12.0-160000.8.1.x86_64 as component of SUSE Linux Enterprise Server for SAP applications 16.0",
"product_id": "SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64"
},
"product_reference": "dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP applications 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "gfs2-kmp-default-6.12.0-160000.8.1.ppc64le as component of SUSE Linux Enterprise Server for SAP applications 16.0",
"product_id": "SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le"
},
"product_reference": "gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP applications 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "gfs2-kmp-default-6.12.0-160000.8.1.x86_64 as component of SUSE Linux Enterprise Server for SAP applications 16.0",
"product_id": "SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64"
},
"product_reference": "gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP applications 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-64kb-6.12.0-160000.8.1.aarch64 as component of SUSE Linux Enterprise Server for SAP applications 16.0",
"product_id": "SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64"
},
"product_reference": "kernel-64kb-6.12.0-160000.8.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP applications 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-64kb-devel-6.12.0-160000.8.1.aarch64 as component of SUSE Linux Enterprise Server for SAP applications 16.0",
"product_id": "SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64"
},
"product_reference": "kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP applications 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-64kb-extra-6.12.0-160000.8.1.aarch64 as component of SUSE Linux Enterprise Server for SAP applications 16.0",
"product_id": "SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64"
},
"product_reference": "kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP applications 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-6.12.0-160000.8.1.aarch64 as component of SUSE Linux Enterprise Server for SAP applications 16.0",
"product_id": "SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.aarch64"
},
"product_reference": "kernel-default-6.12.0-160000.8.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP applications 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-6.12.0-160000.8.1.ppc64le as component of SUSE Linux Enterprise Server for SAP applications 16.0",
"product_id": "SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.ppc64le"
},
"product_reference": "kernel-default-6.12.0-160000.8.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP applications 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-6.12.0-160000.8.1.s390x as component of SUSE Linux Enterprise Server for SAP applications 16.0",
"product_id": "SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.s390x"
},
"product_reference": "kernel-default-6.12.0-160000.8.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP applications 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-6.12.0-160000.8.1.x86_64 as component of SUSE Linux Enterprise Server for SAP applications 16.0",
"product_id": "SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.x86_64"
},
"product_reference": "kernel-default-6.12.0-160000.8.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP applications 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64 as component of SUSE Linux Enterprise Server for SAP applications 16.0",
"product_id": "SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64"
},
"product_reference": "kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP applications 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le as component of SUSE Linux Enterprise Server for SAP applications 16.0",
"product_id": "SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le"
},
"product_reference": "kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP applications 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64 as component of SUSE Linux Enterprise Server for SAP applications 16.0",
"product_id": "SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64"
},
"product_reference": "kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP applications 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-devel-6.12.0-160000.8.1.aarch64 as component of SUSE Linux Enterprise Server for SAP applications 16.0",
"product_id": "SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64"
},
"product_reference": "kernel-default-devel-6.12.0-160000.8.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP applications 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-devel-6.12.0-160000.8.1.ppc64le as component of SUSE Linux Enterprise Server for SAP applications 16.0",
"product_id": "SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le"
},
"product_reference": "kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP applications 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-devel-6.12.0-160000.8.1.s390x as component of SUSE Linux Enterprise Server for SAP applications 16.0",
"product_id": "SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x"
},
"product_reference": "kernel-default-devel-6.12.0-160000.8.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP applications 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-devel-6.12.0-160000.8.1.x86_64 as component of SUSE Linux Enterprise Server for SAP applications 16.0",
"product_id": "SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64"
},
"product_reference": "kernel-default-devel-6.12.0-160000.8.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP applications 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-extra-6.12.0-160000.8.1.aarch64 as component of SUSE Linux Enterprise Server for SAP applications 16.0",
"product_id": "SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64"
},
"product_reference": "kernel-default-extra-6.12.0-160000.8.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP applications 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-extra-6.12.0-160000.8.1.ppc64le as component of SUSE Linux Enterprise Server for SAP applications 16.0",
"product_id": "SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le"
},
"product_reference": "kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP applications 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-extra-6.12.0-160000.8.1.s390x as component of SUSE Linux Enterprise Server for SAP applications 16.0",
"product_id": "SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x"
},
"product_reference": "kernel-default-extra-6.12.0-160000.8.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP applications 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-extra-6.12.0-160000.8.1.x86_64 as component of SUSE Linux Enterprise Server for SAP applications 16.0",
"product_id": "SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64"
},
"product_reference": "kernel-default-extra-6.12.0-160000.8.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP applications 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-livepatch-6.12.0-160000.8.1.ppc64le as component of SUSE Linux Enterprise Server for SAP applications 16.0",
"product_id": "SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le"
},
"product_reference": "kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP applications 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-livepatch-6.12.0-160000.8.1.s390x as component of SUSE Linux Enterprise Server for SAP applications 16.0",
"product_id": "SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x"
},
"product_reference": "kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP applications 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-livepatch-6.12.0-160000.8.1.x86_64 as component of SUSE Linux Enterprise Server for SAP applications 16.0",
"product_id": "SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64"
},
"product_reference": "kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP applications 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-vdso-6.12.0-160000.8.1.x86_64 as component of SUSE Linux Enterprise Server for SAP applications 16.0",
"product_id": "SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64"
},
"product_reference": "kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP applications 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-6.12.0-160000.8.1.noarch as component of SUSE Linux Enterprise Server for SAP applications 16.0",
"product_id": "SUSE Linux Enterprise Server for SAP applications 16.0:kernel-devel-6.12.0-160000.8.1.noarch"
},
"product_reference": "kernel-devel-6.12.0-160000.8.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP applications 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-docs-6.12.0-160000.8.1.noarch as component of SUSE Linux Enterprise Server for SAP applications 16.0",
"product_id": "SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-6.12.0-160000.8.1.noarch"
},
"product_reference": "kernel-docs-6.12.0-160000.8.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP applications 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-docs-html-6.12.0-160000.8.1.noarch as component of SUSE Linux Enterprise Server for SAP applications 16.0",
"product_id": "SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch"
},
"product_reference": "kernel-docs-html-6.12.0-160000.8.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP applications 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kvmsmall-6.12.0-160000.8.1.aarch64 as component of SUSE Linux Enterprise Server for SAP applications 16.0",
"product_id": "SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64"
},
"product_reference": "kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP applications 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kvmsmall-6.12.0-160000.8.1.ppc64le as component of SUSE Linux Enterprise Server for SAP applications 16.0",
"product_id": "SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le"
},
"product_reference": "kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP applications 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kvmsmall-6.12.0-160000.8.1.x86_64 as component of SUSE Linux Enterprise Server for SAP applications 16.0",
"product_id": "SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64"
},
"product_reference": "kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP applications 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64 as component of SUSE Linux Enterprise Server for SAP applications 16.0",
"product_id": "SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64"
},
"product_reference": "kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP applications 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le as component of SUSE Linux Enterprise Server for SAP applications 16.0",
"product_id": "SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le"
},
"product_reference": "kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP applications 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64 as component of SUSE Linux Enterprise Server for SAP applications 16.0",
"product_id": "SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64"
},
"product_reference": "kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP applications 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64 as component of SUSE Linux Enterprise Server for SAP applications 16.0",
"product_id": "SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64"
},
"product_reference": "kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP applications 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-macros-6.12.0-160000.8.1.noarch as component of SUSE Linux Enterprise Server for SAP applications 16.0",
"product_id": "SUSE Linux Enterprise Server for SAP applications 16.0:kernel-macros-6.12.0-160000.8.1.noarch"
},
"product_reference": "kernel-macros-6.12.0-160000.8.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP applications 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-obs-qa-6.12.0-160000.8.1.aarch64 as component of SUSE Linux Enterprise Server for SAP applications 16.0",
"product_id": "SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64"
},
"product_reference": "kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP applications 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-obs-qa-6.12.0-160000.8.1.ppc64le as component of SUSE Linux Enterprise Server for SAP applications 16.0",
"product_id": "SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le"
},
"product_reference": "kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP applications 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-obs-qa-6.12.0-160000.8.1.s390x as component of SUSE Linux Enterprise Server for SAP applications 16.0",
"product_id": "SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x"
},
"product_reference": "kernel-obs-qa-6.12.0-160000.8.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP applications 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-obs-qa-6.12.0-160000.8.1.x86_64 as component of SUSE Linux Enterprise Server for SAP applications 16.0",
"product_id": "SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64"
},
"product_reference": "kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP applications 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-source-6.12.0-160000.8.1.noarch as component of SUSE Linux Enterprise Server for SAP applications 16.0",
"product_id": "SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-6.12.0-160000.8.1.noarch"
},
"product_reference": "kernel-source-6.12.0-160000.8.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP applications 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-source-vanilla-6.12.0-160000.8.1.noarch as component of SUSE Linux Enterprise Server for SAP applications 16.0",
"product_id": "SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch"
},
"product_reference": "kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP applications 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-syms-6.12.0-160000.8.1.aarch64 as component of SUSE Linux Enterprise Server for SAP applications 16.0",
"product_id": "SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.aarch64"
},
"product_reference": "kernel-syms-6.12.0-160000.8.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP applications 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-syms-6.12.0-160000.8.1.ppc64le as component of SUSE Linux Enterprise Server for SAP applications 16.0",
"product_id": "SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le"
},
"product_reference": "kernel-syms-6.12.0-160000.8.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP applications 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-syms-6.12.0-160000.8.1.s390x as component of SUSE Linux Enterprise Server for SAP applications 16.0",
"product_id": "SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.s390x"
},
"product_reference": "kernel-syms-6.12.0-160000.8.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP applications 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-syms-6.12.0-160000.8.1.x86_64 as component of SUSE Linux Enterprise Server for SAP applications 16.0",
"product_id": "SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.x86_64"
},
"product_reference": "kernel-syms-6.12.0-160000.8.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP applications 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-zfcpdump-6.12.0-160000.8.1.s390x as component of SUSE Linux Enterprise Server for SAP applications 16.0",
"product_id": "SUSE Linux Enterprise Server for SAP applications 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x"
},
"product_reference": "kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP applications 16.0"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2022-50253",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-50253"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nbpf: make sure skb-\u003elen != 0 when redirecting to a tunneling device\n\nsyzkaller managed to trigger another case where skb-\u003elen == 0\nwhen we enter __dev_queue_xmit:\n\nWARNING: CPU: 0 PID: 2470 at include/linux/skbuff.h:2576 skb_assert_len include/linux/skbuff.h:2576 [inline]\nWARNING: CPU: 0 PID: 2470 at include/linux/skbuff.h:2576 __dev_queue_xmit+0x2069/0x35e0 net/core/dev.c:4295\n\nCall Trace:\n dev_queue_xmit+0x17/0x20 net/core/dev.c:4406\n __bpf_tx_skb net/core/filter.c:2115 [inline]\n __bpf_redirect_no_mac net/core/filter.c:2140 [inline]\n __bpf_redirect+0x5fb/0xda0 net/core/filter.c:2163\n ____bpf_clone_redirect net/core/filter.c:2447 [inline]\n bpf_clone_redirect+0x247/0x390 net/core/filter.c:2419\n bpf_prog_48159a89cb4a9a16+0x59/0x5e\n bpf_dispatcher_nop_func include/linux/bpf.h:897 [inline]\n __bpf_prog_run include/linux/filter.h:596 [inline]\n bpf_prog_run include/linux/filter.h:603 [inline]\n bpf_test_run+0x46c/0x890 net/bpf/test_run.c:402\n bpf_prog_test_run_skb+0xbdc/0x14c0 net/bpf/test_run.c:1170\n bpf_prog_test_run+0x345/0x3c0 kernel/bpf/syscall.c:3648\n __sys_bpf+0x43a/0x6c0 kernel/bpf/syscall.c:5005\n __do_sys_bpf kernel/bpf/syscall.c:5091 [inline]\n __se_sys_bpf kernel/bpf/syscall.c:5089 [inline]\n __x64_sys_bpf+0x7c/0x90 kernel/bpf/syscall.c:5089\n do_syscall_64+0x54/0x70 arch/x86/entry/common.c:48\n entry_SYSCALL_64_after_hwframe+0x61/0xc6\n\nThe reproducer doesn\u0027t really reproduce outside of syzkaller\nenvironment, so I\u0027m taking a guess here. It looks like we\ndo generate correct ETH_HLEN-sized packet, but we redirect\nthe packet to the tunneling device. Before we do so, we\n__skb_pull l2 header and arrive again at skb-\u003elen == 0.\nDoesn\u0027t seem like we can do anything better than having\nan explicit check after __skb_pull?",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-50253",
"url": "https://www.suse.com/security/cve/CVE-2022-50253"
},
{
"category": "external",
"summary": "SUSE Bug 1249912 for CVE-2022-50253",
"url": "https://bugzilla.suse.com/1249912"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-19T16:46:47Z",
"details": "moderate"
}
],
"title": "CVE-2022-50253"
},
{
"cve": "CVE-2025-37916",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-37916"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\npds_core: remove write-after-free of client_id\n\nA use-after-free error popped up in stress testing:\n\n[Mon Apr 21 21:21:33 2025] BUG: KFENCE: use-after-free write in pdsc_auxbus_dev_del+0xef/0x160 [pds_core]\n[Mon Apr 21 21:21:33 2025] Use-after-free write at 0x000000007013ecd1 (in kfence-#47):\n[Mon Apr 21 21:21:33 2025] pdsc_auxbus_dev_del+0xef/0x160 [pds_core]\n[Mon Apr 21 21:21:33 2025] pdsc_remove+0xc0/0x1b0 [pds_core]\n[Mon Apr 21 21:21:33 2025] pci_device_remove+0x24/0x70\n[Mon Apr 21 21:21:33 2025] device_release_driver_internal+0x11f/0x180\n[Mon Apr 21 21:21:33 2025] driver_detach+0x45/0x80\n[Mon Apr 21 21:21:33 2025] bus_remove_driver+0x83/0xe0\n[Mon Apr 21 21:21:33 2025] pci_unregister_driver+0x1a/0x80\n\nThe actual device uninit usually happens on a separate thread\nscheduled after this code runs, but there is no guarantee of order\nof thread execution, so this could be a problem. There\u0027s no\nactual need to clear the client_id at this point, so simply\nremove the offending code.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-37916",
"url": "https://www.suse.com/security/cve/CVE-2025-37916"
},
{
"category": "external",
"summary": "SUSE Bug 1243474 for CVE-2025-37916",
"url": "https://bugzilla.suse.com/1243474"
},
{
"category": "external",
"summary": "SUSE Bug 1243535 for CVE-2025-37916",
"url": "https://bugzilla.suse.com/1243535"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-19T16:46:47Z",
"details": "moderate"
}
],
"title": "CVE-2025-37916"
},
{
"cve": "CVE-2025-38084",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-38084"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nmm/hugetlb: unshare page tables during VMA split, not before\n\nCurrently, __split_vma() triggers hugetlb page table unsharing through\nvm_ops-\u003emay_split(). This happens before the VMA lock and rmap locks are\ntaken - which is too early, it allows racing VMA-locked page faults in our\nprocess and racing rmap walks from other processes to cause page tables to\nbe shared again before we actually perform the split.\n\nFix it by explicitly calling into the hugetlb unshare logic from\n__split_vma() in the same place where THP splitting also happens. At that\npoint, both the VMA and the rmap(s) are write-locked.\n\nAn annoying detail is that we can now call into the helper\nhugetlb_unshare_pmds() from two different locking contexts:\n\n1. from hugetlb_split(), holding:\n - mmap lock (exclusively)\n - VMA lock\n - file rmap lock (exclusively)\n2. hugetlb_unshare_all_pmds(), which I think is designed to be able to\n call us with only the mmap lock held (in shared mode), but currently\n only runs while holding mmap lock (exclusively) and VMA lock\n\nBackporting note:\nThis commit fixes a racy protection that was introduced in commit\nb30c14cd6102 (\"hugetlb: unshare some PMDs when splitting VMAs\"); that\ncommit claimed to fix an issue introduced in 5.13, but it should actually\nalso go all the way back.\n\n[jannh@google.com: v2]",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-38084",
"url": "https://www.suse.com/security/cve/CVE-2025-38084"
},
{
"category": "external",
"summary": "SUSE Bug 1245498 for CVE-2025-38084",
"url": "https://bugzilla.suse.com/1245498"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.8,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-19T16:46:47Z",
"details": "moderate"
}
],
"title": "CVE-2025-38084"
},
{
"cve": "CVE-2025-38085",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-38085"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nmm/hugetlb: fix huge_pmd_unshare() vs GUP-fast race\n\nhuge_pmd_unshare() drops a reference on a page table that may have\npreviously been shared across processes, potentially turning it into a\nnormal page table used in another process in which unrelated VMAs can\nafterwards be installed.\n\nIf this happens in the middle of a concurrent gup_fast(), gup_fast() could\nend up walking the page tables of another process. While I don\u0027t see any\nway in which that immediately leads to kernel memory corruption, it is\nreally weird and unexpected.\n\nFix it with an explicit broadcast IPI through tlb_remove_table_sync_one(),\njust like we do in khugepaged when removing page tables for a THP\ncollapse.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-38085",
"url": "https://www.suse.com/security/cve/CVE-2025-38085"
},
{
"category": "external",
"summary": "SUSE Bug 1245499 for CVE-2025-38085",
"url": "https://bugzilla.suse.com/1245499"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.6,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-19T16:46:47Z",
"details": "moderate"
}
],
"title": "CVE-2025-38085"
},
{
"cve": "CVE-2025-38321",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-38321"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nsmb: Log an error when close_all_cached_dirs fails\n\nUnder low-memory conditions, close_all_cached_dirs() can\u0027t move the\ndentries to a separate list to dput() them once the locks are dropped.\nThis will result in a \"Dentry still in use\" error, so add an error\nmessage that makes it clear this is what happened:\n\n[ 495.281119] CIFS: VFS: \\\\otters.example.com\\share Out of memory while dropping dentries\n[ 495.281595] ------------[ cut here ]------------\n[ 495.281887] BUG: Dentry ffff888115531138{i=78,n=/} still in use (2) [unmount of cifs cifs]\n[ 495.282391] WARNING: CPU: 1 PID: 2329 at fs/dcache.c:1536 umount_check+0xc8/0xf0\n\nAlso, bail out of looping through all tcons as soon as a single\nallocation fails, since we\u0027re already in trouble, and kmalloc() attempts\nfor subseqeuent tcons are likely to fail just like the first one did.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-38321",
"url": "https://www.suse.com/security/cve/CVE-2025-38321"
},
{
"category": "external",
"summary": "SUSE Bug 1246328 for CVE-2025-38321",
"url": "https://bugzilla.suse.com/1246328"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-19T16:46:47Z",
"details": "moderate"
}
],
"title": "CVE-2025-38321"
},
{
"cve": "CVE-2025-38728",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-38728"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nsmb3: fix for slab out of bounds on mount to ksmbd\n\nWith KASAN enabled, it is possible to get a slab out of bounds\nduring mount to ksmbd due to missing check in parse_server_interfaces()\n(see below):\n\n BUG: KASAN: slab-out-of-bounds in\n parse_server_interfaces+0x14ee/0x1880 [cifs]\n Read of size 4 at addr ffff8881433dba98 by task mount/9827\n\n CPU: 5 UID: 0 PID: 9827 Comm: mount Tainted: G\n OE 6.16.0-rc2-kasan #2 PREEMPT(voluntary)\n Tainted: [O]=OOT_MODULE, [E]=UNSIGNED_MODULE\n Hardware name: Dell Inc. Precision Tower 3620/0MWYPT,\n BIOS 2.13.1 06/14/2019\n Call Trace:\n \u003cTASK\u003e\n dump_stack_lvl+0x9f/0xf0\n print_report+0xd1/0x670\n __virt_addr_valid+0x22c/0x430\n ? parse_server_interfaces+0x14ee/0x1880 [cifs]\n ? kasan_complete_mode_report_info+0x2a/0x1f0\n ? parse_server_interfaces+0x14ee/0x1880 [cifs]\n kasan_report+0xd6/0x110\n parse_server_interfaces+0x14ee/0x1880 [cifs]\n __asan_report_load_n_noabort+0x13/0x20\n parse_server_interfaces+0x14ee/0x1880 [cifs]\n ? __pfx_parse_server_interfaces+0x10/0x10 [cifs]\n ? trace_hardirqs_on+0x51/0x60\n SMB3_request_interfaces+0x1ad/0x3f0 [cifs]\n ? __pfx_SMB3_request_interfaces+0x10/0x10 [cifs]\n ? SMB2_tcon+0x23c/0x15d0 [cifs]\n smb3_qfs_tcon+0x173/0x2b0 [cifs]\n ? __pfx_smb3_qfs_tcon+0x10/0x10 [cifs]\n ? cifs_get_tcon+0x105d/0x2120 [cifs]\n ? do_raw_spin_unlock+0x5d/0x200\n ? cifs_get_tcon+0x105d/0x2120 [cifs]\n ? __pfx_smb3_qfs_tcon+0x10/0x10 [cifs]\n cifs_mount_get_tcon+0x369/0xb90 [cifs]\n ? dfs_cache_find+0xe7/0x150 [cifs]\n dfs_mount_share+0x985/0x2970 [cifs]\n ? check_path.constprop.0+0x28/0x50\n ? save_trace+0x54/0x370\n ? __pfx_dfs_mount_share+0x10/0x10 [cifs]\n ? __lock_acquire+0xb82/0x2ba0\n ? __kasan_check_write+0x18/0x20\n cifs_mount+0xbc/0x9e0 [cifs]\n ? __pfx_cifs_mount+0x10/0x10 [cifs]\n ? do_raw_spin_unlock+0x5d/0x200\n ? cifs_setup_cifs_sb+0x29d/0x810 [cifs]\n cifs_smb3_do_mount+0x263/0x1990 [cifs]",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-38728",
"url": "https://www.suse.com/security/cve/CVE-2025-38728"
},
{
"category": "external",
"summary": "SUSE Bug 1249256 for CVE-2025-38728",
"url": "https://bugzilla.suse.com/1249256"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-19T16:46:47Z",
"details": "moderate"
}
],
"title": "CVE-2025-38728"
},
{
"cve": "CVE-2025-39805",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-39805"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nnet: macb: fix unregister_netdev call order in macb_remove()\n\nWhen removing a macb device, the driver calls phy_exit() before\nunregister_netdev(). This leads to a WARN from kernfs:\n\n ------------[ cut here ]------------\n kernfs: can not remove \u0027attached_dev\u0027, no directory\n WARNING: CPU: 1 PID: 27146 at fs/kernfs/dir.c:1683\n Call trace:\n kernfs_remove_by_name_ns+0xd8/0xf0\n sysfs_remove_link+0x24/0x58\n phy_detach+0x5c/0x168\n phy_disconnect+0x4c/0x70\n phylink_disconnect_phy+0x6c/0xc0 [phylink]\n macb_close+0x6c/0x170 [macb]\n ...\n macb_remove+0x60/0x168 [macb]\n platform_remove+0x5c/0x80\n ...\n\nThe warning happens because the PHY is being exited while the netdev\nis still registered. The correct order is to unregister the netdev\nbefore shutting down the PHY and cleaning up the MDIO bus.\n\nFix this by moving unregister_netdev() ahead of phy_exit() in\nmacb_remove().",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-39805",
"url": "https://www.suse.com/security/cve/CVE-2025-39805"
},
{
"category": "external",
"summary": "SUSE Bug 1249982 for CVE-2025-39805",
"url": "https://bugzilla.suse.com/1249982"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-19T16:46:47Z",
"details": "moderate"
}
],
"title": "CVE-2025-39805"
},
{
"cve": "CVE-2025-39819",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-39819"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nfs/smb: Fix inconsistent refcnt update\n\nA possible inconsistent update of refcount was identified in `smb2_compound_op`.\nSuch inconsistent update could lead to possible resource leaks.\n\nWhy it is a possible bug:\n1. In the comment section of the function, it clearly states that the\nreference to `cfile` should be dropped after calling this function.\n2. Every control flow path would check and drop the reference to\n`cfile`, except the patched one.\n3. Existing callers would not handle refcount update of `cfile` if\n-ENOMEM is returned.\n\nTo fix the bug, an extra goto label \"out\" is added, to make sure that the\ncleanup logic would always be respected. As the problem is caused by the\nallocation failure of `vars`, the cleanup logic between label \"finished\"\nand \"out\" can be safely ignored. According to the definition of function\n`is_replayable_error`, the error code of \"-ENOMEM\" is not recoverable.\nTherefore, the replay logic also gets ignored.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-39819",
"url": "https://www.suse.com/security/cve/CVE-2025-39819"
},
{
"category": "external",
"summary": "SUSE Bug 1250176 for CVE-2025-39819",
"url": "https://bugzilla.suse.com/1250176"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-19T16:46:47Z",
"details": "moderate"
}
],
"title": "CVE-2025-39819"
},
{
"cve": "CVE-2025-39822",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-39822"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nio_uring/kbuf: fix signedness in this_len calculation\n\nWhen importing and using buffers, buf-\u003elen is considered unsigned.\nHowever, buf-\u003elen is converted to signed int when committing. This can\nlead to unexpected behavior if the buffer is large enough to be\ninterpreted as a negative value. Make min_t calculation unsigned.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-39822",
"url": "https://www.suse.com/security/cve/CVE-2025-39822"
},
{
"category": "external",
"summary": "SUSE Bug 1250034 for CVE-2025-39822",
"url": "https://bugzilla.suse.com/1250034"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-19T16:46:47Z",
"details": "moderate"
}
],
"title": "CVE-2025-39822"
},
{
"cve": "CVE-2025-39831",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-39831"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nfbnic: Move phylink resume out of service_task and into open/close\n\nThe fbnic driver was presenting with the following locking assert coming\nout of a PM resume:\n[ 42.208116][ T164] RTNL: assertion failed at drivers/net/phy/phylink.c (2611)\n[ 42.208492][ T164] WARNING: CPU: 1 PID: 164 at drivers/net/phy/phylink.c:2611 phylink_resume+0x190/0x1e0\n[ 42.208872][ T164] Modules linked in:\n[ 42.209140][ T164] CPU: 1 UID: 0 PID: 164 Comm: bash Not tainted 6.17.0-rc2-virtme #134 PREEMPT(full)\n[ 42.209496][ T164] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.17.0-5.fc42 04/01/2014\n[ 42.209861][ T164] RIP: 0010:phylink_resume+0x190/0x1e0\n[ 42.210057][ T164] Code: 83 e5 01 0f 85 b0 fe ff ff c6 05 1c cd 3e 02 01 90 ba 33 0a 00 00 48 c7 c6 20 3a 1d a5 48 c7 c7 e0 3e 1d a5 e8 21 b8 90 fe 90 \u003c0f\u003e 0b 90 90 e9 86 fe ff ff e8 42 ea 1f ff e9 e2 fe ff ff 48 89 ef\n[ 42.210708][ T164] RSP: 0018:ffffc90000affbd8 EFLAGS: 00010296\n[ 42.210983][ T164] RAX: 0000000000000000 RBX: ffff8880078d8400 RCX: 0000000000000000\n[ 42.211235][ T164] RDX: 0000000000000000 RSI: 1ffffffff4f10938 RDI: 0000000000000001\n[ 42.211466][ T164] RBP: 0000000000000000 R08: ffffffffa2ae79ea R09: fffffbfff4b3eb84\n[ 42.211707][ T164] R10: 0000000000000003 R11: 0000000000000000 R12: ffff888007ad8000\n[ 42.211997][ T164] R13: 0000000000000002 R14: ffff888006a18800 R15: ffffffffa34c59e0\n[ 42.212234][ T164] FS: 00007f0dc8e39740(0000) GS:ffff88808f51f000(0000) knlGS:0000000000000000\n[ 42.212505][ T164] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033\n[ 42.212704][ T164] CR2: 00007f0dc8e9fe10 CR3: 000000000b56d003 CR4: 0000000000772ef0\n[ 42.213227][ T164] PKRU: 55555554\n[ 42.213366][ T164] Call Trace:\n[ 42.213483][ T164] \u003cTASK\u003e\n[ 42.213565][ T164] __fbnic_pm_attach.isra.0+0x8e/0xa0\n[ 42.213725][ T164] pci_reset_function+0x116/0x1d0\n[ 42.213895][ T164] reset_store+0xa0/0x100\n[ 42.214025][ T164] ? pci_dev_reset_attr_is_visible+0x50/0x50\n[ 42.214221][ T164] ? sysfs_file_kobj+0xc1/0x1e0\n[ 42.214374][ T164] ? sysfs_kf_write+0x65/0x160\n[ 42.214526][ T164] kernfs_fop_write_iter+0x2f8/0x4c0\n[ 42.214677][ T164] ? kernfs_vma_page_mkwrite+0x1f0/0x1f0\n[ 42.214836][ T164] new_sync_write+0x308/0x6f0\n[ 42.214987][ T164] ? __lock_acquire+0x34c/0x740\n[ 42.215135][ T164] ? new_sync_read+0x6f0/0x6f0\n[ 42.215288][ T164] ? lock_acquire.part.0+0xbc/0x260\n[ 42.215440][ T164] ? ksys_write+0xff/0x200\n[ 42.215590][ T164] ? perf_trace_sched_switch+0x6d0/0x6d0\n[ 42.215742][ T164] vfs_write+0x65e/0xbb0\n[ 42.215876][ T164] ksys_write+0xff/0x200\n[ 42.215994][ T164] ? __ia32_sys_read+0xc0/0xc0\n[ 42.216141][ T164] ? do_user_addr_fault+0x269/0x9f0\n[ 42.216292][ T164] ? rcu_is_watching+0x15/0xd0\n[ 42.216442][ T164] do_syscall_64+0xbb/0x360\n[ 42.216591][ T164] entry_SYSCALL_64_after_hwframe+0x4b/0x53\n[ 42.216784][ T164] RIP: 0033:0x7f0dc8ea9986\n\nA bit of digging showed that we were invoking the phylink_resume as a part\nof the fbnic_up path when we were enabling the service task while not\nholding the RTNL lock. We should be enabling this sooner as a part of the\nndo_open path and then just letting the service task come online later.\nThis will help to enforce the correct locking and brings the phylink\ninterface online at the same time as the network interface, instead of at a\nlater time.\n\nI tested this on QEMU to verify this was working by putting the system to\nsleep using \"echo mem \u003e /sys/power/state\" to put the system to sleep in the\nguest and then using the command \"system_wakeup\" in the QEMU monitor.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-39831",
"url": "https://www.suse.com/security/cve/CVE-2025-39831"
},
{
"category": "external",
"summary": "SUSE Bug 1249977 for CVE-2025-39831",
"url": "https://bugzilla.suse.com/1249977"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-19T16:46:47Z",
"details": "moderate"
}
],
"title": "CVE-2025-39831"
},
{
"cve": "CVE-2025-39859",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-39859"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nptp: ocp: fix use-after-free bugs causing by ptp_ocp_watchdog\n\nThe ptp_ocp_detach() only shuts down the watchdog timer if it is\npending. However, if the timer handler is already running, the\ntimer_delete_sync() is not called. This leads to race conditions\nwhere the devlink that contains the ptp_ocp is deallocated while\nthe timer handler is still accessing it, resulting in use-after-free\nbugs. The following details one of the race scenarios.\n\n(thread 1) | (thread 2)\nptp_ocp_remove() |\n ptp_ocp_detach() | ptp_ocp_watchdog()\n if (timer_pending(\u0026bp-\u003ewatchdog))| bp = timer_container_of()\n timer_delete_sync() |\n |\n devlink_free(devlink) //free |\n | bp-\u003e //use\n\nResolve this by unconditionally calling timer_delete_sync() to ensure\nthe timer is reliably deactivated, preventing any access after free.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-39859",
"url": "https://www.suse.com/security/cve/CVE-2025-39859"
},
{
"category": "external",
"summary": "SUSE Bug 1250252 for CVE-2025-39859",
"url": "https://bugzilla.suse.com/1250252"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-19T16:46:47Z",
"details": "moderate"
}
],
"title": "CVE-2025-39859"
},
{
"cve": "CVE-2025-39897",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-39897"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nnet: xilinx: axienet: Add error handling for RX metadata pointer retrieval\n\nAdd proper error checking for dmaengine_desc_get_metadata_ptr() which\ncan return an error pointer and lead to potential crashes or undefined\nbehaviour if the pointer retrieval fails.\n\nProperly handle the error by unmapping DMA buffer, freeing the skb and\nreturning early to prevent further processing with invalid data.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-39897",
"url": "https://www.suse.com/security/cve/CVE-2025-39897"
},
{
"category": "external",
"summary": "SUSE Bug 1250746 for CVE-2025-39897",
"url": "https://bugzilla.suse.com/1250746"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.6,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-19T16:46:47Z",
"details": "moderate"
}
],
"title": "CVE-2025-39897"
},
{
"cve": "CVE-2025-39917",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-39917"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nbpf: Fix out-of-bounds dynptr write in bpf_crypto_crypt\n\nStanislav reported that in bpf_crypto_crypt() the destination dynptr\u0027s\nsize is not validated to be at least as large as the source dynptr\u0027s\nsize before calling into the crypto backend with \u0027len = src_len\u0027. This\ncan result in an OOB write when the destination is smaller than the\nsource.\n\nConcretely, in mentioned function, psrc and pdst are both linear\nbuffers fetched from each dynptr:\n\n psrc = __bpf_dynptr_data(src, src_len);\n [...]\n pdst = __bpf_dynptr_data_rw(dst, dst_len);\n [...]\n err = decrypt ?\n ctx-\u003etype-\u003edecrypt(ctx-\u003etfm, psrc, pdst, src_len, piv) :\n ctx-\u003etype-\u003eencrypt(ctx-\u003etfm, psrc, pdst, src_len, piv);\n\nThe crypto backend expects pdst to be large enough with a src_len length\nthat can be written. Add an additional src_len \u003e dst_len check and bail\nout if it\u0027s the case. Note that these kfuncs are accessible under root\nprivileges only.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-39917",
"url": "https://www.suse.com/security/cve/CVE-2025-39917"
},
{
"category": "external",
"summary": "SUSE Bug 1250723 for CVE-2025-39917",
"url": "https://bugzilla.suse.com/1250723"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:H/A:N",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-19T16:46:47Z",
"details": "moderate"
}
],
"title": "CVE-2025-39917"
},
{
"cve": "CVE-2025-39944",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-39944"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nocteontx2-pf: Fix use-after-free bugs in otx2_sync_tstamp()\n\nThe original code relies on cancel_delayed_work() in otx2_ptp_destroy(),\nwhich does not ensure that the delayed work item synctstamp_work has fully\ncompleted if it was already running. This leads to use-after-free scenarios\nwhere otx2_ptp is deallocated by otx2_ptp_destroy(), while synctstamp_work\nremains active and attempts to dereference otx2_ptp in otx2_sync_tstamp().\nFurthermore, the synctstamp_work is cyclic, the likelihood of triggering\nthe bug is nonnegligible.\n\nA typical race condition is illustrated below:\n\nCPU 0 (cleanup) | CPU 1 (delayed work callback)\notx2_remove() |\n otx2_ptp_destroy() | otx2_sync_tstamp()\n cancel_delayed_work() |\n kfree(ptp) |\n | ptp = container_of(...); //UAF\n | ptp-\u003e //UAF\n\nThis is confirmed by a KASAN report:\n\nBUG: KASAN: slab-use-after-free in __run_timer_base.part.0+0x7d7/0x8c0\nWrite of size 8 at addr ffff88800aa09a18 by task bash/136\n...\nCall Trace:\n \u003cIRQ\u003e\n dump_stack_lvl+0x55/0x70\n print_report+0xcf/0x610\n ? __run_timer_base.part.0+0x7d7/0x8c0\n kasan_report+0xb8/0xf0\n ? __run_timer_base.part.0+0x7d7/0x8c0\n __run_timer_base.part.0+0x7d7/0x8c0\n ? __pfx___run_timer_base.part.0+0x10/0x10\n ? __pfx_read_tsc+0x10/0x10\n ? ktime_get+0x60/0x140\n ? lapic_next_event+0x11/0x20\n ? clockevents_program_event+0x1d4/0x2a0\n run_timer_softirq+0xd1/0x190\n handle_softirqs+0x16a/0x550\n irq_exit_rcu+0xaf/0xe0\n sysvec_apic_timer_interrupt+0x70/0x80\n \u003c/IRQ\u003e\n...\nAllocated by task 1:\n kasan_save_stack+0x24/0x50\n kasan_save_track+0x14/0x30\n __kasan_kmalloc+0x7f/0x90\n otx2_ptp_init+0xb1/0x860\n otx2_probe+0x4eb/0xc30\n local_pci_probe+0xdc/0x190\n pci_device_probe+0x2fe/0x470\n really_probe+0x1ca/0x5c0\n __driver_probe_device+0x248/0x310\n driver_probe_device+0x44/0x120\n __driver_attach+0xd2/0x310\n bus_for_each_dev+0xed/0x170\n bus_add_driver+0x208/0x500\n driver_register+0x132/0x460\n do_one_initcall+0x89/0x300\n kernel_init_freeable+0x40d/0x720\n kernel_init+0x1a/0x150\n ret_from_fork+0x10c/0x1a0\n ret_from_fork_asm+0x1a/0x30\n\nFreed by task 136:\n kasan_save_stack+0x24/0x50\n kasan_save_track+0x14/0x30\n kasan_save_free_info+0x3a/0x60\n __kasan_slab_free+0x3f/0x50\n kfree+0x137/0x370\n otx2_ptp_destroy+0x38/0x80\n otx2_remove+0x10d/0x4c0\n pci_device_remove+0xa6/0x1d0\n device_release_driver_internal+0xf8/0x210\n pci_stop_bus_device+0x105/0x150\n pci_stop_and_remove_bus_device_locked+0x15/0x30\n remove_store+0xcc/0xe0\n kernfs_fop_write_iter+0x2c3/0x440\n vfs_write+0x871/0xd70\n ksys_write+0xee/0x1c0\n do_syscall_64+0xac/0x280\n entry_SYSCALL_64_after_hwframe+0x77/0x7f\n...\n\nReplace cancel_delayed_work() with cancel_delayed_work_sync() to ensure\nthat the delayed work item is properly canceled before the otx2_ptp is\ndeallocated.\n\nThis bug was initially identified through static analysis. To reproduce\nand test it, I simulated the OcteonTX2 PCI device in QEMU and introduced\nartificial delays within the otx2_sync_tstamp() function to increase the\nlikelihood of triggering the bug.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-39944",
"url": "https://www.suse.com/security/cve/CVE-2025-39944"
},
{
"category": "external",
"summary": "SUSE Bug 1251120 for CVE-2025-39944",
"url": "https://bugzilla.suse.com/1251120"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-19T16:46:47Z",
"details": "moderate"
}
],
"title": "CVE-2025-39944"
},
{
"cve": "CVE-2025-39961",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-39961"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\niommu/amd/pgtbl: Fix possible race while increase page table level\n\nThe AMD IOMMU host page table implementation supports dynamic page table levels\n(up to 6 levels), starting with a 3-level configuration that expands based on\nIOVA address. The kernel maintains a root pointer and current page table level\nto enable proper page table walks in alloc_pte()/fetch_pte() operations.\n\nThe IOMMU IOVA allocator initially starts with 32-bit address and onces its\nexhuasted it switches to 64-bit address (max address is determined based\non IOMMU and device DMA capability). To support larger IOVA, AMD IOMMU\ndriver increases page table level.\n\nBut in unmap path (iommu_v1_unmap_pages()), fetch_pte() reads\npgtable-\u003e[root/mode] without lock. So its possible that in exteme corner case,\nwhen increase_address_space() is updating pgtable-\u003e[root/mode], fetch_pte()\nreads wrong page table level (pgtable-\u003emode). It does compare the value with\nlevel encoded in page table and returns NULL. This will result is\niommu_unmap ops to fail and upper layer may retry/log WARN_ON.\n\nCPU 0 CPU 1\n------ ------\nmap pages unmap pages\nalloc_pte() -\u003e increase_address_space() iommu_v1_unmap_pages() -\u003e fetch_pte()\n pgtable-\u003eroot = pte (new root value)\n READ pgtable-\u003e[mode/root]\n\t\t\t\t\t Reads new root, old mode\n Updates mode (pgtable-\u003emode += 1)\n\nSince Page table level updates are infrequent and already synchronized with a\nspinlock, implement seqcount to enable lock-free read operations on the read path.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-39961",
"url": "https://www.suse.com/security/cve/CVE-2025-39961"
},
{
"category": "external",
"summary": "SUSE Bug 1251817 for CVE-2025-39961",
"url": "https://bugzilla.suse.com/1251817"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.8,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-19T16:46:47Z",
"details": "moderate"
}
],
"title": "CVE-2025-39961"
},
{
"cve": "CVE-2025-39980",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-39980"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nnexthop: Forbid FDB status change while nexthop is in a group\n\nThe kernel forbids the creation of non-FDB nexthop groups with FDB\nnexthops:\n\n # ip nexthop add id 1 via 192.0.2.1 fdb\n # ip nexthop add id 2 group 1\n Error: Non FDB nexthop group cannot have fdb nexthops.\n\nAnd vice versa:\n\n # ip nexthop add id 3 via 192.0.2.2 dev dummy1\n # ip nexthop add id 4 group 3 fdb\n Error: FDB nexthop group can only have fdb nexthops.\n\nHowever, as long as no routes are pointing to a non-FDB nexthop group,\nthe kernel allows changing the type of a nexthop from FDB to non-FDB and\nvice versa:\n\n # ip nexthop add id 5 via 192.0.2.2 dev dummy1\n # ip nexthop add id 6 group 5\n # ip nexthop replace id 5 via 192.0.2.2 fdb\n # echo $?\n 0\n\nThis configuration is invalid and can result in a NPD [1] since FDB\nnexthops are not associated with a nexthop device:\n\n # ip route add 198.51.100.1/32 nhid 6\n # ping 198.51.100.1\n\nFix by preventing nexthop FDB status change while the nexthop is in a\ngroup:\n\n # ip nexthop add id 7 via 192.0.2.2 dev dummy1\n # ip nexthop add id 8 group 7\n # ip nexthop replace id 7 via 192.0.2.2 fdb\n Error: Cannot change nexthop FDB status while in a group.\n\n[1]\nBUG: kernel NULL pointer dereference, address: 00000000000003c0\n[...]\nOops: Oops: 0000 [#1] SMP\nCPU: 6 UID: 0 PID: 367 Comm: ping Not tainted 6.17.0-rc6-virtme-gb65678cacc03 #1 PREEMPT(voluntary)\nHardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.17.0-4.fc41 04/01/2014\nRIP: 0010:fib_lookup_good_nhc+0x1e/0x80\n[...]\nCall Trace:\n \u003cTASK\u003e\n fib_table_lookup+0x541/0x650\n ip_route_output_key_hash_rcu+0x2ea/0x970\n ip_route_output_key_hash+0x55/0x80\n __ip4_datagram_connect+0x250/0x330\n udp_connect+0x2b/0x60\n __sys_connect+0x9c/0xd0\n __x64_sys_connect+0x18/0x20\n do_syscall_64+0xa4/0x2a0\n entry_SYSCALL_64_after_hwframe+0x4b/0x53",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-39980",
"url": "https://www.suse.com/security/cve/CVE-2025-39980"
},
{
"category": "external",
"summary": "SUSE Bug 1252063 for CVE-2025-39980",
"url": "https://bugzilla.suse.com/1252063"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-19T16:46:47Z",
"details": "moderate"
}
],
"title": "CVE-2025-39980"
},
{
"cve": "CVE-2025-39990",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-39990"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nbpf: Check the helper function is valid in get_helper_proto\n\nkernel test robot reported verifier bug [1] where the helper func\npointer could be NULL due to disabled config option.\n\nAs Alexei suggested we could check on that in get_helper_proto\ndirectly. Marking tail_call helper func with BPF_PTR_POISON,\nbecause it is unused by design.\n\n [1] https://lore.kernel.org/oe-lkp/202507160818.68358831-lkp@intel.com",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-39990",
"url": "https://www.suse.com/security/cve/CVE-2025-39990"
},
{
"category": "external",
"summary": "SUSE Bug 1252054 for CVE-2025-39990",
"url": "https://bugzilla.suse.com/1252054"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-19T16:46:47Z",
"details": "moderate"
}
],
"title": "CVE-2025-39990"
},
{
"cve": "CVE-2025-40001",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40001"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nscsi: mvsas: Fix use-after-free bugs in mvs_work_queue\n\nDuring the detaching of Marvell\u0027s SAS/SATA controller, the original code\ncalls cancel_delayed_work() in mvs_free() to cancel the delayed work\nitem mwq-\u003ework_q. However, if mwq-\u003ework_q is already running, the\ncancel_delayed_work() may fail to cancel it. This can lead to\nuse-after-free scenarios where mvs_free() frees the mvs_info while\nmvs_work_queue() is still executing and attempts to access the\nalready-freed mvs_info.\n\nA typical race condition is illustrated below:\n\nCPU 0 (remove) | CPU 1 (delayed work callback)\nmvs_pci_remove() |\n mvs_free() | mvs_work_queue()\n cancel_delayed_work() |\n kfree(mvi) |\n | mvi-\u003e // UAF\n\nReplace cancel_delayed_work() with cancel_delayed_work_sync() to ensure\nthat the delayed work item is properly canceled and any executing\ndelayed work item completes before the mvs_info is deallocated.\n\nThis bug was found by static analysis.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40001",
"url": "https://www.suse.com/security/cve/CVE-2025-40001"
},
{
"category": "external",
"summary": "SUSE Bug 1252303 for CVE-2025-40001",
"url": "https://bugzilla.suse.com/1252303"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.8,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-19T16:46:47Z",
"details": "moderate"
}
],
"title": "CVE-2025-40001"
},
{
"cve": "CVE-2025-40003",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40003"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nnet: mscc: ocelot: Fix use-after-free caused by cyclic delayed work\n\nThe origin code calls cancel_delayed_work() in ocelot_stats_deinit()\nto cancel the cyclic delayed work item ocelot-\u003estats_work. However,\ncancel_delayed_work() may fail to cancel the work item if it is already\nexecuting. While destroy_workqueue() does wait for all pending work items\nin the work queue to complete before destroying the work queue, it cannot\nprevent the delayed work item from being rescheduled within the\nocelot_check_stats_work() function. This limitation exists because the\ndelayed work item is only enqueued into the work queue after its timer\nexpires. Before the timer expiration, destroy_workqueue() has no visibility\nof this pending work item. Once the work queue appears empty,\ndestroy_workqueue() proceeds with destruction. When the timer eventually\nexpires, the delayed work item gets queued again, leading to the following\nwarning:\n\nworkqueue: cannot queue ocelot_check_stats_work on wq ocelot-switch-stats\nWARNING: CPU: 2 PID: 0 at kernel/workqueue.c:2255 __queue_work+0x875/0xaf0\n...\nRIP: 0010:__queue_work+0x875/0xaf0\n...\nRSP: 0018:ffff88806d108b10 EFLAGS: 00010086\nRAX: 0000000000000000 RBX: 0000000000000101 RCX: 0000000000000027\nRDX: 0000000000000027 RSI: 0000000000000004 RDI: ffff88806d123e88\nRBP: ffffffff813c3170 R08: 0000000000000000 R09: ffffed100da247d2\nR10: ffffed100da247d1 R11: ffff88806d123e8b R12: ffff88800c00f000\nR13: ffff88800d7285c0 R14: ffff88806d0a5580 R15: ffff88800d7285a0\nFS: 0000000000000000(0000) GS:ffff8880e5725000(0000) knlGS:0000000000000000\nCS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033\nCR2: 00007fe18e45ea10 CR3: 0000000005e6c000 CR4: 00000000000006f0\nCall Trace:\n \u003cIRQ\u003e\n ? kasan_report+0xc6/0xf0\n ? __pfx_delayed_work_timer_fn+0x10/0x10\n ? __pfx_delayed_work_timer_fn+0x10/0x10\n call_timer_fn+0x25/0x1c0\n __run_timer_base.part.0+0x3be/0x8c0\n ? __pfx_delayed_work_timer_fn+0x10/0x10\n ? rcu_sched_clock_irq+0xb06/0x27d0\n ? __pfx___run_timer_base.part.0+0x10/0x10\n ? try_to_wake_up+0xb15/0x1960\n ? _raw_spin_lock_irq+0x80/0xe0\n ? __pfx__raw_spin_lock_irq+0x10/0x10\n tmigr_handle_remote_up+0x603/0x7e0\n ? __pfx_tmigr_handle_remote_up+0x10/0x10\n ? sched_balance_trigger+0x1c0/0x9f0\n ? sched_tick+0x221/0x5a0\n ? _raw_spin_lock_irq+0x80/0xe0\n ? __pfx__raw_spin_lock_irq+0x10/0x10\n ? tick_nohz_handler+0x339/0x440\n ? __pfx_tmigr_handle_remote_up+0x10/0x10\n __walk_groups.isra.0+0x42/0x150\n tmigr_handle_remote+0x1f4/0x2e0\n ? __pfx_tmigr_handle_remote+0x10/0x10\n ? ktime_get+0x60/0x140\n ? lapic_next_event+0x11/0x20\n ? clockevents_program_event+0x1d4/0x2a0\n ? hrtimer_interrupt+0x322/0x780\n handle_softirqs+0x16a/0x550\n irq_exit_rcu+0xaf/0xe0\n sysvec_apic_timer_interrupt+0x70/0x80\n \u003c/IRQ\u003e\n...\n\nThe following diagram reveals the cause of the above warning:\n\nCPU 0 (remove) | CPU 1 (delayed work callback)\nmscc_ocelot_remove() |\n ocelot_deinit() | ocelot_check_stats_work()\n ocelot_stats_deinit() |\n cancel_delayed_work()| ...\n | queue_delayed_work()\n destroy_workqueue() | (wait a time)\n | __queue_work() //UAF\n\nThe above scenario actually constitutes a UAF vulnerability.\n\nThe ocelot_stats_deinit() is only invoked when initialization\nfailure or resource destruction, so we must ensure that any\ndelayed work items cannot be rescheduled.\n\nReplace cancel_delayed_work() with disable_delayed_work_sync()\nto guarantee proper cancellation of the delayed work item and\nensure completion of any currently executing work before the\nworkqueue is deallocated.\n\nA deadlock concern was considered: ocelot_stats_deinit() is called\nin a process context and is not holding any locks that the delayed\nwork item might also need. Therefore, the use of the _sync() variant\nis safe here.\n\nThis bug was identified through static analysis. To reproduce the\nissue and validate the fix, I simulated ocelot-swit\n---truncated---",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40003",
"url": "https://www.suse.com/security/cve/CVE-2025-40003"
},
{
"category": "external",
"summary": "SUSE Bug 1252301 for CVE-2025-40003",
"url": "https://bugzilla.suse.com/1252301"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-19T16:46:47Z",
"details": "moderate"
}
],
"title": "CVE-2025-40003"
},
{
"cve": "CVE-2025-40006",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40006"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nmm/hugetlb: fix folio is still mapped when deleted\n\nMigration may be raced with fallocating hole. remove_inode_single_folio\nwill unmap the folio if the folio is still mapped. However, it\u0027s called\nwithout folio lock. If the folio is migrated and the mapped pte has been\nconverted to migration entry, folio_mapped() returns false, and won\u0027t\nunmap it. Due to extra refcount held by remove_inode_single_folio,\nmigration fails, restores migration entry to normal pte, and the folio is\nmapped again. As a result, we triggered BUG in filemap_unaccount_folio.\n\nThe log is as follows:\n BUG: Bad page cache in process hugetlb pfn:156c00\n page: refcount:515 mapcount:0 mapping:0000000099fef6e1 index:0x0 pfn:0x156c00\n head: order:9 mapcount:1 entire_mapcount:1 nr_pages_mapped:0 pincount:0\n aops:hugetlbfs_aops ino:dcc dentry name(?):\"my_hugepage_file\"\n flags: 0x17ffffc00000c1(locked|waiters|head|node=0|zone=2|lastcpupid=0x1fffff)\n page_type: f4(hugetlb)\n page dumped because: still mapped when deleted\n CPU: 1 UID: 0 PID: 395 Comm: hugetlb Not tainted 6.17.0-rc5-00044-g7aac71907bde-dirty #484 NONE\n Hardware name: QEMU Ubuntu 24.04 PC (i440FX + PIIX, 1996), BIOS 0.0.0 02/06/2015\n Call Trace:\n \u003cTASK\u003e\n dump_stack_lvl+0x4f/0x70\n filemap_unaccount_folio+0xc4/0x1c0\n __filemap_remove_folio+0x38/0x1c0\n filemap_remove_folio+0x41/0xd0\n remove_inode_hugepages+0x142/0x250\n hugetlbfs_fallocate+0x471/0x5a0\n vfs_fallocate+0x149/0x380\n\nHold folio lock before checking if the folio is mapped to avold race with\nmigration.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40006",
"url": "https://www.suse.com/security/cve/CVE-2025-40006"
},
{
"category": "external",
"summary": "SUSE Bug 1252342 for CVE-2025-40006",
"url": "https://bugzilla.suse.com/1252342"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.7,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-19T16:46:47Z",
"details": "moderate"
}
],
"title": "CVE-2025-40006"
},
{
"cve": "CVE-2025-40021",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40021"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\ntracing: dynevent: Add a missing lockdown check on dynevent\n\nSince dynamic_events interface on tracefs is compatible with\nkprobe_events and uprobe_events, it should also check the lockdown\nstatus and reject if it is set.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40021",
"url": "https://www.suse.com/security/cve/CVE-2025-40021"
},
{
"category": "external",
"summary": "SUSE Bug 1252681 for CVE-2025-40021",
"url": "https://bugzilla.suse.com/1252681"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-19T16:46:47Z",
"details": "moderate"
}
],
"title": "CVE-2025-40021"
},
{
"cve": "CVE-2025-40024",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40024"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nvhost: Take a reference on the task in struct vhost_task.\n\nvhost_task_create() creates a task and keeps a reference to its\ntask_struct. That task may exit early via a signal and its task_struct\nwill be released.\nA pending vhost_task_wake() will then attempt to wake the task and\naccess a task_struct which is no longer there.\n\nAcquire a reference on the task_struct while creating the thread and\nrelease the reference while the struct vhost_task itself is removed.\nIf the task exits early due to a signal, then the vhost_task_wake() will\nstill access a valid task_struct. The wake is safe and will be skipped\nin this case.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40024",
"url": "https://www.suse.com/security/cve/CVE-2025-40024"
},
{
"category": "external",
"summary": "SUSE Bug 1252686 for CVE-2025-40024",
"url": "https://bugzilla.suse.com/1252686"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-19T16:46:47Z",
"details": "moderate"
}
],
"title": "CVE-2025-40024"
},
{
"cve": "CVE-2025-40027",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40027"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nnet/9p: fix double req put in p9_fd_cancelled\n\nSyzkaller reports a KASAN issue as below:\n\ngeneral protection fault, probably for non-canonical address 0xfbd59c0000000021: 0000 [#1] PREEMPT SMP KASAN NOPTI\nKASAN: maybe wild-memory-access in range [0xdead000000000108-0xdead00000000010f]\nCPU: 0 PID: 5083 Comm: syz-executor.2 Not tainted 6.1.134-syzkaller-00037-g855bd1d7d838 #0\nHardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014\nRIP: 0010:__list_del include/linux/list.h:114 [inline]\nRIP: 0010:__list_del_entry include/linux/list.h:137 [inline]\nRIP: 0010:list_del include/linux/list.h:148 [inline]\nRIP: 0010:p9_fd_cancelled+0xe9/0x200 net/9p/trans_fd.c:734\n\nCall Trace:\n \u003cTASK\u003e\n p9_client_flush+0x351/0x440 net/9p/client.c:614\n p9_client_rpc+0xb6b/0xc70 net/9p/client.c:734\n p9_client_version net/9p/client.c:920 [inline]\n p9_client_create+0xb51/0x1240 net/9p/client.c:1027\n v9fs_session_init+0x1f0/0x18f0 fs/9p/v9fs.c:408\n v9fs_mount+0xba/0xcb0 fs/9p/vfs_super.c:126\n legacy_get_tree+0x108/0x220 fs/fs_context.c:632\n vfs_get_tree+0x8e/0x300 fs/super.c:1573\n do_new_mount fs/namespace.c:3056 [inline]\n path_mount+0x6a6/0x1e90 fs/namespace.c:3386\n do_mount fs/namespace.c:3399 [inline]\n __do_sys_mount fs/namespace.c:3607 [inline]\n __se_sys_mount fs/namespace.c:3584 [inline]\n __x64_sys_mount+0x283/0x300 fs/namespace.c:3584\n do_syscall_x64 arch/x86/entry/common.c:51 [inline]\n do_syscall_64+0x35/0x80 arch/x86/entry/common.c:81\n entry_SYSCALL_64_after_hwframe+0x6e/0xd8\n\nThis happens because of a race condition between:\n\n- The 9p client sending an invalid flush request and later cleaning it up;\n- The 9p client in p9_read_work() canceled all pending requests.\n\n Thread 1 Thread 2\n ...\n p9_client_create()\n ...\n p9_fd_create()\n ...\n p9_conn_create()\n ...\n // start Thread 2\n INIT_WORK(\u0026m-\u003erq, p9_read_work);\n p9_read_work()\n ...\n p9_client_rpc()\n ...\n ...\n p9_conn_cancel()\n ...\n spin_lock(\u0026m-\u003ereq_lock);\n ...\n p9_fd_cancelled()\n ...\n ...\n spin_unlock(\u0026m-\u003ereq_lock);\n // status rewrite\n p9_client_cb(m-\u003eclient, req, REQ_STATUS_ERROR)\n // first remove\n list_del(\u0026req-\u003ereq_list);\n ...\n\n spin_lock(\u0026m-\u003ereq_lock)\n ...\n // second remove\n list_del(\u0026req-\u003ereq_list);\n spin_unlock(\u0026m-\u003ereq_lock)\n ...\n\nCommit 74d6a5d56629 (\"9p/trans_fd: Fix concurrency del of req_list in\np9_fd_cancelled/p9_read_work\") fixes a concurrency issue in the 9p filesystem\nclient where the req_list could be deleted simultaneously by both\np9_read_work and p9_fd_cancelled functions, but for the case where req-\u003estatus\nequals REQ_STATUS_RCVD.\n\nUpdate the check for req-\u003estatus in p9_fd_cancelled to skip processing not\njust received requests, but anything that is not SENT, as whatever\nchanged the state from SENT also removed the request from its list.\n\nFound by Linux Verification Center (linuxtesting.org) with Syzkaller.\n\n[updated the check from status == RECV || status == ERROR to status != SENT]",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40027",
"url": "https://www.suse.com/security/cve/CVE-2025-40027"
},
{
"category": "external",
"summary": "SUSE Bug 1252763 for CVE-2025-40027",
"url": "https://bugzilla.suse.com/1252763"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-19T16:46:47Z",
"details": "moderate"
}
],
"title": "CVE-2025-40027"
},
{
"cve": "CVE-2025-40031",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40031"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\ntee: fix register_shm_helper()\n\nIn register_shm_helper(), fix incorrect error handling for a call to\niov_iter_extract_pages(). A case is missing for when\niov_iter_extract_pages() only got some pages and return a number larger\nthan 0, but not the requested amount.\n\nThis fixes a possible NULL pointer dereference following a bad input from\nioctl(TEE_IOC_SHM_REGISTER) where parts of the buffer isn\u0027t mapped.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40031",
"url": "https://www.suse.com/security/cve/CVE-2025-40031"
},
{
"category": "external",
"summary": "SUSE Bug 1252779 for CVE-2025-40031",
"url": "https://bugzilla.suse.com/1252779"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-19T16:46:47Z",
"details": "moderate"
}
],
"title": "CVE-2025-40031"
},
{
"cve": "CVE-2025-40033",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40033"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nremoteproc: pru: Fix potential NULL pointer dereference in pru_rproc_set_ctable()\n\npru_rproc_set_ctable() accessed rproc-\u003epriv before the IS_ERR_OR_NULL\ncheck, which could lead to a null pointer dereference. Move the pru\nassignment, ensuring we never dereference a NULL rproc pointer.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40033",
"url": "https://www.suse.com/security/cve/CVE-2025-40033"
},
{
"category": "external",
"summary": "SUSE Bug 1252824 for CVE-2025-40033",
"url": "https://bugzilla.suse.com/1252824"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-19T16:46:47Z",
"details": "moderate"
}
],
"title": "CVE-2025-40033"
},
{
"cve": "CVE-2025-40038",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40038"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nKVM: SVM: Skip fastpath emulation on VM-Exit if next RIP isn\u0027t valid\n\nSkip the WRMSR and HLT fastpaths in SVM\u0027s VM-Exit handler if the next RIP\nisn\u0027t valid, e.g. because KVM is running with nrips=false. SVM must\ndecode and emulate to skip the instruction if the CPU doesn\u0027t provide the\nnext RIP, and getting the instruction bytes to decode requires reading\nguest memory. Reading guest memory through the emulator can fault, i.e.\ncan sleep, which is disallowed since the fastpath handlers run with IRQs\ndisabled.\n\n BUG: sleeping function called from invalid context at ./include/linux/uaccess.h:106\n in_atomic(): 1, irqs_disabled(): 1, non_block: 0, pid: 32611, name: qemu\n preempt_count: 1, expected: 0\n INFO: lockdep is turned off.\n irq event stamp: 30580\n hardirqs last enabled at (30579): [\u003cffffffffc08b2527\u003e] vcpu_run+0x1787/0x1db0 [kvm]\n hardirqs last disabled at (30580): [\u003cffffffffb4f62e32\u003e] __schedule+0x1e2/0xed0\n softirqs last enabled at (30570): [\u003cffffffffb4247a64\u003e] fpu_swap_kvm_fpstate+0x44/0x210\n softirqs last disabled at (30568): [\u003cffffffffb4247a64\u003e] fpu_swap_kvm_fpstate+0x44/0x210\n CPU: 298 UID: 0 PID: 32611 Comm: qemu Tainted: G U 6.16.0-smp--e6c618b51cfe-sleep #782 NONE\n Tainted: [U]=USER\n Hardware name: Google Astoria-Turin/astoria, BIOS 0.20241223.2-0 01/17/2025\n Call Trace:\n \u003cTASK\u003e\n dump_stack_lvl+0x7d/0xb0\n __might_resched+0x271/0x290\n __might_fault+0x28/0x80\n kvm_vcpu_read_guest_page+0x8d/0xc0 [kvm]\n kvm_fetch_guest_virt+0x92/0xc0 [kvm]\n __do_insn_fetch_bytes+0xf3/0x1e0 [kvm]\n x86_decode_insn+0xd1/0x1010 [kvm]\n x86_emulate_instruction+0x105/0x810 [kvm]\n __svm_skip_emulated_instruction+0xc4/0x140 [kvm_amd]\n handle_fastpath_invd+0xc4/0x1a0 [kvm]\n vcpu_run+0x11a1/0x1db0 [kvm]\n kvm_arch_vcpu_ioctl_run+0x5cc/0x730 [kvm]\n kvm_vcpu_ioctl+0x578/0x6a0 [kvm]\n __se_sys_ioctl+0x6d/0xb0\n do_syscall_64+0x8a/0x2c0\n entry_SYSCALL_64_after_hwframe+0x4b/0x53\n RIP: 0033:0x7f479d57a94b\n \u003c/TASK\u003e\n\nNote, this is essentially a reapply of commit 5c30e8101e8d (\"KVM: SVM:\nSkip WRMSR fastpath on VM-Exit if next RIP isn\u0027t valid\"), but with\ndifferent justification (KVM now grabs SRCU when skipping the instruction\nfor other reasons).",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40038",
"url": "https://www.suse.com/security/cve/CVE-2025-40038"
},
{
"category": "external",
"summary": "SUSE Bug 1252817 for CVE-2025-40038",
"url": "https://bugzilla.suse.com/1252817"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-19T16:46:47Z",
"details": "moderate"
}
],
"title": "CVE-2025-40038"
},
{
"cve": "CVE-2025-40047",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40047"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nio_uring/waitid: always prune wait queue entry in io_waitid_wait()\n\nFor a successful return, always remove our entry from the wait queue\nentry list. Previously this was skipped if a cancelation was in\nprogress, but this can race with another invocation of the wait queue\nentry callback.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40047",
"url": "https://www.suse.com/security/cve/CVE-2025-40047"
},
{
"category": "external",
"summary": "SUSE Bug 1252790 for CVE-2025-40047",
"url": "https://bugzilla.suse.com/1252790"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.7,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-19T16:46:47Z",
"details": "moderate"
}
],
"title": "CVE-2025-40047"
},
{
"cve": "CVE-2025-40053",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40053"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nnet: dlink: handle copy_thresh allocation failure\n\nThe driver did not handle failure of `netdev_alloc_skb_ip_align()`.\nIf the allocation failed, dereferencing `skb-\u003eprotocol` could lead to\na NULL pointer dereference.\n\nThis patch tries to allocate `skb`. If the allocation fails, it falls\nback to the normal path.\n\nTested-on: D-Link DGE-550T Rev-A3",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40053",
"url": "https://www.suse.com/security/cve/CVE-2025-40053"
},
{
"category": "external",
"summary": "SUSE Bug 1252808 for CVE-2025-40053",
"url": "https://bugzilla.suse.com/1252808"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-19T16:46:47Z",
"details": "moderate"
}
],
"title": "CVE-2025-40053"
},
{
"cve": "CVE-2025-40055",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40055"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nocfs2: fix double free in user_cluster_connect()\n\nuser_cluster_disconnect() frees \"conn-\u003ecc_private\" which is \"lc\" but then\nthe error handling frees \"lc\" a second time. Set \"lc\" to NULL on this\npath to avoid a double free.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40055",
"url": "https://www.suse.com/security/cve/CVE-2025-40055"
},
{
"category": "external",
"summary": "SUSE Bug 1252821 for CVE-2025-40055",
"url": "https://bugzilla.suse.com/1252821"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-19T16:46:47Z",
"details": "moderate"
}
],
"title": "CVE-2025-40055"
},
{
"cve": "CVE-2025-40059",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40059"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\ncoresight: Fix incorrect handling for return value of devm_kzalloc\n\nThe return value of devm_kzalloc could be an null pointer,\nuse \"!desc.pdata\" to fix incorrect handling return value\nof devm_kzalloc.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40059",
"url": "https://www.suse.com/security/cve/CVE-2025-40059"
},
{
"category": "external",
"summary": "SUSE Bug 1252809 for CVE-2025-40059",
"url": "https://bugzilla.suse.com/1252809"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-19T16:46:47Z",
"details": "moderate"
}
],
"title": "CVE-2025-40059"
},
{
"cve": "CVE-2025-40064",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40064"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nsmc: Fix use-after-free in __pnet_find_base_ndev().\n\nsyzbot reported use-after-free of net_device in __pnet_find_base_ndev(),\nwhich was called during connect(). [0]\n\nsmc_pnet_find_ism_resource() fetches sk_dst_get(sk)-\u003edev and passes\ndown to pnet_find_base_ndev(), where RTNL is held. Then, UAF happened\nat __pnet_find_base_ndev() when the dev is first used.\n\nThis means dev had already been freed before acquiring RTNL in\npnet_find_base_ndev().\n\nWhile dev is going away, dst-\u003edev could be swapped with blackhole_netdev,\nand the dev\u0027s refcnt by dst will be released.\n\nWe must hold dev\u0027s refcnt before calling smc_pnet_find_ism_resource().\n\nAlso, smc_pnet_find_roce_resource() has the same problem.\n\nLet\u0027s use __sk_dst_get() and dst_dev_rcu() in the two functions.\n\n[0]:\nBUG: KASAN: use-after-free in __pnet_find_base_ndev+0x1b1/0x1c0 net/smc/smc_pnet.c:926\nRead of size 1 at addr ffff888036bac33a by task syz.0.3632/18609\n\nCPU: 1 UID: 0 PID: 18609 Comm: syz.0.3632 Not tainted syzkaller #0 PREEMPT(full)\nHardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/18/2025\nCall Trace:\n \u003cTASK\u003e\n dump_stack_lvl+0x189/0x250 lib/dump_stack.c:120\n print_address_description mm/kasan/report.c:378 [inline]\n print_report+0xca/0x240 mm/kasan/report.c:482\n kasan_report+0x118/0x150 mm/kasan/report.c:595\n __pnet_find_base_ndev+0x1b1/0x1c0 net/smc/smc_pnet.c:926\n pnet_find_base_ndev net/smc/smc_pnet.c:946 [inline]\n smc_pnet_find_ism_by_pnetid net/smc/smc_pnet.c:1103 [inline]\n smc_pnet_find_ism_resource+0xef/0x390 net/smc/smc_pnet.c:1154\n smc_find_ism_device net/smc/af_smc.c:1030 [inline]\n smc_find_proposal_devices net/smc/af_smc.c:1115 [inline]\n __smc_connect+0x372/0x1890 net/smc/af_smc.c:1545\n smc_connect+0x877/0xd90 net/smc/af_smc.c:1715\n __sys_connect_file net/socket.c:2086 [inline]\n __sys_connect+0x313/0x440 net/socket.c:2105\n __do_sys_connect net/socket.c:2111 [inline]\n __se_sys_connect net/socket.c:2108 [inline]\n __x64_sys_connect+0x7a/0x90 net/socket.c:2108\n do_syscall_x64 arch/x86/entry/syscall_64.c:63 [inline]\n do_syscall_64+0xfa/0x3b0 arch/x86/entry/syscall_64.c:94\n entry_SYSCALL_64_after_hwframe+0x77/0x7f\nRIP: 0033:0x7f47cbf8eba9\nCode: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 \u003c48\u003e 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48\nRSP: 002b:00007f47ccdb1038 EFLAGS: 00000246 ORIG_RAX: 000000000000002a\nRAX: ffffffffffffffda RBX: 00007f47cc1d5fa0 RCX: 00007f47cbf8eba9\nRDX: 0000000000000010 RSI: 0000200000000280 RDI: 000000000000000b\nRBP: 00007f47cc011e19 R08: 0000000000000000 R09: 0000000000000000\nR10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000\nR13: 00007f47cc1d6038 R14: 00007f47cc1d5fa0 R15: 00007ffc512f8aa8\n \u003c/TASK\u003e\n\nThe buggy address belongs to the physical page:\npage: refcount:0 mapcount:0 mapping:0000000000000000 index:0xffff888036bacd00 pfn:0x36bac\nflags: 0xfff00000000000(node=0|zone=1|lastcpupid=0x7ff)\nraw: 00fff00000000000 ffffea0001243d08 ffff8880b863fdc0 0000000000000000\nraw: ffff888036bacd00 0000000000000000 00000000ffffffff 0000000000000000\npage dumped because: kasan: bad access detected\npage_owner tracks the page as freed\npage last allocated via order 2, migratetype Unmovable, gfp_mask 0x446dc0(GFP_KERNEL_ACCOUNT|__GFP_ZERO|__GFP_NOWARN|__GFP_RETRY_MAYFAIL|__GFP_COMP), pid 16741, tgid 16741 (syz-executor), ts 343313197788, free_ts 380670750466\n set_page_owner include/linux/page_owner.h:32 [inline]\n post_alloc_hook+0x240/0x2a0 mm/page_alloc.c:1851\n prep_new_page mm/page_alloc.c:1859 [inline]\n get_page_from_freelist+0x21e4/0x22c0 mm/page_alloc.c:3858\n __alloc_frozen_pages_noprof+0x181/0x370 mm/page_alloc.c:5148\n alloc_pages_mpol+0x232/0x4a0 mm/mempolicy.c:2416\n ___kmalloc_large_node+0x5f/0x1b0 mm/slub.c:4317\n __kmalloc_large_node_noprof+0x18/0x90 mm/slub.c:4348\n __do_kmalloc_node mm/slub.c:4364 [inline]\n __kvmalloc_node\n---truncated---",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40064",
"url": "https://www.suse.com/security/cve/CVE-2025-40064"
},
{
"category": "external",
"summary": "SUSE Bug 1252845 for CVE-2025-40064",
"url": "https://bugzilla.suse.com/1252845"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-19T16:46:47Z",
"details": "moderate"
}
],
"title": "CVE-2025-40064"
},
{
"cve": "CVE-2025-40070",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40070"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\npps: fix warning in pps_register_cdev when register device fail\n\nSimilar to previous commit 2a934fdb01db (\"media: v4l2-dev: fix error\nhandling in __video_register_device()\"), the release hook should be set\nbefore device_register(). Otherwise, when device_register() return error\nand put_device() try to callback the release function, the below warning\nmay happen.\n\n ------------[ cut here ]------------\n WARNING: CPU: 1 PID: 4760 at drivers/base/core.c:2567 device_release+0x1bd/0x240 drivers/base/core.c:2567\n Modules linked in:\n CPU: 1 UID: 0 PID: 4760 Comm: syz.4.914 Not tainted 6.17.0-rc3+ #1 NONE\n RIP: 0010:device_release+0x1bd/0x240 drivers/base/core.c:2567\n Call Trace:\n \u003cTASK\u003e\n kobject_cleanup+0x136/0x410 lib/kobject.c:689\n kobject_release lib/kobject.c:720 [inline]\n kref_put include/linux/kref.h:65 [inline]\n kobject_put+0xe9/0x130 lib/kobject.c:737\n put_device+0x24/0x30 drivers/base/core.c:3797\n pps_register_cdev+0x2da/0x370 drivers/pps/pps.c:402\n pps_register_source+0x2f6/0x480 drivers/pps/kapi.c:108\n pps_tty_open+0x190/0x310 drivers/pps/clients/pps-ldisc.c:57\n tty_ldisc_open+0xa7/0x120 drivers/tty/tty_ldisc.c:432\n tty_set_ldisc+0x333/0x780 drivers/tty/tty_ldisc.c:563\n tiocsetd drivers/tty/tty_io.c:2429 [inline]\n tty_ioctl+0x5d1/0x1700 drivers/tty/tty_io.c:2728\n vfs_ioctl fs/ioctl.c:51 [inline]\n __do_sys_ioctl fs/ioctl.c:598 [inline]\n __se_sys_ioctl fs/ioctl.c:584 [inline]\n __x64_sys_ioctl+0x194/0x210 fs/ioctl.c:584\n do_syscall_x64 arch/x86/entry/syscall_64.c:63 [inline]\n do_syscall_64+0x5f/0x2a0 arch/x86/entry/syscall_64.c:94\n entry_SYSCALL_64_after_hwframe+0x76/0x7e\n \u003c/TASK\u003e\n\nBefore commit c79a39dc8d06 (\"pps: Fix a use-after-free\"),\npps_register_cdev() call device_create() to create pps-\u003edev, which will\ninit dev-\u003erelease to device_create_release(). Now the comment is outdated,\njust remove it.\n\nThanks for the reminder from Calvin Owens, \u0027kfree_pps\u0027 should be removed\nin pps_register_source() to avoid a double free in the failure case.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40070",
"url": "https://www.suse.com/security/cve/CVE-2025-40070"
},
{
"category": "external",
"summary": "SUSE Bug 1252836 for CVE-2025-40070",
"url": "https://bugzilla.suse.com/1252836"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-19T16:46:47Z",
"details": "moderate"
}
],
"title": "CVE-2025-40070"
},
{
"cve": "CVE-2025-40074",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40074"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nipv4: start using dst_dev_rcu()\n\nChange icmpv4_xrlim_allow(), ip_defrag() to prevent possible UAF.\n\nChange ipmr_prepare_xmit(), ipmr_queue_fwd_xmit(), ip_mr_output(),\nipv4_neigh_lookup() to use lockdep enabled dst_dev_rcu().",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40074",
"url": "https://www.suse.com/security/cve/CVE-2025-40074"
},
{
"category": "external",
"summary": "SUSE Bug 1252794 for CVE-2025-40074",
"url": "https://bugzilla.suse.com/1252794"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-19T16:46:47Z",
"details": "moderate"
}
],
"title": "CVE-2025-40074"
},
{
"cve": "CVE-2025-40075",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40075"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\ntcp_metrics: use dst_dev_net_rcu()\n\nReplace three dst_dev() with a lockdep enabled helper.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40075",
"url": "https://www.suse.com/security/cve/CVE-2025-40075"
},
{
"category": "external",
"summary": "SUSE Bug 1252795 for CVE-2025-40075",
"url": "https://bugzilla.suse.com/1252795"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-19T16:46:47Z",
"details": "moderate"
}
],
"title": "CVE-2025-40075"
},
{
"cve": "CVE-2025-40081",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40081"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nperf: arm_spe: Prevent overflow in PERF_IDX2OFF()\n\nCast nr_pages to unsigned long to avoid overflow when handling large\nAUX buffer sizes (\u003e= 2 GiB).",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40081",
"url": "https://www.suse.com/security/cve/CVE-2025-40081"
},
{
"category": "external",
"summary": "SUSE Bug 1252776 for CVE-2025-40081",
"url": "https://bugzilla.suse.com/1252776"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-19T16:46:47Z",
"details": "moderate"
}
],
"title": "CVE-2025-40081"
},
{
"cve": "CVE-2025-40083",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40083"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nnet/sched: sch_qfq: Fix null-deref in agg_dequeue\n\nTo prevent a potential crash in agg_dequeue (net/sched/sch_qfq.c)\nwhen cl-\u003eqdisc-\u003eops-\u003epeek(cl-\u003eqdisc) returns NULL, we check the return\nvalue before using it, similar to the existing approach in sch_hfsc.c.\n\nTo avoid code duplication, the following changes are made:\n\n1. Changed qdisc_warn_nonwc(include/net/pkt_sched.h) into a static\ninline function.\n\n2. Moved qdisc_peek_len from net/sched/sch_hfsc.c to\ninclude/net/pkt_sched.h so that sch_qfq can reuse it.\n\n3. Applied qdisc_peek_len in agg_dequeue to avoid crashing.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40083",
"url": "https://www.suse.com/security/cve/CVE-2025-40083"
},
{
"category": "external",
"summary": "SUSE Bug 1252912 for CVE-2025-40083",
"url": "https://bugzilla.suse.com/1252912"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-19T16:46:47Z",
"details": "moderate"
}
],
"title": "CVE-2025-40083"
},
{
"cve": "CVE-2025-40086",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40086"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\ndrm/xe: Don\u0027t allow evicting of BOs in same VM in array of VM binds\n\nAn array of VM binds can potentially evict other buffer objects (BOs)\nwithin the same VM under certain conditions, which may lead to NULL\npointer dereferences later in the bind pipeline. To prevent this, clear\nthe allow_res_evict flag in the xe_bo_validate call.\n\nv2:\n - Invert polarity of no_res_evict (Thomas)\n - Add comment in code explaining issue (Thomas)\n\n(cherry picked from commit 8b9ba8d6d95fe75fed6b0480bb03da4b321bea08)",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40086",
"url": "https://www.suse.com/security/cve/CVE-2025-40086"
},
{
"category": "external",
"summary": "SUSE Bug 1252923 for CVE-2025-40086",
"url": "https://bugzilla.suse.com/1252923"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.1,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-19T16:46:47Z",
"details": "moderate"
}
],
"title": "CVE-2025-40086"
},
{
"cve": "CVE-2025-40098",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40098"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nALSA: hda: cs35l41: Fix NULL pointer dereference in cs35l41_get_acpi_mute_state()\n\nReturn value of a function acpi_evaluate_dsm() is dereferenced without\nchecking for NULL, but it is usually checked for this function.\n\nacpi_evaluate_dsm() may return NULL, when acpi_evaluate_object() returns\nacpi_status other than ACPI_SUCCESS, so add a check to prevent the crach.\n\nFound by Linux Verification Center (linuxtesting.org) with SVACE.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40098",
"url": "https://www.suse.com/security/cve/CVE-2025-40098"
},
{
"category": "external",
"summary": "SUSE Bug 1252917 for CVE-2025-40098",
"url": "https://bugzilla.suse.com/1252917"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-19T16:46:47Z",
"details": "moderate"
}
],
"title": "CVE-2025-40098"
},
{
"cve": "CVE-2025-40101",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40101"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nbtrfs: fix memory leaks when rejecting a non SINGLE data profile without an RST\n\nAt the end of btrfs_load_block_group_zone_info() the first thing we do\nis to ensure that if the mapping type is not a SINGLE one and there is\nno RAID stripe tree, then we return early with an error.\n\nDoing that, though, prevents the code from running the last calls from\nthis function which are about freeing memory allocated during its\nrun. Hence, in this case, instead of returning early, we set the ret\nvalue and fall through the rest of the cleanup code.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40101",
"url": "https://www.suse.com/security/cve/CVE-2025-40101"
},
{
"category": "external",
"summary": "SUSE Bug 1252901 for CVE-2025-40101",
"url": "https://bugzilla.suse.com/1252901"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 3.3,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-19T16:46:47Z",
"details": "low"
}
],
"title": "CVE-2025-40101"
},
{
"cve": "CVE-2025-40102",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40102"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nKVM: arm64: Prevent access to vCPU events before init\n\nAnother day, another syzkaller bug. KVM erroneously allows userspace to\npend vCPU events for a vCPU that hasn\u0027t been initialized yet, leading to\nKVM interpreting a bunch of uninitialized garbage for routing /\ninjecting the exception.\n\nIn one case the injection code and the hyp disagree on whether the vCPU\nhas a 32bit EL1 and put the vCPU into an illegal mode for AArch64,\ntripping the BUG() in exception_target_el() during the next injection:\n\n kernel BUG at arch/arm64/kvm/inject_fault.c:40!\n Internal error: Oops - BUG: 00000000f2000800 [#1] SMP\n CPU: 3 UID: 0 PID: 318 Comm: repro Not tainted 6.17.0-rc4-00104-g10fd0285305d #6 PREEMPT\n Hardware name: linux,dummy-virt (DT)\n pstate: 21402009 (nzCv daif +PAN -UAO -TCO +DIT -SSBS BTYPE=--)\n pc : exception_target_el+0x88/0x8c\n lr : pend_serror_exception+0x18/0x13c\n sp : ffff800082f03a10\n x29: ffff800082f03a10 x28: ffff0000cb132280 x27: 0000000000000000\n x26: 0000000000000000 x25: ffff0000c2a99c20 x24: 0000000000000000\n x23: 0000000000008000 x22: 0000000000000002 x21: 0000000000000004\n x20: 0000000000008000 x19: ffff0000c2a99c20 x18: 0000000000000000\n x17: 0000000000000000 x16: 0000000000000000 x15: 00000000200000c0\n x14: 0000000000000000 x13: 0000000000000000 x12: 0000000000000000\n x11: 0000000000000000 x10: 0000000000000000 x9 : 0000000000000000\n x8 : ffff800082f03af8 x7 : 0000000000000000 x6 : 0000000000000000\n x5 : ffff800080f621f0 x4 : 0000000000000000 x3 : 0000000000000000\n x2 : 000000000040009b x1 : 0000000000000003 x0 : ffff0000c2a99c20\n Call trace:\n exception_target_el+0x88/0x8c (P)\n kvm_inject_serror_esr+0x40/0x3b4\n __kvm_arm_vcpu_set_events+0xf0/0x100\n kvm_arch_vcpu_ioctl+0x180/0x9d4\n kvm_vcpu_ioctl+0x60c/0x9f4\n __arm64_sys_ioctl+0xac/0x104\n invoke_syscall+0x48/0x110\n el0_svc_common.constprop.0+0x40/0xe0\n do_el0_svc+0x1c/0x28\n el0_svc+0x34/0xf0\n el0t_64_sync_handler+0xa0/0xe4\n el0t_64_sync+0x198/0x19c\n Code: f946bc01 b4fffe61 9101e020 17fffff2 (d4210000)\n\nReject the ioctls outright as no sane VMM would call these before\nKVM_ARM_VCPU_INIT anyway. Even if it did the exception would\u0027ve been\nthrown away by the eventual reset of the vCPU\u0027s state.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40102",
"url": "https://www.suse.com/security/cve/CVE-2025-40102"
},
{
"category": "external",
"summary": "SUSE Bug 1252919 for CVE-2025-40102",
"url": "https://bugzilla.suse.com/1252919"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 0,
"baseSeverity": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:N",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-19T16:46:47Z",
"details": "moderate"
}
],
"title": "CVE-2025-40102"
},
{
"cve": "CVE-2025-40105",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40105"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nvfs: Don\u0027t leak disconnected dentries on umount\n\nWhen user calls open_by_handle_at() on some inode that is not cached, we\nwill create disconnected dentry for it. If such dentry is a directory,\nexportfs_decode_fh_raw() will then try to connect this dentry to the\ndentry tree through reconnect_path(). It may happen for various reasons\n(such as corrupted fs or race with rename) that the call to\nlookup_one_unlocked() in reconnect_one() will fail to find the dentry we\nare trying to reconnect and instead create a new dentry under the\nparent. Now this dentry will not be marked as disconnected although the\nparent still may well be disconnected (at least in case this\ninconsistency happened because the fs is corrupted and .. doesn\u0027t point\nto the real parent directory). This creates inconsistency in\ndisconnected flags but AFAICS it was mostly harmless. At least until\ncommit f1ee616214cb (\"VFS: don\u0027t keep disconnected dentries on d_anon\")\nwhich removed adding of most disconnected dentries to sb-\u003es_anon list.\nThus after this commit cleanup of disconnected dentries implicitely\nrelies on the fact that dput() will immediately reclaim such dentries.\nHowever when some leaf dentry isn\u0027t marked as disconnected, as in the\nscenario described above, the reclaim doesn\u0027t happen and the dentries\nare \"leaked\". Memory reclaim can eventually reclaim them but otherwise\nthey stay in memory and if umount comes first, we hit infamous \"Busy\ninodes after unmount\" bug. Make sure all dentries created under a\ndisconnected parent are marked as disconnected as well.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40105",
"url": "https://www.suse.com/security/cve/CVE-2025-40105"
},
{
"category": "external",
"summary": "SUSE Bug 1252928 for CVE-2025-40105",
"url": "https://bugzilla.suse.com/1252928"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 3.3,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-19T16:46:47Z",
"details": "low"
}
],
"title": "CVE-2025-40105"
},
{
"cve": "CVE-2025-40107",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40107"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\ncan: hi311x: fix null pointer dereference when resuming from sleep before interface was enabled\n\nThis issue is similar to the vulnerability in the `mcp251x` driver,\nwhich was fixed in commit 03c427147b2d (\"can: mcp251x: fix resume from\nsleep before interface was brought up\").\n\nIn the `hi311x` driver, when the device resumes from sleep, the driver\nschedules `priv-\u003erestart_work`. However, if the network interface was\nnot previously enabled, the `priv-\u003ewq` (workqueue) is not allocated and\ninitialized, leading to a null pointer dereference.\n\nTo fix this, we move the allocation and initialization of the workqueue\nfrom the `hi3110_open` function to the `hi3110_can_probe` function.\nThis ensures that the workqueue is properly initialized before it is\nused during device resume. And added logic to destroy the workqueue\nin the error handling paths of `hi3110_can_probe` and in the\n`hi3110_can_remove` function to prevent resource leaks.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40107",
"url": "https://www.suse.com/security/cve/CVE-2025-40107"
},
{
"category": "external",
"summary": "SUSE Bug 1253018 for CVE-2025-40107",
"url": "https://bugzilla.suse.com/1253018"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-19T16:46:47Z",
"details": "moderate"
}
],
"title": "CVE-2025-40107"
},
{
"cve": "CVE-2025-40109",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40109"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\ncrypto: rng - Ensure set_ent is always present\n\nEnsure that set_ent is always set since only drbg provides it.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40109",
"url": "https://www.suse.com/security/cve/CVE-2025-40109"
},
{
"category": "external",
"summary": "SUSE Bug 1253176 for CVE-2025-40109",
"url": "https://bugzilla.suse.com/1253176"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-19T16:46:47Z",
"details": "moderate"
}
],
"title": "CVE-2025-40109"
},
{
"cve": "CVE-2025-40110",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40110"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\ndrm/vmwgfx: Fix a null-ptr access in the cursor snooper\n\nCheck that the resource which is converted to a surface exists before\ntrying to use the cursor snooper on it.\n\nvmw_cmd_res_check allows explicit invalid (SVGA3D_INVALID_ID) identifiers\nbecause some svga commands accept SVGA3D_INVALID_ID to mean \"no surface\",\nunfortunately functions that accept the actual surfaces as objects might\n(and in case of the cursor snooper, do not) be able to handle null\nobjects. Make sure that we validate not only the identifier (via the\nvmw_cmd_res_check) but also check that the actual resource exists before\ntrying to do something with it.\n\nFixes unchecked null-ptr reference in the snooping code.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40110",
"url": "https://www.suse.com/security/cve/CVE-2025-40110"
},
{
"category": "external",
"summary": "SUSE Bug 1253275 for CVE-2025-40110",
"url": "https://bugzilla.suse.com/1253275"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.1,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-19T16:46:47Z",
"details": "moderate"
}
],
"title": "CVE-2025-40110"
},
{
"cve": "CVE-2025-40111",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40111"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\ndrm/vmwgfx: Fix Use-after-free in validation\n\nNodes stored in the validation duplicates hashtable come from an arena\nallocator that is cleared at the end of vmw_execbuf_process. All nodes\nare expected to be cleared in vmw_validation_drop_ht but this node escaped\nbecause its resource was destroyed prematurely.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40111",
"url": "https://www.suse.com/security/cve/CVE-2025-40111"
},
{
"category": "external",
"summary": "SUSE Bug 1253362 for CVE-2025-40111",
"url": "https://bugzilla.suse.com/1253362"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.7,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:L/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-19T16:46:47Z",
"details": "moderate"
}
],
"title": "CVE-2025-40111"
},
{
"cve": "CVE-2025-40115",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40115"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nscsi: mpt3sas: Fix crash in transport port remove by using ioc_info()\n\nDuring mpt3sas_transport_port_remove(), messages were logged with\ndev_printk() against \u0026mpt3sas_port-\u003eport-\u003edev. At this point the SAS\ntransport device may already be partially unregistered or freed, leading\nto a crash when accessing its struct device.\n\nUsing ioc_info(), which logs via the PCI device (ioc-\u003epdev-\u003edev),\nguaranteed to remain valid until driver removal.\n\n[83428.295776] Oops: general protection fault, probably for non-canonical address 0x6f702f323a33312d: 0000 [#1] SMP NOPTI\n[83428.295785] CPU: 145 UID: 0 PID: 113296 Comm: rmmod Kdump: loaded Tainted: G OE 6.16.0-rc1+ #1 PREEMPT(voluntary)\n[83428.295792] Tainted: [O]=OOT_MODULE, [E]=UNSIGNED_MODULE\n[83428.295795] Hardware name: Dell Inc. Precision 7875 Tower/, BIOS 89.1.67 02/23/2024\n[83428.295799] RIP: 0010:__dev_printk+0x1f/0x70\n[83428.295805] Code: 90 90 90 90 90 90 90 90 90 90 90 0f 1f 44 00 00 49 89 d1 48 85 f6 74 52 4c 8b 46 50 4d 85 c0 74 1f 48 8b 46 68 48 85 c0 74 22 \u003c48\u003e 8b 08 0f b6 7f 01 48 c7 c2 db e8 42 ad 83 ef 30 e9 7b f8 ff ff\n[83428.295813] RSP: 0018:ff85aeafc3137bb0 EFLAGS: 00010206\n[83428.295817] RAX: 6f702f323a33312d RBX: ff4290ee81292860 RCX: 5000cca25103be32\n[83428.295820] RDX: ff85aeafc3137bb8 RSI: ff4290eeb1966c00 RDI: ffffffffc1560845\n[83428.295823] RBP: ff85aeafc3137c18 R08: 74726f702f303a33 R09: ff85aeafc3137bb8\n[83428.295826] R10: ff85aeafc3137b18 R11: ff4290f5bd60fe68 R12: ff4290ee81290000\n[83428.295830] R13: ff4290ee6e345de0 R14: ff4290ee81290000 R15: ff4290ee6e345e30\n[83428.295833] FS: 00007fd9472a6740(0000) GS:ff4290f5ce96b000(0000) knlGS:0000000000000000\n[83428.295837] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033\n[83428.295840] CR2: 00007f242b4db238 CR3: 00000002372b8006 CR4: 0000000000771ef0\n[83428.295844] PKRU: 55555554\n[83428.295846] Call Trace:\n[83428.295848] \u003cTASK\u003e\n[83428.295850] _dev_printk+0x5c/0x80\n[83428.295857] ? srso_alias_return_thunk+0x5/0xfbef5\n[83428.295863] mpt3sas_transport_port_remove+0x1c7/0x420 [mpt3sas]\n[83428.295882] _scsih_remove_device+0x21b/0x280 [mpt3sas]\n[83428.295894] ? _scsih_expander_node_remove+0x108/0x140 [mpt3sas]\n[83428.295906] ? srso_alias_return_thunk+0x5/0xfbef5\n[83428.295910] mpt3sas_device_remove_by_sas_address.part.0+0x8f/0x110 [mpt3sas]\n[83428.295921] _scsih_expander_node_remove+0x129/0x140 [mpt3sas]\n[83428.295933] _scsih_expander_node_remove+0x6a/0x140 [mpt3sas]\n[83428.295944] scsih_remove+0x3f0/0x4a0 [mpt3sas]\n[83428.295957] pci_device_remove+0x3b/0xb0\n[83428.295962] device_release_driver_internal+0x193/0x200\n[83428.295968] driver_detach+0x44/0x90\n[83428.295971] bus_remove_driver+0x69/0xf0\n[83428.295975] pci_unregister_driver+0x2a/0xb0\n[83428.295979] _mpt3sas_exit+0x1f/0x300 [mpt3sas]\n[83428.295991] __do_sys_delete_module.constprop.0+0x174/0x310\n[83428.295997] ? srso_alias_return_thunk+0x5/0xfbef5\n[83428.296000] ? __x64_sys_getdents64+0x9a/0x110\n[83428.296005] ? srso_alias_return_thunk+0x5/0xfbef5\n[83428.296009] ? syscall_trace_enter+0xf6/0x1b0\n[83428.296014] do_syscall_64+0x7b/0x2c0\n[83428.296019] ? srso_alias_return_thunk+0x5/0xfbef5\n[83428.296023] entry_SYSCALL_64_after_hwframe+0x76/0x7e",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40115",
"url": "https://www.suse.com/security/cve/CVE-2025-40115"
},
{
"category": "external",
"summary": "SUSE Bug 1253318 for CVE-2025-40115",
"url": "https://bugzilla.suse.com/1253318"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-19T16:46:47Z",
"details": "moderate"
}
],
"title": "CVE-2025-40115"
},
{
"cve": "CVE-2025-40116",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40116"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nusb: host: max3421-hcd: Fix error pointer dereference in probe cleanup\n\nThe kthread_run() function returns error pointers so the\nmax3421_hcd-\u003espi_thread pointer can be either error pointers or NULL.\nCheck for both before dereferencing it.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40116",
"url": "https://www.suse.com/security/cve/CVE-2025-40116"
},
{
"category": "external",
"summary": "SUSE Bug 1253324 for CVE-2025-40116",
"url": "https://bugzilla.suse.com/1253324"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-19T16:46:47Z",
"details": "moderate"
}
],
"title": "CVE-2025-40116"
},
{
"cve": "CVE-2025-40118",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40118"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nscsi: pm80xx: Fix array-index-out-of-of-bounds on rmmod\n\nSince commit f7b705c238d1 (\"scsi: pm80xx: Set phy_attached to zero when\ndevice is gone\") UBSAN reports:\n\n UBSAN: array-index-out-of-bounds in drivers/scsi/pm8001/pm8001_sas.c:786:17\n index 28 is out of range for type \u0027pm8001_phy [16]\u0027\n\non rmmod when using an expander.\n\nFor a direct attached device, attached_phy contains the local phy id.\nFor a device behind an expander, attached_phy contains the remote phy\nid, not the local phy id.\n\nI.e. while pm8001_ha will have pm8001_ha-\u003echip-\u003en_phy local phys, for a\ndevice behind an expander, attached_phy can be much larger than\npm8001_ha-\u003echip-\u003en_phy (depending on the amount of phys of the\nexpander).\n\nE.g. on my system pm8001_ha has 8 phys with phy ids 0-7. One of the\nports has an expander connected. The expander has 31 phys with phy ids\n0-30.\n\nThe pm8001_ha-\u003ephy array only contains the phys of the HBA. It does not\ncontain the phys of the expander. Thus, it is wrong to use attached_phy\nto index the pm8001_ha-\u003ephy array for a device behind an expander.\n\nThus, we can only clear phy_attached for devices that are directly\nattached.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40118",
"url": "https://www.suse.com/security/cve/CVE-2025-40118"
},
{
"category": "external",
"summary": "SUSE Bug 1253363 for CVE-2025-40118",
"url": "https://bugzilla.suse.com/1253363"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.1,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-19T16:46:47Z",
"details": "moderate"
}
],
"title": "CVE-2025-40118"
},
{
"cve": "CVE-2025-40120",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40120"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nnet: usb: asix: hold PM usage ref to avoid PM/MDIO + RTNL deadlock\n\nPrevent USB runtime PM (autosuspend) for AX88772* in bind.\n\nusbnet enables runtime PM (autosuspend) by default, so disabling it via\nthe usb_driver flag is ineffective. On AX88772B, autosuspend shows no\nmeasurable power saving with current driver (no link partner, admin\nup/down). The ~0.453 W -\u003e ~0.248 W drop on v6.1 comes from phylib powering\nthe PHY off on admin-down, not from USB autosuspend.\n\nThe real hazard is that with runtime PM enabled, ndo_open() (under RTNL)\nmay synchronously trigger autoresume (usb_autopm_get_interface()) into\nasix_resume() while the USB PM lock is held. Resume paths then invoke\nphylink/phylib and MDIO, which also expect RTNL, leading to possible\ndeadlocks or PM lock vs MDIO wake issues.\n\nTo avoid this, keep the device runtime-PM active by taking a usage\nreference in ax88772_bind() and dropping it in unbind(). A non-zero PM\nusage count blocks runtime suspend regardless of userspace policy\n(.../power/control - pm_runtime_allow/forbid), making this approach\nrobust against sysfs overrides.\n\nHolding a runtime-PM usage ref does not affect system-wide suspend;\nsystem sleep/resume callbacks continue to run as before.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40120",
"url": "https://www.suse.com/security/cve/CVE-2025-40120"
},
{
"category": "external",
"summary": "SUSE Bug 1253360 for CVE-2025-40120",
"url": "https://bugzilla.suse.com/1253360"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-19T16:46:47Z",
"details": "moderate"
}
],
"title": "CVE-2025-40120"
},
{
"cve": "CVE-2025-40121",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40121"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nASoC: Intel: bytcr_rt5651: Fix invalid quirk input mapping\n\nWhen an invalid value is passed via quirk option, currently\nbytcr_rt5640 driver just ignores and leaves as is, which may lead to\nunepxected results like OOB access.\n\nThis patch adds the sanity check and corrects the input mapping to the\ncertain default value if an invalid value is passed.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40121",
"url": "https://www.suse.com/security/cve/CVE-2025-40121"
},
{
"category": "external",
"summary": "SUSE Bug 1253367 for CVE-2025-40121",
"url": "https://bugzilla.suse.com/1253367"
},
{
"category": "external",
"summary": "SUSE Bug 1253430 for CVE-2025-40121",
"url": "https://bugzilla.suse.com/1253430"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-19T16:46:47Z",
"details": "moderate"
}
],
"title": "CVE-2025-40121"
},
{
"cve": "CVE-2025-40127",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40127"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nhwrng: ks-sa - fix division by zero in ks_sa_rng_init\n\nFix division by zero in ks_sa_rng_init caused by missing clock\npointer initialization. The clk_get_rate() call is performed on\nan uninitialized clk pointer, resulting in division by zero when\ncalculating delay values.\n\nAdd clock initialization code before using the clock.\n\n\n drivers/char/hw_random/ks-sa-rng.c | 7 +++++++\n 1 file changed, 7 insertions(+)",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40127",
"url": "https://www.suse.com/security/cve/CVE-2025-40127"
},
{
"category": "external",
"summary": "SUSE Bug 1253369 for CVE-2025-40127",
"url": "https://bugzilla.suse.com/1253369"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-19T16:46:47Z",
"details": "moderate"
}
],
"title": "CVE-2025-40127"
},
{
"cve": "CVE-2025-40129",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40129"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nsunrpc: fix null pointer dereference on zero-length checksum\n\nIn xdr_stream_decode_opaque_auth(), zero-length checksum.len causes\nchecksum.data to be set to NULL. This triggers a NPD when accessing\nchecksum.data in gss_krb5_verify_mic_v2(). This patch ensures that\nthe value of checksum.len is not less than XDR_UNIT.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40129",
"url": "https://www.suse.com/security/cve/CVE-2025-40129"
},
{
"category": "external",
"summary": "SUSE Bug 1253472 for CVE-2025-40129",
"url": "https://bugzilla.suse.com/1253472"
},
{
"category": "external",
"summary": "SUSE Bug 1253473 for CVE-2025-40129",
"url": "https://bugzilla.suse.com/1253473"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-19T16:46:47Z",
"details": "important"
}
],
"title": "CVE-2025-40129"
},
{
"cve": "CVE-2025-40132",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40132"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nASoC: Intel: sof_sdw: Prevent jump to NULL add_sidecar callback\n\nIn create_sdw_dailink() check that sof_end-\u003ecodec_info-\u003eadd_sidecar\nis not NULL before calling it.\n\nThe original code assumed that if include_sidecar is true, the codec\non that link has an add_sidecar callback. But there could be other\ncodecs on the same link that do not have an add_sidecar callback.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40132",
"url": "https://www.suse.com/security/cve/CVE-2025-40132"
},
{
"category": "external",
"summary": "SUSE Bug 1253330 for CVE-2025-40132",
"url": "https://bugzilla.suse.com/1253330"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-19T16:46:47Z",
"details": "moderate"
}
],
"title": "CVE-2025-40132"
},
{
"cve": "CVE-2025-40133",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40133"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nmptcp: Use __sk_dst_get() and dst_dev_rcu() in mptcp_active_enable().\n\nmptcp_active_enable() is called from subflow_finish_connect(),\nwhich is icsk-\u003eicsk_af_ops-\u003esk_rx_dst_set() and it\u0027s not always\nunder RCU.\n\nUsing sk_dst_get(sk)-\u003edev could trigger UAF.\n\nLet\u0027s use __sk_dst_get() and dst_dev_rcu().",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40133",
"url": "https://www.suse.com/security/cve/CVE-2025-40133"
},
{
"category": "external",
"summary": "SUSE Bug 1253328 for CVE-2025-40133",
"url": "https://bugzilla.suse.com/1253328"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-19T16:46:47Z",
"details": "moderate"
}
],
"title": "CVE-2025-40133"
},
{
"cve": "CVE-2025-40134",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40134"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\ndm: fix NULL pointer dereference in __dm_suspend()\n\nThere is a race condition between dm device suspend and table load that\ncan lead to null pointer dereference. The issue occurs when suspend is\ninvoked before table load completes:\n\nBUG: kernel NULL pointer dereference, address: 0000000000000054\nOops: 0000 [#1] PREEMPT SMP PTI\nCPU: 6 PID: 6798 Comm: dmsetup Not tainted 6.6.0-g7e52f5f0ca9b #62\nHardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.16.1-2.fc37 04/01/2014\nRIP: 0010:blk_mq_wait_quiesce_done+0x0/0x50\nCall Trace:\n \u003cTASK\u003e\n blk_mq_quiesce_queue+0x2c/0x50\n dm_stop_queue+0xd/0x20\n __dm_suspend+0x130/0x330\n dm_suspend+0x11a/0x180\n dev_suspend+0x27e/0x560\n ctl_ioctl+0x4cf/0x850\n dm_ctl_ioctl+0xd/0x20\n vfs_ioctl+0x1d/0x50\n __se_sys_ioctl+0x9b/0xc0\n __x64_sys_ioctl+0x19/0x30\n x64_sys_call+0x2c4a/0x4620\n do_syscall_64+0x9e/0x1b0\n\nThe issue can be triggered as below:\n\nT1 \t\t\t\t\t\tT2\ndm_suspend\t\t\t\t\ttable_load\n__dm_suspend\t\t\t\t\tdm_setup_md_queue\n\t\t\t\t\t\tdm_mq_init_request_queue\n\t\t\t\t\t\tblk_mq_init_allocated_queue\n\t\t\t\t\t\t=\u003e q-\u003emq_ops = set-\u003eops; (1)\ndm_stop_queue / dm_wait_for_completion\n=\u003e q-\u003etag_set NULL pointer!\t(2)\n\t\t\t\t\t\t=\u003e q-\u003etag_set = set; (3)\n\nFix this by checking if a valid table (map) exists before performing\nrequest-based suspend and waiting for target I/O. When map is NULL,\nskip these table-dependent suspend steps.\n\nEven when map is NULL, no I/O can reach any target because there is\nno table loaded; I/O submitted in this state will fail early in the\nDM layer. Skipping the table-dependent suspend logic in this case\nis safe and avoids NULL pointer dereferences.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40134",
"url": "https://www.suse.com/security/cve/CVE-2025-40134"
},
{
"category": "external",
"summary": "SUSE Bug 1253386 for CVE-2025-40134",
"url": "https://bugzilla.suse.com/1253386"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.7,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-19T16:46:47Z",
"details": "moderate"
}
],
"title": "CVE-2025-40134"
},
{
"cve": "CVE-2025-40135",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40135"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nipv6: use RCU in ip6_xmit()\n\nUse RCU in ip6_xmit() in order to use dst_dev_rcu() to prevent\npossible UAF.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40135",
"url": "https://www.suse.com/security/cve/CVE-2025-40135"
},
{
"category": "external",
"summary": "SUSE Bug 1253342 for CVE-2025-40135",
"url": "https://bugzilla.suse.com/1253342"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.1,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-19T16:46:47Z",
"details": "moderate"
}
],
"title": "CVE-2025-40135"
},
{
"cve": "CVE-2025-40139",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40139"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nsmc: Use __sk_dst_get() and dst_dev_rcu() in in smc_clc_prfx_set().\n\nsmc_clc_prfx_set() is called during connect() and not under RCU\nnor RTNL.\n\nUsing sk_dst_get(sk)-\u003edev could trigger UAF.\n\nLet\u0027s use __sk_dst_get() and dev_dst_rcu() under rcu_read_lock()\nafter kernel_getsockname().\n\nNote that the returned value of smc_clc_prfx_set() is not used\nin the caller.\n\nWhile at it, we change the 1st arg of smc_clc_prfx_set[46]_rcu()\nnot to touch dst there.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40139",
"url": "https://www.suse.com/security/cve/CVE-2025-40139"
},
{
"category": "external",
"summary": "SUSE Bug 1253409 for CVE-2025-40139",
"url": "https://bugzilla.suse.com/1253409"
},
{
"category": "external",
"summary": "SUSE Bug 1253411 for CVE-2025-40139",
"url": "https://bugzilla.suse.com/1253411"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-19T16:46:47Z",
"details": "important"
}
],
"title": "CVE-2025-40139"
},
{
"cve": "CVE-2025-40140",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40140"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nnet: usb: Remove disruptive netif_wake_queue in rtl8150_set_multicast\n\nsyzbot reported WARNING in rtl8150_start_xmit/usb_submit_urb.\nThis is the sequence of events that leads to the warning:\n\nrtl8150_start_xmit() {\n\tnetif_stop_queue();\n\tusb_submit_urb(dev-\u003etx_urb);\n}\n\nrtl8150_set_multicast() {\n\tnetif_stop_queue();\n\tnetif_wake_queue();\t\t\u003c-- wakes up TX queue before URB is done\n}\n\nrtl8150_start_xmit() {\n\tnetif_stop_queue();\n\tusb_submit_urb(dev-\u003etx_urb);\t\u003c-- double submission\n}\n\nrtl8150_set_multicast being the ndo_set_rx_mode callback should not be\ncalling netif_stop_queue and notif_start_queue as these handle\nTX queue synchronization.\n\nThe net core function dev_set_rx_mode handles the synchronization\nfor rtl8150_set_multicast making it safe to remove these locks.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40140",
"url": "https://www.suse.com/security/cve/CVE-2025-40140"
},
{
"category": "external",
"summary": "SUSE Bug 1253349 for CVE-2025-40140",
"url": "https://bugzilla.suse.com/1253349"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 3.3,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-19T16:46:47Z",
"details": "low"
}
],
"title": "CVE-2025-40140"
},
{
"cve": "CVE-2025-40141",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40141"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nBluetooth: ISO: Fix possible UAF on iso_conn_free\n\nThis attempt to fix similar issue to sco_conn_free where if the\nconn-\u003esk is not set to NULL may lead to UAF on iso_conn_free.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40141",
"url": "https://www.suse.com/security/cve/CVE-2025-40141"
},
{
"category": "external",
"summary": "SUSE Bug 1253352 for CVE-2025-40141",
"url": "https://bugzilla.suse.com/1253352"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-19T16:46:47Z",
"details": "moderate"
}
],
"title": "CVE-2025-40141"
},
{
"cve": "CVE-2025-40142",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40142"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nALSA: pcm: Disable bottom softirqs as part of spin_lock_irq() on PREEMPT_RT\n\nsnd_pcm_group_lock_irq() acquires a spinlock_t and disables interrupts\nvia spin_lock_irq(). This also implicitly disables the handling of\nsoftirqs such as TIMER_SOFTIRQ.\nOn PREEMPT_RT softirqs are preemptible and spin_lock_irq() does not\ndisable them. That means a timer can be invoked during spin_lock_irq()\non the same CPU. Due to synchronisations reasons local_bh_disable() has\na per-CPU lock named softirq_ctrl.lock which synchronizes individual\nsoftirq against each other.\nsyz-bot managed to trigger a lockdep report where softirq_ctrl.lock is\nacquired in hrtimer_cancel() in addition to hrtimer_run_softirq(). This\nis a possible deadlock.\n\nThe softirq_ctrl.lock can not be made part of spin_lock_irq() as this\nwould lead to too much synchronisation against individual threads on the\nsystem. To avoid the possible deadlock, softirqs must be manually\ndisabled before the lock is acquired.\n\nDisable softirqs before the lock is acquired on PREEMPT_RT.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40142",
"url": "https://www.suse.com/security/cve/CVE-2025-40142"
},
{
"category": "external",
"summary": "SUSE Bug 1253348 for CVE-2025-40142",
"url": "https://bugzilla.suse.com/1253348"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.7,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-19T16:46:47Z",
"details": "moderate"
}
],
"title": "CVE-2025-40142"
},
{
"cve": "CVE-2025-40149",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40149"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\ntls: Use __sk_dst_get() and dst_dev_rcu() in get_netdev_for_sock().\n\nget_netdev_for_sock() is called during setsockopt(),\nso not under RCU.\n\nUsing sk_dst_get(sk)-\u003edev could trigger UAF.\n\nLet\u0027s use __sk_dst_get() and dst_dev_rcu().\n\nNote that the only -\u003endo_sk_get_lower_dev() user is\nbond_sk_get_lower_dev(), which uses RCU.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40149",
"url": "https://www.suse.com/security/cve/CVE-2025-40149"
},
{
"category": "external",
"summary": "SUSE Bug 1253355 for CVE-2025-40149",
"url": "https://bugzilla.suse.com/1253355"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-19T16:46:47Z",
"details": "moderate"
}
],
"title": "CVE-2025-40149"
},
{
"cve": "CVE-2025-40153",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40153"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nmm: hugetlb: avoid soft lockup when mprotect to large memory area\n\nWhen calling mprotect() to a large hugetlb memory area in our customer\u0027s\nworkload (~300GB hugetlb memory), soft lockup was observed:\n\nwatchdog: BUG: soft lockup - CPU#98 stuck for 23s! [t2_new_sysv:126916]\n\nCPU: 98 PID: 126916 Comm: t2_new_sysv Kdump: loaded Not tainted 6.17-rc7\nHardware name: GIGACOMPUTING R2A3-T40-AAV1/Jefferson CIO, BIOS 5.4.4.1 07/15/2025\npstate: 20400009 (nzCv daif +PAN -UAO -TCO -DIT -SSBS BTYPE=--)\npc : mte_clear_page_tags+0x14/0x24\nlr : mte_sync_tags+0x1c0/0x240\nsp : ffff80003150bb80\nx29: ffff80003150bb80 x28: ffff00739e9705a8 x27: 0000ffd2d6a00000\nx26: 0000ff8e4bc00000 x25: 00e80046cde00f45 x24: 0000000000022458\nx23: 0000000000000000 x22: 0000000000000004 x21: 000000011b380000\nx20: ffff000000000000 x19: 000000011b379f40 x18: 0000000000000000\nx17: 0000000000000000 x16: 0000000000000000 x15: 0000000000000000\nx14: 0000000000000000 x13: 0000000000000000 x12: 0000000000000000\nx11: 0000000000000000 x10: 0000000000000000 x9 : ffffc875e0aa5e2c\nx8 : 0000000000000000 x7 : 0000000000000000 x6 : 0000000000000000\nx5 : fffffc01ce7a5c00 x4 : 00000000046cde00 x3 : fffffc0000000000\nx2 : 0000000000000004 x1 : 0000000000000040 x0 : ffff0046cde7c000\n\nCall trace:\n mte_clear_page_tags+0x14/0x24\n set_huge_pte_at+0x25c/0x280\n hugetlb_change_protection+0x220/0x430\n change_protection+0x5c/0x8c\n mprotect_fixup+0x10c/0x294\n do_mprotect_pkey.constprop.0+0x2e0/0x3d4\n __arm64_sys_mprotect+0x24/0x44\n invoke_syscall+0x50/0x160\n el0_svc_common+0x48/0x144\n do_el0_svc+0x30/0xe0\n el0_svc+0x30/0xf0\n el0t_64_sync_handler+0xc4/0x148\n el0t_64_sync+0x1a4/0x1a8\n\nSoft lockup is not triggered with THP or base page because there is\ncond_resched() called for each PMD size.\n\nAlthough the soft lockup was triggered by MTE, it should be not MTE\nspecific. The other processing which takes long time in the loop may\ntrigger soft lockup too.\n\nSo add cond_resched() for hugetlb to avoid soft lockup.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40153",
"url": "https://www.suse.com/security/cve/CVE-2025-40153"
},
{
"category": "external",
"summary": "SUSE Bug 1253408 for CVE-2025-40153",
"url": "https://bugzilla.suse.com/1253408"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 3.3,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-19T16:46:47Z",
"details": "low"
}
],
"title": "CVE-2025-40153"
},
{
"cve": "CVE-2025-40154",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40154"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nASoC: Intel: bytcr_rt5640: Fix invalid quirk input mapping\n\nWhen an invalid value is passed via quirk option, currently\nbytcr_rt5640 driver only shows an error message but leaves as is.\nThis may lead to unepxected results like OOB access.\n\nThis patch corrects the input mapping to the certain default value if\nan invalid value is passed.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40154",
"url": "https://www.suse.com/security/cve/CVE-2025-40154"
},
{
"category": "external",
"summary": "SUSE Bug 1253431 for CVE-2025-40154",
"url": "https://bugzilla.suse.com/1253431"
},
{
"category": "external",
"summary": "SUSE Bug 1253432 for CVE-2025-40154",
"url": "https://bugzilla.suse.com/1253432"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-19T16:46:47Z",
"details": "moderate"
}
],
"title": "CVE-2025-40154"
},
{
"cve": "CVE-2025-40156",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40156"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nPM / devfreq: mtk-cci: Fix potential error pointer dereference in probe()\n\nThe drv-\u003esram_reg pointer could be set to ERR_PTR(-EPROBE_DEFER) which\nwould lead to a error pointer dereference. Use IS_ERR_OR_NULL() to check\nthat the pointer is valid.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40156",
"url": "https://www.suse.com/security/cve/CVE-2025-40156"
},
{
"category": "external",
"summary": "SUSE Bug 1253428 for CVE-2025-40156",
"url": "https://bugzilla.suse.com/1253428"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-19T16:46:47Z",
"details": "moderate"
}
],
"title": "CVE-2025-40156"
},
{
"cve": "CVE-2025-40157",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40157"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nEDAC/i10nm: Skip DIMM enumeration on a disabled memory controller\n\nWhen loading the i10nm_edac driver on some Intel Granite Rapids servers,\na call trace may appear as follows:\n\n UBSAN: shift-out-of-bounds in drivers/edac/skx_common.c:453:16\n shift exponent -66 is negative\n ...\n __ubsan_handle_shift_out_of_bounds+0x1e3/0x390\n skx_get_dimm_info.cold+0x47/0xd40 [skx_edac_common]\n i10nm_get_dimm_config+0x23e/0x390 [i10nm_edac]\n skx_register_mci+0x159/0x220 [skx_edac_common]\n i10nm_init+0xcb0/0x1ff0 [i10nm_edac]\n ...\n\nThis occurs because some BIOS may disable a memory controller if there\naren\u0027t any memory DIMMs populated on this memory controller. The DIMMMTR\nregister of this disabled memory controller contains the invalid value\n~0, resulting in the call trace above.\n\nFix this call trace by skipping DIMM enumeration on a disabled memory\ncontroller.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40157",
"url": "https://www.suse.com/security/cve/CVE-2025-40157"
},
{
"category": "external",
"summary": "SUSE Bug 1253423 for CVE-2025-40157",
"url": "https://bugzilla.suse.com/1253423"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.2,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:L/I:L/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-19T16:46:47Z",
"details": "moderate"
}
],
"title": "CVE-2025-40157"
},
{
"cve": "CVE-2025-40158",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40158"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nipv6: use RCU in ip6_output()\n\nUse RCU in ip6_output() in order to use dst_dev_rcu() to prevent\npossible UAF.\n\nWe can remove rcu_read_lock()/rcu_read_unlock() pairs\nfrom ip6_finish_output2().",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40158",
"url": "https://www.suse.com/security/cve/CVE-2025-40158"
},
{
"category": "external",
"summary": "SUSE Bug 1253402 for CVE-2025-40158",
"url": "https://bugzilla.suse.com/1253402"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-19T16:46:47Z",
"details": "moderate"
}
],
"title": "CVE-2025-40158"
},
{
"cve": "CVE-2025-40159",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40159"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nxsk: Harden userspace-supplied xdp_desc validation\n\nTurned out certain clearly invalid values passed in xdp_desc from\nuserspace can pass xp_{,un}aligned_validate_desc() and then lead\nto UBs or just invalid frames to be queued for xmit.\n\ndesc-\u003elen close to ``U32_MAX`` with a non-zero pool-\u003etx_metadata_len\ncan cause positive integer overflow and wraparound, the same way low\nenough desc-\u003eaddr with a non-zero pool-\u003etx_metadata_len can cause\nnegative integer overflow. Both scenarios can then pass the\nvalidation successfully.\nThis doesn\u0027t happen with valid XSk applications, but can be used\nto perform attacks.\n\nAlways promote desc-\u003elen to ``u64`` first to exclude positive\noverflows of it. Use explicit check_{add,sub}_overflow() when\nvalidating desc-\u003eaddr (which is ``u64`` already).\n\nbloat-o-meter reports a little growth of the code size:\n\nadd/remove: 0/0 grow/shrink: 2/1 up/down: 60/-16 (44)\nFunction old new delta\nxskq_cons_peek_desc 299 330 +31\nxsk_tx_peek_release_desc_batch 973 1002 +29\nxsk_generic_xmit 3148 3132 -16\n\nbut hopefully this doesn\u0027t hurt the performance much.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40159",
"url": "https://www.suse.com/security/cve/CVE-2025-40159"
},
{
"category": "external",
"summary": "SUSE Bug 1253403 for CVE-2025-40159",
"url": "https://bugzilla.suse.com/1253403"
},
{
"category": "external",
"summary": "SUSE Bug 1253404 for CVE-2025-40159",
"url": "https://bugzilla.suse.com/1253404"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-19T16:46:47Z",
"details": "important"
}
],
"title": "CVE-2025-40159"
},
{
"cve": "CVE-2025-40161",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40161"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nmailbox: zynqmp-ipi: Fix SGI cleanup on unbind\n\nThe driver incorrectly determines SGI vs SPI interrupts by checking IRQ\nnumber \u003c 16, which fails with dynamic IRQ allocation. During unbind,\nthis causes improper SGI cleanup leading to kernel crash.\n\nAdd explicit irq_type field to pdata for reliable identification of SGI\ninterrupts (type-2) and only clean up SGI resources when appropriate.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40161",
"url": "https://www.suse.com/security/cve/CVE-2025-40161"
},
{
"category": "external",
"summary": "SUSE Bug 1253410 for CVE-2025-40161",
"url": "https://bugzilla.suse.com/1253410"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.1,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-19T16:46:47Z",
"details": "moderate"
}
],
"title": "CVE-2025-40161"
},
{
"cve": "CVE-2025-40162",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40162"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nASoC: amd/sdw_utils: avoid NULL deref when devm_kasprintf() fails\n\ndevm_kasprintf() may return NULL on memory allocation failure,\nbut the debug message prints cpus-\u003edai_name before checking it.\nMove the dev_dbg() call after the NULL check to prevent potential\nNULL pointer dereference.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40162",
"url": "https://www.suse.com/security/cve/CVE-2025-40162"
},
{
"category": "external",
"summary": "SUSE Bug 1253422 for CVE-2025-40162",
"url": "https://bugzilla.suse.com/1253422"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-19T16:46:47Z",
"details": "moderate"
}
],
"title": "CVE-2025-40162"
},
{
"cve": "CVE-2025-40164",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40164"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nusbnet: Fix using smp_processor_id() in preemptible code warnings\n\nSyzbot reported the following warning:\n\nBUG: using smp_processor_id() in preemptible [00000000] code: dhcpcd/2879\ncaller is usbnet_skb_return+0x74/0x490 drivers/net/usb/usbnet.c:331\nCPU: 1 UID: 0 PID: 2879 Comm: dhcpcd Not tainted 6.15.0-rc4-syzkaller-00098-g615dca38c2ea #0 PREEMPT(voluntary)\nCall Trace:\n \u003cTASK\u003e\n __dump_stack lib/dump_stack.c:94 [inline]\n dump_stack_lvl+0x16c/0x1f0 lib/dump_stack.c:120\n check_preemption_disabled+0xd0/0xe0 lib/smp_processor_id.c:49\n usbnet_skb_return+0x74/0x490 drivers/net/usb/usbnet.c:331\n usbnet_resume_rx+0x4b/0x170 drivers/net/usb/usbnet.c:708\n usbnet_change_mtu+0x1be/0x220 drivers/net/usb/usbnet.c:417\n __dev_set_mtu net/core/dev.c:9443 [inline]\n netif_set_mtu_ext+0x369/0x5c0 net/core/dev.c:9496\n netif_set_mtu+0xb0/0x160 net/core/dev.c:9520\n dev_set_mtu+0xae/0x170 net/core/dev_api.c:247\n dev_ifsioc+0xa31/0x18d0 net/core/dev_ioctl.c:572\n dev_ioctl+0x223/0x10e0 net/core/dev_ioctl.c:821\n sock_do_ioctl+0x19d/0x280 net/socket.c:1204\n sock_ioctl+0x42f/0x6a0 net/socket.c:1311\n vfs_ioctl fs/ioctl.c:51 [inline]\n __do_sys_ioctl fs/ioctl.c:906 [inline]\n __se_sys_ioctl fs/ioctl.c:892 [inline]\n __x64_sys_ioctl+0x190/0x200 fs/ioctl.c:892\n do_syscall_x64 arch/x86/entry/syscall_64.c:63 [inline]\n do_syscall_64+0xcd/0x260 arch/x86/entry/syscall_64.c:94\n entry_SYSCALL_64_after_hwframe+0x77/0x7f\n\nFor historical and portability reasons, the netif_rx() is usually\nrun in the softirq or interrupt context, this commit therefore add\nlocal_bh_disable/enable() protection in the usbnet_resume_rx().",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40164",
"url": "https://www.suse.com/security/cve/CVE-2025-40164"
},
{
"category": "external",
"summary": "SUSE Bug 1253407 for CVE-2025-40164",
"url": "https://bugzilla.suse.com/1253407"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.7,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-19T16:46:47Z",
"details": "moderate"
}
],
"title": "CVE-2025-40164"
},
{
"cve": "CVE-2025-40165",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40165"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nmedia: nxp: imx8-isi: m2m: Fix streaming cleanup on release\n\nIf streamon/streamoff calls are imbalanced, such as when exiting an\napplication with Ctrl+C when streaming, the m2m usage_count will never\nreach zero and the ISI channel won\u0027t be freed. Besides from that, if the\ninput line width is more than 2K, it will trigger a WARN_ON():\n\n[ 59.222120] ------------[ cut here ]------------\n[ 59.226758] WARNING: drivers/media/platform/nxp/imx8-isi/imx8-isi-hw.c:631 at mxc_isi_channel_chain+0xa4/0x120, CPU#4: v4l2-ctl/654\n[ 59.238569] Modules linked in: ap1302\n[ 59.242231] CPU: 4 UID: 0 PID: 654 Comm: v4l2-ctl Not tainted 6.16.0-rc4-next-20250704-06511-gff0e002d480a-dirty #258 PREEMPT\n[ 59.253597] Hardware name: NXP i.MX95 15X15 board (DT)\n[ 59.258720] pstate: 80400009 (Nzcv daif +PAN -UAO -TCO -DIT -SSBS BTYPE=--)\n[ 59.265669] pc : mxc_isi_channel_chain+0xa4/0x120\n[ 59.270358] lr : mxc_isi_channel_chain+0x44/0x120\n[ 59.275047] sp : ffff8000848c3b40\n[ 59.278348] x29: ffff8000848c3b40 x28: ffff0000859b4c98 x27: ffff800081939f00\n[ 59.285472] x26: 000000000000000a x25: ffff0000859b4cb8 x24: 0000000000000001\n[ 59.292597] x23: ffff0000816f4760 x22: ffff0000816f4258 x21: ffff000084ceb780\n[ 59.299720] x20: ffff000084342ff8 x19: ffff000084340000 x18: 0000000000000000\n[ 59.306845] x17: 0000000000000000 x16: 0000000000000000 x15: 0000ffffdb369e1c\n[ 59.313969] x14: 0000000000000000 x13: 0000000000000000 x12: 0000000000000000\n[ 59.321093] x11: 0000000000000000 x10: 0000000000000000 x9 : 0000000000000000\n[ 59.328217] x8 : ffff8000848c3d48 x7 : ffff800081930b30 x6 : ffff800081930b30\n[ 59.335340] x5 : ffff0000859b6000 x4 : ffff80008193ae80 x3 : ffff800081022420\n[ 59.342464] x2 : ffff0000852f6900 x1 : 0000000000000001 x0 : ffff000084341000\n[ 59.349590] Call trace:\n[ 59.352025] mxc_isi_channel_chain+0xa4/0x120 (P)\n[ 59.356722] mxc_isi_m2m_streamon+0x160/0x20c\n[ 59.361072] v4l_streamon+0x24/0x30\n[ 59.364556] __video_do_ioctl+0x40c/0x4a0\n[ 59.368560] video_usercopy+0x2bc/0x690\n[ 59.372382] video_ioctl2+0x18/0x24\n[ 59.375857] v4l2_ioctl+0x40/0x60\n[ 59.379168] __arm64_sys_ioctl+0xac/0x104\n[ 59.383172] invoke_syscall+0x48/0x104\n[ 59.386916] el0_svc_common.constprop.0+0xc0/0xe0\n[ 59.391613] do_el0_svc+0x1c/0x28\n[ 59.394915] el0_svc+0x34/0xf4\n[ 59.397966] el0t_64_sync_handler+0xa0/0xe4\n[ 59.402143] el0t_64_sync+0x198/0x19c\n[ 59.405801] ---[ end trace 0000000000000000 ]---\n\nAddress this issue by moving the streaming preparation and cleanup to\nthe vb2 .prepare_streaming() and .unprepare_streaming() operations. This\nalso simplifies the driver by allowing direct usage of the\nv4l2_m2m_ioctl_streamon() and v4l2_m2m_ioctl_streamoff() helpers.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40165",
"url": "https://www.suse.com/security/cve/CVE-2025-40165"
},
{
"category": "external",
"summary": "SUSE Bug 1253405 for CVE-2025-40165",
"url": "https://bugzilla.suse.com/1253405"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.7,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-19T16:46:47Z",
"details": "moderate"
}
],
"title": "CVE-2025-40165"
},
{
"cve": "CVE-2025-40166",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40166"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\ndrm/xe/guc: Check GuC running state before deregistering exec queue\n\nIn normal operation, a registered exec queue is disabled and\nderegistered through the GuC, and freed only after the GuC confirms\ncompletion. However, if the driver is forced to unbind while the exec\nqueue is still running, the user may call exec_destroy() after the GuC\nhas already been stopped and CT communication disabled.\n\nIn this case, the driver cannot receive a response from the GuC,\npreventing proper cleanup of exec queue resources. Fix this by directly\nreleasing the resources when GuC is not running.\n\nHere is the failure dmesg log:\n\"\n[ 468.089581] ---[ end trace 0000000000000000 ]---\n[ 468.089608] pci 0000:03:00.0: [drm] *ERROR* GT0: GUC ID manager unclean (1/65535)\n[ 468.090558] pci 0000:03:00.0: [drm] GT0: total 65535\n[ 468.090562] pci 0000:03:00.0: [drm] GT0: used 1\n[ 468.090564] pci 0000:03:00.0: [drm] GT0: range 1..1 (1)\n[ 468.092716] ------------[ cut here ]------------\n[ 468.092719] WARNING: CPU: 14 PID: 4775 at drivers/gpu/drm/xe/xe_ttm_vram_mgr.c:298 ttm_vram_mgr_fini+0xf8/0x130 [xe]\n\"\n\nv2: use xe_uc_fw_is_running() instead of xe_guc_ct_enabled().\n As CT may go down and come back during VF migration.\n\n(cherry picked from commit 9b42321a02c50a12b2beb6ae9469606257fbecea)",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40166",
"url": "https://www.suse.com/security/cve/CVE-2025-40166"
},
{
"category": "external",
"summary": "SUSE Bug 1253433 for CVE-2025-40166",
"url": "https://bugzilla.suse.com/1253433"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-19T16:46:47Z",
"details": "moderate"
}
],
"title": "CVE-2025-40166"
},
{
"cve": "CVE-2025-40168",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40168"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nsmc: Use __sk_dst_get() and dst_dev_rcu() in smc_clc_prfx_match().\n\nsmc_clc_prfx_match() is called from smc_listen_work() and\nnot under RCU nor RTNL.\n\nUsing sk_dst_get(sk)-\u003edev could trigger UAF.\n\nLet\u0027s use __sk_dst_get() and dst_dev_rcu().\n\nNote that the returned value of smc_clc_prfx_match() is not\nused in the caller.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40168",
"url": "https://www.suse.com/security/cve/CVE-2025-40168"
},
{
"category": "external",
"summary": "SUSE Bug 1253427 for CVE-2025-40168",
"url": "https://bugzilla.suse.com/1253427"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-19T16:46:47Z",
"details": "moderate"
}
],
"title": "CVE-2025-40168"
},
{
"cve": "CVE-2025-40169",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40169"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nbpf: Reject negative offsets for ALU ops\n\nWhen verifying BPF programs, the check_alu_op() function validates\ninstructions with ALU operations. The \u0027offset\u0027 field in these\ninstructions is a signed 16-bit integer.\n\nThe existing check \u0027insn-\u003eoff \u003e 1\u0027 was intended to ensure the offset is\neither 0, or 1 for BPF_MOD/BPF_DIV. However, because \u0027insn-\u003eoff\u0027 is\nsigned, this check incorrectly accepts all negative values (e.g., -1).\n\nThis commit tightens the validation by changing the condition to\n\u0027(insn-\u003eoff != 0 \u0026\u0026 insn-\u003eoff != 1)\u0027. This ensures that any value\nother than the explicitly permitted 0 and 1 is rejected, hardening the\nverifier against malformed BPF programs.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40169",
"url": "https://www.suse.com/security/cve/CVE-2025-40169"
},
{
"category": "external",
"summary": "SUSE Bug 1253416 for CVE-2025-40169",
"url": "https://bugzilla.suse.com/1253416"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.8,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-19T16:46:47Z",
"details": "moderate"
}
],
"title": "CVE-2025-40169"
},
{
"cve": "CVE-2025-40171",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40171"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nnvmet-fc: move lsop put work to nvmet_fc_ls_req_op\n\nIt\u0027s possible for more than one async command to be in flight from\n__nvmet_fc_send_ls_req. For each command, a tgtport reference is taken.\n\nIn the current code, only one put work item is queued at a time, which\nresults in a leaked reference.\n\nTo fix this, move the work item to the nvmet_fc_ls_req_op struct, which\nalready tracks all resources related to the command.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40171",
"url": "https://www.suse.com/security/cve/CVE-2025-40171"
},
{
"category": "external",
"summary": "SUSE Bug 1253412 for CVE-2025-40171",
"url": "https://bugzilla.suse.com/1253412"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-19T16:46:47Z",
"details": "moderate"
}
],
"title": "CVE-2025-40171"
},
{
"cve": "CVE-2025-40172",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40172"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\naccel/qaic: Treat remaining == 0 as error in find_and_map_user_pages()\n\nCurrently, if find_and_map_user_pages() takes a DMA xfer request from the\nuser with a length field set to 0, or in a rare case, the host receives\nQAIC_TRANS_DMA_XFER_CONT from the device where resources-\u003exferred_dma_size\nis equal to the requested transaction size, the function will return 0\nbefore allocating an sgt or setting the fields of the dma_xfer struct.\nIn that case, encode_addr_size_pairs() will try to access the sgt which\nwill lead to a general protection fault.\n\nReturn an EINVAL in case the user provides a zero-sized ALP, or the device\nrequests continuation after all of the bytes have been transferred.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40172",
"url": "https://www.suse.com/security/cve/CVE-2025-40172"
},
{
"category": "external",
"summary": "SUSE Bug 1253424 for CVE-2025-40172",
"url": "https://bugzilla.suse.com/1253424"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-19T16:46:47Z",
"details": "moderate"
}
],
"title": "CVE-2025-40172"
},
{
"cve": "CVE-2025-40173",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40173"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nnet/ip6_tunnel: Prevent perpetual tunnel growth\n\nSimilarly to ipv4 tunnel, ipv6 version updates dev-\u003eneeded_headroom, too.\nWhile ipv4 tunnel headroom adjustment growth was limited in\ncommit 5ae1e9922bbd (\"net: ip_tunnel: prevent perpetual headroom growth\"),\nipv6 tunnel yet increases the headroom without any ceiling.\n\nReflect ipv4 tunnel headroom adjustment limit on ipv6 version.\n\nCredits to Francesco Ruggeri, who was originally debugging this issue\nand wrote local Arista-specific patch and a reproducer.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40173",
"url": "https://www.suse.com/security/cve/CVE-2025-40173"
},
{
"category": "external",
"summary": "SUSE Bug 1253421 for CVE-2025-40173",
"url": "https://bugzilla.suse.com/1253421"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.7,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-19T16:46:47Z",
"details": "moderate"
}
],
"title": "CVE-2025-40173"
},
{
"cve": "CVE-2025-40175",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40175"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nidpf: cleanup remaining SKBs in PTP flows\n\nWhen the driver requests Tx timestamp value, one of the first steps is\nto clone SKB using skb_get. It increases the reference counter for that\nSKB to prevent unexpected freeing by another component.\nHowever, there may be a case where the index is requested, SKB is\nassigned and never consumed by PTP flows - for example due to reset during\nrunning PTP apps.\n\nAdd a check in release timestamping function to verify if the SKB\nassigned to Tx timestamp latch was freed, and release remaining SKBs.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40175",
"url": "https://www.suse.com/security/cve/CVE-2025-40175"
},
{
"category": "external",
"summary": "SUSE Bug 1253426 for CVE-2025-40175",
"url": "https://bugzilla.suse.com/1253426"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.7,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-19T16:46:47Z",
"details": "moderate"
}
],
"title": "CVE-2025-40175"
},
{
"cve": "CVE-2025-40176",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40176"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\ntls: wait for pending async decryptions if tls_strp_msg_hold fails\n\nAsync decryption calls tls_strp_msg_hold to create a clone of the\ninput skb to hold references to the memory it uses. If we fail to\nallocate that clone, proceeding with async decryption can lead to\nvarious issues (UAF on the skb, writing into userspace memory after\nthe recv() call has returned).\n\nIn this case, wait for all pending decryption requests.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40176",
"url": "https://www.suse.com/security/cve/CVE-2025-40176"
},
{
"category": "external",
"summary": "SUSE Bug 1253425 for CVE-2025-40176",
"url": "https://bugzilla.suse.com/1253425"
},
{
"category": "external",
"summary": "SUSE Bug 1254100 for CVE-2025-40176",
"url": "https://bugzilla.suse.com/1254100"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-19T16:46:47Z",
"details": "important"
}
],
"title": "CVE-2025-40176"
},
{
"cve": "CVE-2025-40177",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40177"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\naccel/qaic: Fix bootlog initialization ordering\n\nAs soon as we queue MHI buffers to receive the bootlog from the device,\nwe could be receiving data. Therefore all the resources needed to\nprocess that data need to be setup prior to queuing the buffers.\n\nWe currently initialize some of the resources after queuing the buffers\nwhich creates a race between the probe() and any data that comes back\nfrom the device. If the uninitialized resources are accessed, we could\nsee page faults.\n\nFix the init ordering to close the race.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40177",
"url": "https://www.suse.com/security/cve/CVE-2025-40177"
},
{
"category": "external",
"summary": "SUSE Bug 1253443 for CVE-2025-40177",
"url": "https://bugzilla.suse.com/1253443"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-19T16:46:47Z",
"details": "moderate"
}
],
"title": "CVE-2025-40177"
},
{
"cve": "CVE-2025-40178",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40178"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\npid: Add a judgment for ns null in pid_nr_ns\n\n__task_pid_nr_ns\n ns = task_active_pid_ns(current);\n pid_nr_ns(rcu_dereference(*task_pid_ptr(task, type)), ns);\n if (pid \u0026\u0026 ns-\u003elevel \u003c= pid-\u003elevel) {\n\nSometimes null is returned for task_active_pid_ns. Then it will trigger kernel panic in pid_nr_ns.\n\nFor example:\n\tUnable to handle kernel NULL pointer dereference at virtual address 0000000000000058\n\tMem abort info:\n\tESR = 0x0000000096000007\n\tEC = 0x25: DABT (current EL), IL = 32 bits\n\tSET = 0, FnV = 0\n\tEA = 0, S1PTW = 0\n\tFSC = 0x07: level 3 translation fault\n\tData abort info:\n\tISV = 0, ISS = 0x00000007, ISS2 = 0x00000000\n\tCM = 0, WnR = 0, TnD = 0, TagAccess = 0\n\tGCS = 0, Overlay = 0, DirtyBit = 0, Xs = 0\n\tuser pgtable: 4k pages, 39-bit VAs, pgdp=00000002175aa000\n\t[0000000000000058] pgd=08000002175ab003, p4d=08000002175ab003, pud=08000002175ab003, pmd=08000002175be003, pte=0000000000000000\n\tpstate: 834000c5 (Nzcv daIF +PAN -UAO +TCO +DIT -SSBS BTYPE=--)\n\tpc : __task_pid_nr_ns+0x74/0xd0\n\tlr : __task_pid_nr_ns+0x24/0xd0\n\tsp : ffffffc08001bd10\n\tx29: ffffffc08001bd10 x28: ffffffd4422b2000 x27: 0000000000000001\n\tx26: ffffffd442821168 x25: ffffffd442821000 x24: 00000f89492eab31\n\tx23: 00000000000000c0 x22: ffffff806f5693c0 x21: ffffff806f5693c0\n\tx20: 0000000000000001 x19: 0000000000000000 x18: 0000000000000000\n\tx17: 00000000529c6ef0 x16: 00000000529c6ef0 x15: 00000000023a1adc\n\tx14: 0000000000000003 x13: 00000000007ef6d8 x12: 001167c391c78800\n\tx11: 00ffffffffffffff x10: 0000000000000000 x9 : 0000000000000001\n\tx8 : ffffff80816fa3c0 x7 : 0000000000000000 x6 : 49534d702d535449\n\tx5 : ffffffc080c4c2c0 x4 : ffffffd43ee128c8 x3 : ffffffd43ee124dc\n\tx2 : 0000000000000000 x1 : 0000000000000001 x0 : ffffff806f5693c0\n\tCall trace:\n\t__task_pid_nr_ns+0x74/0xd0\n\t...\n\t__handle_irq_event_percpu+0xd4/0x284\n\thandle_irq_event+0x48/0xb0\n\thandle_fasteoi_irq+0x160/0x2d8\n\tgeneric_handle_domain_irq+0x44/0x60\n\tgic_handle_irq+0x4c/0x114\n\tcall_on_irq_stack+0x3c/0x74\n\tdo_interrupt_handler+0x4c/0x84\n\tel1_interrupt+0x34/0x58\n\tel1h_64_irq_handler+0x18/0x24\n\tel1h_64_irq+0x68/0x6c\n\taccount_kernel_stack+0x60/0x144\n\texit_task_stack_account+0x1c/0x80\n\tdo_exit+0x7e4/0xaf8\n\t...\n\tget_signal+0x7bc/0x8d8\n\tdo_notify_resume+0x128/0x828\n\tel0_svc+0x6c/0x70\n\tel0t_64_sync_handler+0x68/0xbc\n\tel0t_64_sync+0x1a8/0x1ac\n\tCode: 35fffe54 911a02a8 f9400108 b4000128 (b9405a69)\n\t---[ end trace 0000000000000000 ]---\n\tKernel panic - not syncing: Oops: Fatal exception in interrupt",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40178",
"url": "https://www.suse.com/security/cve/CVE-2025-40178"
},
{
"category": "external",
"summary": "SUSE Bug 1253463 for CVE-2025-40178",
"url": "https://bugzilla.suse.com/1253463"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-19T16:46:47Z",
"details": "moderate"
}
],
"title": "CVE-2025-40178"
},
{
"cve": "CVE-2025-40180",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40180"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nmailbox: zynqmp-ipi: Fix out-of-bounds access in mailbox cleanup loop\n\nThe cleanup loop was starting at the wrong array index, causing\nout-of-bounds access.\nStart the loop at the correct index for zero-indexed arrays to prevent\naccessing memory beyond the allocated array bounds.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40180",
"url": "https://www.suse.com/security/cve/CVE-2025-40180"
},
{
"category": "external",
"summary": "SUSE Bug 1253440 for CVE-2025-40180",
"url": "https://bugzilla.suse.com/1253440"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-19T16:46:47Z",
"details": "moderate"
}
],
"title": "CVE-2025-40180"
},
{
"cve": "CVE-2025-40183",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40183"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nbpf: Fix metadata_dst leak __bpf_redirect_neigh_v{4,6}\n\nCilium has a BPF egress gateway feature which forces outgoing K8s Pod\ntraffic to pass through dedicated egress gateways which then SNAT the\ntraffic in order to interact with stable IPs outside the cluster.\n\nThe traffic is directed to the gateway via vxlan tunnel in collect md\nmode. A recent BPF change utilized the bpf_redirect_neigh() helper to\nforward packets after the arrival and decap on vxlan, which turned out\nover time that the kmalloc-256 slab usage in kernel was ever-increasing.\n\nThe issue was that vxlan allocates the metadata_dst object and attaches\nit through a fake dst entry to the skb. The latter was never released\nthough given bpf_redirect_neigh() was merely setting the new dst entry\nvia skb_dst_set() without dropping an existing one first.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40183",
"url": "https://www.suse.com/security/cve/CVE-2025-40183"
},
{
"category": "external",
"summary": "SUSE Bug 1253441 for CVE-2025-40183",
"url": "https://bugzilla.suse.com/1253441"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-19T16:46:47Z",
"details": "moderate"
}
],
"title": "CVE-2025-40183"
},
{
"cve": "CVE-2025-40185",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40185"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nice: ice_adapter: release xa entry on adapter allocation failure\n\nWhen ice_adapter_new() fails, the reserved XArray entry created by\nxa_insert() is not released. This causes subsequent insertions at\nthe same index to return -EBUSY, potentially leading to\nNULL pointer dereferences.\n\nReorder the operations as suggested by Przemek Kitszel:\n1. Check if adapter already exists (xa_load)\n2. Reserve the XArray slot (xa_reserve)\n3. Allocate the adapter (ice_adapter_new)\n4. Store the adapter (xa_store)",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40185",
"url": "https://www.suse.com/security/cve/CVE-2025-40185"
},
{
"category": "external",
"summary": "SUSE Bug 1253394 for CVE-2025-40185",
"url": "https://bugzilla.suse.com/1253394"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-19T16:46:47Z",
"details": "moderate"
}
],
"title": "CVE-2025-40185"
},
{
"cve": "CVE-2025-40186",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40186"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\ntcp: Don\u0027t call reqsk_fastopen_remove() in tcp_conn_request().\n\nsyzbot reported the splat below in tcp_conn_request(). [0]\n\nIf a listener is close()d while a TFO socket is being processed in\ntcp_conn_request(), inet_csk_reqsk_queue_add() does not set reqsk-\u003esk\nand calls inet_child_forget(), which calls tcp_disconnect() for the\nTFO socket.\n\nAfter the cited commit, tcp_disconnect() calls reqsk_fastopen_remove(),\nwhere reqsk_put() is called due to !reqsk-\u003esk.\n\nThen, reqsk_fastopen_remove() in tcp_conn_request() decrements the\nlast req-\u003ersk_refcnt and frees reqsk, and __reqsk_free() at the\ndrop_and_free label causes the refcount underflow for the listener\nand double-free of the reqsk.\n\nLet\u0027s remove reqsk_fastopen_remove() in tcp_conn_request().\n\nNote that other callers make sure tp-\u003efastopen_rsk is not NULL.\n\n[0]:\nrefcount_t: underflow; use-after-free.\nWARNING: CPU: 12 PID: 5563 at lib/refcount.c:28 refcount_warn_saturate (lib/refcount.c:28)\nModules linked in:\nCPU: 12 UID: 0 PID: 5563 Comm: syz-executor Not tainted syzkaller #0 PREEMPT(full)\nHardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025\nRIP: 0010:refcount_warn_saturate (lib/refcount.c:28)\nCode: ab e8 8e b4 98 ff 0f 0b c3 cc cc cc cc cc 80 3d a4 e4 d6 01 00 75 9c c6 05 9b e4 d6 01 01 48 c7 c7 e8 df fb ab e8 6a b4 98 ff \u003c0f\u003e 0b e9 03 5b 76 00 cc 80 3d 7d e4 d6 01 00 0f 85 74 ff ff ff c6\nRSP: 0018:ffffa79fc0304a98 EFLAGS: 00010246\nRAX: d83af4db1c6b3900 RBX: ffff9f65c7a69020 RCX: d83af4db1c6b3900\nRDX: 0000000000000000 RSI: 00000000ffff7fff RDI: ffffffffac78a280\nRBP: 000000009d781b60 R08: 0000000000007fff R09: ffffffffac6ca280\nR10: 0000000000017ffd R11: 0000000000000004 R12: ffff9f65c7b4f100\nR13: ffff9f65c7d23c00 R14: ffff9f65c7d26000 R15: ffff9f65c7a64ef8\nFS: 00007f9f962176c0(0000) GS:ffff9f65fcf00000(0000) knlGS:0000000000000000\nCS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033\nCR2: 0000200000000180 CR3: 000000000dbbe006 CR4: 0000000000372ef0\nCall Trace:\n \u003cIRQ\u003e\n tcp_conn_request (./include/linux/refcount.h:400 ./include/linux/refcount.h:432 ./include/linux/refcount.h:450 ./include/net/sock.h:1965 ./include/net/request_sock.h:131 net/ipv4/tcp_input.c:7301)\n tcp_rcv_state_process (net/ipv4/tcp_input.c:6708)\n tcp_v6_do_rcv (net/ipv6/tcp_ipv6.c:1670)\n tcp_v6_rcv (net/ipv6/tcp_ipv6.c:1906)\n ip6_protocol_deliver_rcu (net/ipv6/ip6_input.c:438)\n ip6_input (net/ipv6/ip6_input.c:500)\n ipv6_rcv (net/ipv6/ip6_input.c:311)\n __netif_receive_skb (net/core/dev.c:6104)\n process_backlog (net/core/dev.c:6456)\n __napi_poll (net/core/dev.c:7506)\n net_rx_action (net/core/dev.c:7569 net/core/dev.c:7696)\n handle_softirqs (kernel/softirq.c:579)\n do_softirq (kernel/softirq.c:480)\n \u003c/IRQ\u003e",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40186",
"url": "https://www.suse.com/security/cve/CVE-2025-40186"
},
{
"category": "external",
"summary": "SUSE Bug 1253438 for CVE-2025-40186",
"url": "https://bugzilla.suse.com/1253438"
},
{
"category": "external",
"summary": "SUSE Bug 1253439 for CVE-2025-40186",
"url": "https://bugzilla.suse.com/1253439"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-19T16:46:47Z",
"details": "important"
}
],
"title": "CVE-2025-40186"
},
{
"cve": "CVE-2025-40187",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40187"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nnet/sctp: fix a null dereference in sctp_disposition sctp_sf_do_5_1D_ce()\n\nIf new_asoc-\u003epeer.adaptation_ind=0 and sctp_ulpevent_make_authkey=0\nand sctp_ulpevent_make_authkey() returns 0, then the variable\nai_ev remains zero and the zero will be dereferenced\nin the sctp_ulpevent_free() function.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40187",
"url": "https://www.suse.com/security/cve/CVE-2025-40187"
},
{
"category": "external",
"summary": "SUSE Bug 1253647 for CVE-2025-40187",
"url": "https://bugzilla.suse.com/1253647"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.1,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-19T16:46:47Z",
"details": "moderate"
}
],
"title": "CVE-2025-40187"
},
{
"cve": "CVE-2025-40188",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40188"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\npwm: berlin: Fix wrong register in suspend/resume\n\nThe \u0027enable\u0027 register should be BERLIN_PWM_EN rather than\nBERLIN_PWM_ENABLE, otherwise, the driver accesses wrong address, there\nwill be cpu exception then kernel panic during suspend/resume.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40188",
"url": "https://www.suse.com/security/cve/CVE-2025-40188"
},
{
"category": "external",
"summary": "SUSE Bug 1253449 for CVE-2025-40188",
"url": "https://bugzilla.suse.com/1253449"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-19T16:46:47Z",
"details": "moderate"
}
],
"title": "CVE-2025-40188"
},
{
"cve": "CVE-2025-40192",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40192"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nRevert \"ipmi: fix msg stack when IPMI is disconnected\"\n\nThis reverts commit c608966f3f9c2dca596967501d00753282b395fc.\n\nThis patch has a subtle bug that can cause the IPMI driver to go into an\ninfinite loop if the BMC misbehaves in a certain way. Apparently\ncertain BMCs do misbehave this way because several reports have come in\nrecently about this.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40192",
"url": "https://www.suse.com/security/cve/CVE-2025-40192"
},
{
"category": "external",
"summary": "SUSE Bug 1253622 for CVE-2025-40192",
"url": "https://bugzilla.suse.com/1253622"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-19T16:46:47Z",
"details": "moderate"
}
],
"title": "CVE-2025-40192"
},
{
"cve": "CVE-2025-40194",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40194"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\ncpufreq: intel_pstate: Fix object lifecycle issue in update_qos_request()\n\nThe cpufreq_cpu_put() call in update_qos_request() takes place too early\nbecause the latter subsequently calls freq_qos_update_request() that\nindirectly accesses the policy object in question through the QoS request\nobject passed to it.\n\nFortunately, update_qos_request() is called under intel_pstate_driver_lock,\nso this issue does not matter for changing the intel_pstate operation\nmode, but it theoretically can cause a crash to occur on CPU device hot\nremoval (which currently can only happen in virt, but it is formally\nsupported nevertheless).\n\nAddress this issue by modifying update_qos_request() to drop the\nreference to the policy later.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40194",
"url": "https://www.suse.com/security/cve/CVE-2025-40194"
},
{
"category": "external",
"summary": "SUSE Bug 1253445 for CVE-2025-40194",
"url": "https://bugzilla.suse.com/1253445"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.7,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-19T16:46:47Z",
"details": "moderate"
}
],
"title": "CVE-2025-40194"
},
{
"cve": "CVE-2025-40196",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40196"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nfs: quota: create dedicated workqueue for quota_release_work\n\nThere is a kernel panic due to WARN_ONCE when panic_on_warn is set.\n\nThis issue occurs when writeback is triggered due to sync call for an\nopened file(ie, writeback reason is WB_REASON_SYNC). When f2fs balance\nis needed at sync path, flush for quota_release_work is triggered.\nBy default quota_release_work is queued to \"events_unbound\" queue which\ndoes not have WQ_MEM_RECLAIM flag. During f2fs balance \"writeback\"\nworkqueue tries to flush quota_release_work causing kernel panic due to\nMEM_RECLAIM flag mismatch errors.\n\nThis patch creates dedicated workqueue with WQ_MEM_RECLAIM flag\nfor work quota_release_work.\n\n------------[ cut here ]------------\nWARNING: CPU: 4 PID: 14867 at kernel/workqueue.c:3721 check_flush_dependency+0x13c/0x148\nCall trace:\n check_flush_dependency+0x13c/0x148\n __flush_work+0xd0/0x398\n flush_delayed_work+0x44/0x5c\n dquot_writeback_dquots+0x54/0x318\n f2fs_do_quota_sync+0xb8/0x1a8\n f2fs_write_checkpoint+0x3cc/0x99c\n f2fs_gc+0x190/0x750\n f2fs_balance_fs+0x110/0x168\n f2fs_write_single_data_page+0x474/0x7dc\n f2fs_write_data_pages+0x7d0/0xd0c\n do_writepages+0xe0/0x2f4\n __writeback_single_inode+0x44/0x4ac\n writeback_sb_inodes+0x30c/0x538\n wb_writeback+0xf4/0x440\n wb_workfn+0x128/0x5d4\n process_scheduled_works+0x1c4/0x45c\n worker_thread+0x32c/0x3e8\n kthread+0x11c/0x1b0\n ret_from_fork+0x10/0x20\nKernel panic - not syncing: kernel: panic_on_warn set ...",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40196",
"url": "https://www.suse.com/security/cve/CVE-2025-40196"
},
{
"category": "external",
"summary": "SUSE Bug 1253624 for CVE-2025-40196",
"url": "https://bugzilla.suse.com/1253624"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 3.3,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-19T16:46:47Z",
"details": "low"
}
],
"title": "CVE-2025-40196"
},
{
"cve": "CVE-2025-40197",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40197"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nmedia: mc: Clear minor number before put device\n\nThe device minor should not be cleared after the device is released.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40197",
"url": "https://www.suse.com/security/cve/CVE-2025-40197"
},
{
"category": "external",
"summary": "SUSE Bug 1253450 for CVE-2025-40197",
"url": "https://bugzilla.suse.com/1253450"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-19T16:46:47Z",
"details": "moderate"
}
],
"title": "CVE-2025-40197"
},
{
"cve": "CVE-2025-40198",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40198"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\next4: avoid potential buffer over-read in parse_apply_sb_mount_options()\n\nUnlike other strings in the ext4 superblock, we rely on tune2fs to\nmake sure s_mount_opts is NUL terminated. Harden\nparse_apply_sb_mount_options() by treating s_mount_opts as a potential\n__nonstring.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40198",
"url": "https://www.suse.com/security/cve/CVE-2025-40198"
},
{
"category": "external",
"summary": "SUSE Bug 1253453 for CVE-2025-40198",
"url": "https://bugzilla.suse.com/1253453"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-19T16:46:47Z",
"details": "moderate"
}
],
"title": "CVE-2025-40198"
},
{
"cve": "CVE-2025-40200",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40200"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nSquashfs: reject negative file sizes in squashfs_read_inode()\n\nSyskaller reports a \"WARNING in ovl_copy_up_file\" in overlayfs.\n\nThis warning is ultimately caused because the underlying Squashfs file\nsystem returns a file with a negative file size.\n\nThis commit checks for a negative file size and returns EINVAL.\n\n[phillip@squashfs.org.uk: only need to check 64 bit quantity]",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40200",
"url": "https://www.suse.com/security/cve/CVE-2025-40200"
},
{
"category": "external",
"summary": "SUSE Bug 1253448 for CVE-2025-40200",
"url": "https://bugzilla.suse.com/1253448"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-19T16:46:47Z",
"details": "moderate"
}
],
"title": "CVE-2025-40200"
},
{
"cve": "CVE-2025-40201",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40201"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nkernel/sys.c: fix the racy usage of task_lock(tsk-\u003egroup_leader) in sys_prlimit64() paths\n\nThe usage of task_lock(tsk-\u003egroup_leader) in sys_prlimit64()-\u003edo_prlimit()\npath is very broken.\n\nsys_prlimit64() does get_task_struct(tsk) but this only protects task_struct\nitself. If tsk != current and tsk is not a leader, this process can exit/exec\nand task_lock(tsk-\u003egroup_leader) may use the already freed task_struct.\n\nAnother problem is that sys_prlimit64() can race with mt-exec which changes\n-\u003egroup_leader. In this case do_prlimit() may take the wrong lock, or (worse)\n-\u003egroup_leader may change between task_lock() and task_unlock().\n\nChange sys_prlimit64() to take tasklist_lock when necessary. This is not\nnice, but I don\u0027t see a better fix for -stable.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40201",
"url": "https://www.suse.com/security/cve/CVE-2025-40201"
},
{
"category": "external",
"summary": "SUSE Bug 1253455 for CVE-2025-40201",
"url": "https://bugzilla.suse.com/1253455"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-19T16:46:47Z",
"details": "moderate"
}
],
"title": "CVE-2025-40201"
},
{
"cve": "CVE-2025-40202",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40202"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nipmi: Rework user message limit handling\n\nThe limit on the number of user messages had a number of issues,\nimproper counting in some cases and a use after free.\n\nRestructure how this is all done to handle more in the receive message\nallocation routine, so all refcouting and user message limit counts\nare done in that routine. It\u0027s a lot cleaner and safer.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40202",
"url": "https://www.suse.com/security/cve/CVE-2025-40202"
},
{
"category": "external",
"summary": "SUSE Bug 1253451 for CVE-2025-40202",
"url": "https://bugzilla.suse.com/1253451"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-19T16:46:47Z",
"details": "moderate"
}
],
"title": "CVE-2025-40202"
},
{
"cve": "CVE-2025-40203",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40203"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nlistmount: don\u0027t call path_put() under namespace semaphore\n\nMassage listmount() and make sure we don\u0027t call path_put() under the\nnamespace semaphore. If we put the last reference we\u0027re fscked.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40203",
"url": "https://www.suse.com/security/cve/CVE-2025-40203"
},
{
"category": "external",
"summary": "SUSE Bug 1253457 for CVE-2025-40203",
"url": "https://bugzilla.suse.com/1253457"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-19T16:46:47Z",
"details": "moderate"
}
],
"title": "CVE-2025-40203"
},
{
"cve": "CVE-2025-40204",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40204"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nsctp: Fix MAC comparison to be constant-time\n\nTo prevent timing attacks, MACs need to be compared in constant time.\nUse the appropriate helper function for this.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40204",
"url": "https://www.suse.com/security/cve/CVE-2025-40204"
},
{
"category": "external",
"summary": "SUSE Bug 1253436 for CVE-2025-40204",
"url": "https://bugzilla.suse.com/1253436"
},
{
"category": "external",
"summary": "SUSE Bug 1253437 for CVE-2025-40204",
"url": "https://bugzilla.suse.com/1253437"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-19T16:46:47Z",
"details": "important"
}
],
"title": "CVE-2025-40204"
},
{
"cve": "CVE-2025-40205",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40205"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nbtrfs: avoid potential out-of-bounds in btrfs_encode_fh()\n\nThe function btrfs_encode_fh() does not properly account for the three\ncases it handles.\n\nBefore writing to the file handle (fh), the function only returns to the\nuser BTRFS_FID_SIZE_NON_CONNECTABLE (5 dwords, 20 bytes) or\nBTRFS_FID_SIZE_CONNECTABLE (8 dwords, 32 bytes).\n\nHowever, when a parent exists and the root ID of the parent and the\ninode are different, the function writes BTRFS_FID_SIZE_CONNECTABLE_ROOT\n(10 dwords, 40 bytes).\n\nIf *max_len is not large enough, this write goes out of bounds because\nBTRFS_FID_SIZE_CONNECTABLE_ROOT is greater than\nBTRFS_FID_SIZE_CONNECTABLE originally returned.\n\nThis results in an 8-byte out-of-bounds write at\nfid-\u003eparent_root_objectid = parent_root_id.\n\nA previous attempt to fix this issue was made but was lost.\n\nhttps://lore.kernel.org/all/4CADAEEC020000780001B32C@vpn.id2.novell.com/\n\nAlthough this issue does not seem to be easily triggerable, it is a\npotential memory corruption bug that should be fixed. This patch\nresolves the issue by ensuring the function returns the appropriate size\nfor all three cases and validates that *max_len is large enough before\nwriting any data.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40205",
"url": "https://www.suse.com/security/cve/CVE-2025-40205"
},
{
"category": "external",
"summary": "SUSE Bug 1253456 for CVE-2025-40205",
"url": "https://bugzilla.suse.com/1253456"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-19T16:46:47Z",
"details": "moderate"
}
],
"title": "CVE-2025-40205"
},
{
"cve": "CVE-2025-40206",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40206"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nnetfilter: nft_objref: validate objref and objrefmap expressions\n\nReferencing a synproxy stateful object from OUTPUT hook causes kernel\ncrash due to infinite recursive calls:\n\nBUG: TASK stack guard page was hit at 000000008bda5b8c (stack is 000000003ab1c4a5..00000000494d8b12)\n[...]\nCall Trace:\n __find_rr_leaf+0x99/0x230\n fib6_table_lookup+0x13b/0x2d0\n ip6_pol_route+0xa4/0x400\n fib6_rule_lookup+0x156/0x240\n ip6_route_output_flags+0xc6/0x150\n __nf_ip6_route+0x23/0x50\n synproxy_send_tcp_ipv6+0x106/0x200\n synproxy_send_client_synack_ipv6+0x1aa/0x1f0\n nft_synproxy_do_eval+0x263/0x310\n nft_do_chain+0x5a8/0x5f0 [nf_tables\n nft_do_chain_inet+0x98/0x110\n nf_hook_slow+0x43/0xc0\n __ip6_local_out+0xf0/0x170\n ip6_local_out+0x17/0x70\n synproxy_send_tcp_ipv6+0x1a2/0x200\n synproxy_send_client_synack_ipv6+0x1aa/0x1f0\n[...]\n\nImplement objref and objrefmap expression validate functions.\n\nCurrently, only NFT_OBJECT_SYNPROXY object type requires validation.\nThis will also handle a jump to a chain using a synproxy object from the\nOUTPUT hook.\n\nNow when trying to reference a synproxy object in the OUTPUT hook, nft\nwill produce the following error:\n\nsynproxy_crash.nft: Error: Could not process rule: Operation not supported\n synproxy name mysynproxy\n ^^^^^^^^^^^^^^^^^^^^^^^^",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40206",
"url": "https://www.suse.com/security/cve/CVE-2025-40206"
},
{
"category": "external",
"summary": "SUSE Bug 1253393 for CVE-2025-40206",
"url": "https://bugzilla.suse.com/1253393"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.1,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-19T16:46:47Z",
"details": "moderate"
}
],
"title": "CVE-2025-40206"
},
{
"cve": "CVE-2025-40207",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40207"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nmedia: v4l2-subdev: Fix alloc failure check in v4l2_subdev_call_state_try()\n\nv4l2_subdev_call_state_try() macro allocates a subdev state with\n__v4l2_subdev_state_alloc(), but does not check the returned value. If\n__v4l2_subdev_state_alloc fails, it returns an ERR_PTR, and that would\ncause v4l2_subdev_call_state_try() to crash.\n\nAdd proper error handling to v4l2_subdev_call_state_try().",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40207",
"url": "https://www.suse.com/security/cve/CVE-2025-40207"
},
{
"category": "external",
"summary": "SUSE Bug 1253395 for CVE-2025-40207",
"url": "https://bugzilla.suse.com/1253395"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-19T16:46:47Z",
"details": "moderate"
}
],
"title": "CVE-2025-40207"
}
]
}
SUSE-SU-2026:1081-1
Vulnerability from csaf_suse - Published: 2026-03-26 13:23 - Updated: 2026-03-26 13:23| URL | Category | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
{
"document": {
"aggregate_severity": {
"namespace": "https://www.suse.com/support/security/rating/",
"text": "important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright 2024 SUSE LLC. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Security update for the Linux Kernel",
"title": "Title of the patch"
},
{
"category": "description",
"text": "\nThe SUSE Linux Enterprise 15 SP7 kernel was updated to fix various security issues\n\nThe following security issues were fixed:\n\n- CVE-2023-53817: crypto: lib/mpi - avoid null pointer deref in mpi_cmp_ui() (bsc#1254992).\n- CVE-2025-37861: scsi: mpi3mr: Synchronous access b/w reset and tm thread for reply queue (bsc#1243055).\n- CVE-2025-39748: bpf: Forget ranges when refining tnum after JSET (bsc#1249587).\n- CVE-2025-39817: efivarfs: Fix slab-out-of-bounds in efivarfs_d_compare (bsc#1249998).\n- CVE-2025-39964: crypto: af_alg - Disallow concurrent writes in af_alg_sendmsg (bsc#1251966).\n- CVE-2025-40099: cifs: parse_dfs_referrals: prevent oob on malformed input (bsc#1252911).\n- CVE-2025-40103: smb: client: Fix refcount leak for cifs_sb_tlink (bsc#1252924).\n- CVE-2025-40201: kernel/sys.c: fix the racy usage of task_lock(tsk-\u003egroup_leader) in sys_prlimit64() paths\n (bsc#1253455).\n- CVE-2025-40253: s390/ctcm: Fix double-kfree (bsc#1255084).\n- CVE-2025-68283: libceph: replace BUG_ON with bounds check for map-\u003emax_osd (bsc#1255379).\n- CVE-2025-68295: smb: client: fix memory leak in cifs_construct_tcon() (bsc#1255129).\n- CVE-2025-68374: md: fix rcu protection in md_wakeup_thread (bsc#1255530).\n- CVE-2025-68735: drm/panthor: Prevent potential UAF in group creation (bsc#1255811).\n- CVE-2025-68736: landlock: Fix handling of disconnected directories (bsc#1255698).\n- CVE-2025-68778: btrfs: don\u0027t log conflicting inode if it\u0027s a dir moved in the current transaction (bsc#1256683).\n- CVE-2025-68785: net: openvswitch: fix middle attribute validation in push_nsh() action (bsc#1256640).\n- CVE-2025-68810: KVM: Disallow toggling KVM_MEM_GUEST_MEMFD on an existing memslot (bsc#1256679).\n- CVE-2025-71066: net/sched: ets: Always remove class from active list before deleting in ets_qdisc_change\n (bsc#1256645).\n- CVE-2025-71071: iommu/mediatek: fix use-after-free on probe deferral (bsc#1256802).\n- CVE-2025-71104: KVM: x86: Fix VM hard lockup after prolonged inactivity with periodic HV timer (bsc#1256708).\n- CVE-2025-71113: crypto: af_alg - zero initialize memory allocated via sock_kmalloc (bsc#1256716).\n- CVE-2025-71125: tracing: Do not register unsupported perf events (bsc#1256784).\n- CVE-2025-71126: mptcp: reset fallback status gracefully at disconnect() time (bsc#1256755).\n- CVE-2025-71148: net/handshake: restore destructor on submit failure (bsc#1257159).\n- CVE-2025-71184: btrfs: fix NULL dereference on root when tracing inode eviction (bsc#1257635).\n- CVE-2025-71194: btrfs: fix deadlock in wait_current_trans() due to ignored transaction type (bsc#1257687).\n- CVE-2025-71225: md: suspend array while updating raid_disks via sysfs (bsc#1258411).\n- CVE-2026-22979: net: fix memory leak in skb_segment_list for GRO packets (bsc#1257228).\n- CVE-2026-22982: net: mscc: ocelot: Fix crash when adding interface under a lag (bsc#1257179).\n- CVE-2026-22998: nvme-tcp: fix NULL pointer dereferences in nvmet_tcp_build_pdu_iovec (bsc#1257209).\n- CVE-2026-23003: geneve: Fix incorrect inner network header offset when innerprotoinherit is set (bsc#1257246).\n- CVE-2026-23004: dst: fix races in rt6_uncached_list_del() and rt_del_uncached_list() (bsc#1257231).\n- CVE-2026-23010: ipv6: Fix use-after-free in inet6_addr_del() (bsc#1257332).\n- CVE-2026-23017: idpf: fix error handling in the init_task on load (bsc#1257552).\n- CVE-2026-23023: idpf: fix memory leak in idpf_vport_rel() (bsc#1257556).\n- CVE-2026-23035: net/mlx5e: Pass netdev to mlx5e_destroy_netdev instead of priv (bsc#1257559).\n- CVE-2026-23053: NFS: Fix a deadlock involving nfs_release_folio() (bsc#1257718).\n- CVE-2026-23057: vsock/virtio: Coalesce only linear skb (bsc#1257740).\n- CVE-2026-23060: crypto: authencesn - reject too-short AAD (assoclen\u003c8) to match ESP/ESN spec (bsc#1257735).\n- CVE-2026-23064: net/sched: act_ife: avoid possible NULL deref (bsc#1257765).\n- CVE-2026-23069: vsock/virtio: fix potential underflow in virtio_transport_get_credit() (bsc#1257755).\n- CVE-2026-23070: Octeontx2-af: Add proper checks for fwdata (bsc#1257709).\n- CVE-2026-23074: net/sched: Enforce that teql can only be used as root qdisc (bsc#1257749).\n- CVE-2026-23083: fou: Don\u0027t allow 0 for FOU_ATTR_IPPROTO (bsc#1257745).\n- CVE-2026-23084: be2net: Fix NULL pointer dereference in be_cmd_get_mac_from_list (bsc#1257830).\n- CVE-2026-23085: irqchip/gic-v3-its: Avoid truncating memory addresses (bsc#1257758).\n- CVE-2026-23086: vsock/virtio: cap TX credit to local buffer size (bsc#1257757).\n- CVE-2026-23088: tracing: Fix crash on synthetic stacktrace field usage (bsc#1257814).\n- CVE-2026-23089: ALSA: usb-audio: Fix use-after-free in snd_usb_mixer_free() (bsc#1257790).\n- CVE-2026-23095: gue: Fix skb memleak with inner IP protocol 0 (bsc#1257808).\n- CVE-2026-23099: bonding: limit BOND_MODE_8023AD to Ethernet devices (bsc#1257816).\n- CVE-2026-23102: arm64/fpsimd: signal: Mandate SVE payload for streaming-mode state (bsc#1257772).\n- CVE-2026-23104: ice: fix devlink reload call trace (bsc#1257763).\n- CVE-2026-23105: net/sched: qfq: Use cl_is_active to determine whether class is active in qfq_rm_from_ag (bsc#1257775).\n- CVE-2026-23107: arm64/fpsimd: signal: Allocate SSVE storage when restoring ZA (bsc#1257762).\n- CVE-2026-23110: scsi: core: Wake up the error handler when final completions race against each other (bsc#1257761).\n- CVE-2026-23111: netfilter: nf_tables: fix inverted genmask check in nft_map_catchall_activate() (bsc#1258181).\n- CVE-2026-23112: nvmet-tcp: add bounds checks in nvmet_tcp_build_pdu_iovec (bsc#1258184).\n- CVE-2026-23113: io_uring/io-wq: check IO_WQ_BIT_EXIT inside work run loop (bsc#1258278).\n- CVE-2026-23116: pmdomain: imx8m-blk-ctrl: Remove separate rst and clk mask for 8mq vpu (bsc#1258277).\n- CVE-2026-23119: bonding: provide a net pointer to __skb_flow_dissect() (bsc#1258273).\n- CVE-2026-23125: sctp: move SCTP_CMD_ASSOC_SHKEY right after SCTP_CMD_PEER_INIT (bsc#1258293).\n- CVE-2026-23139: netfilter: nf_conncount: update last_gc only when GC has been performed (bsc#1258304).\n- CVE-2026-23141: btrfs: send: check for inline extents in range_is_hole_in_parent() (bsc#1258377).\n- CVE-2026-23154: net: fix segmentation of forwarding fraglist GRO (bsc#1258286).\n- CVE-2026-23166: ice: Fix NULL pointer dereference in ice_vsi_set_napi_queues (bsc#1258272).\n- CVE-2026-23169: mptcp: fix race in mptcp_pm_nl_flush_addrs_doit() (bsc#1258389).\n- CVE-2026-23171: net: bonding: update the slave array for broadcast mode (bsc#1258349).\n- CVE-2026-23173: net/mlx5e: TC, delete flows only for existing peers (bsc#1258520).\n- CVE-2026-23179: nvmet-tcp: fixup hang in nvmet_tcp_listen_data_ready() (bsc#1258394).\n- CVE-2026-23191: ALSA: aloop: Fix racy access at PCM trigger (bsc#1258395).\n- CVE-2026-23198: KVM: Don\u0027t clobber irqfd routing type when deassigning irqfd (bsc#1258321).\n- CVE-2026-23204: net/sched: cls_u32: use skb_header_pointer_careful() (bsc#1258340).\n- CVE-2026-23208: ALSA: usb-audio: Prevent excessive number of frames (bsc#1258468).\n- CVE-2026-23209: macvlan: fix error recovery in macvlan_common_newlink() (bsc#1258518).\n- CVE-2026-23210: ice: Fix PTP NULL pointer dereference during VSI rebuild (bsc#1258517).\n- CVE-2026-23213: drm/amd/pm: Disable MMIO access during SMU Mode 1 reset (bsc#1258465).\n- CVE-2026-23214: btrfs: reject new transactions if the fs is fully read-only (bsc#1258464).\n- CVE-2026-23268: apparmor: fix unprivileged local user can do privileged policy management (bsc#1258850).\n- CVE-2026-23269: apparmor: validate DFA start states are in bounds in unpack_pdb (bsc#1259857).\n\nThe following non security issues were fixed:\n\n- ACPI: CPPC: Fix remaining for_each_possible_cpu() to use online CPUs (git-fixes).\n- ACPI: OSL: fix __iomem type on return from acpi_os_map_generic_address() (git-fixes).\n- ACPI: PM: Add unused power resource quirk for THUNDEROBOT ZERO (git-fixes).\n- ACPI: processor: Fix NULL-pointer dereference in acpi_processor_errata_piix4() (stable-fixes).\n- ACPICA: Abort AML bytecode execution when executing AML_FATAL_OP (stable-fixes).\n- ACPICA: Fix NULL pointer dereference in acpi_ev_address_space_dispatch() (git-fixes).\n- ALSA: hda/conexant: Add headset mic fix for MECHREVO Wujie 15X Pro (stable-fixes).\n- ALSA: hda/realtek - fixed speaker no sound (stable-fixes).\n- ALSA: hda/realtek: add HP Laptop 15s-eq1xxx mute LED quirk (stable-fixes).\n- ALSA: hda/realtek: Add quirk for Inspur S14-G1 (stable-fixes).\n- ALSA: hda/realtek: Fix headset mic for TongFang X6AR55xU (stable-fixes).\n- ALSA: hda/realtek: fix right sounds and mute/micmute LEDs for HP machine (stable-fixes).\n- ALSA: hda/realtek: Really fix headset mic for TongFang X6AR55xU (git-fixes).\n- ALSA: usb-audio: Add iface reset and delay quirk for AB13X USB Audio (stable-fixes).\n- ALSA: usb-audio: Add sanity check for OOB writes at silencing (stable-fixes).\n- ALSA: usb-audio: Avoid implicit feedback mode on DIYINHK USB Audio 2.0 (stable-fixes).\n- ALSA: usb-audio: Cap the packet size pre-calculations (git-fixes).\n- ALSA: usb-audio: Check max frame size for implicit feedback mode, too (stable-fixes).\n- ALSA: usb-audio: fix broken logic in snd_audigy2nx_led_update() (git-fixes).\n- ALSA: usb-audio: Remove VALIDATE_RATES quirk for Focusrite devices (git-fixes).\n- ALSA: usb-audio: Update the number of packets properly at receiving (stable-fixes).\n- ALSA: usb-audio: Use correct version for UAC3 header validation (git-fixes).\n- ALSA: usb-audio: Use inclusive terms (git-fixes).\n- ALSA: vmaster: Relax __free() variable declarations (git-fixes).\n- APEI/GHES: ensure that won\u0027t go past CPER allocated record (stable-fixes).\n- apparmor: fix differential encoding verification (bsc#1258849).\n- apparmor: Fix double free of ns_name in aa_replace_profiles() (bsc#1258849).\n- apparmor: fix memory leak in verify_header (bsc#1258849).\n- apparmor: fix missing bounds check on DEFAULT table in verify_dfa() (bsc#1258849).\n- apparmor: fix race between freeing data and fs accessing it (bsc#1258849).\n- apparmor: fix race on rawdata dereference (bsc#1258849).\n- apparmor: fix side-effect bug in match_char() macro usage (bsc#1258849).\n- apparmor: fix unprivileged local user can do privileged policy management (bsc#1258849).\n- apparmor: fix: limit the number of levels of policy namespaces (bsc#1258849).\n- apparmor: replace recursive profile removal with iterative approach (bsc#1258849).\n- apparmor: validate DFA start states are in bounds in unpack_pdb (bsc#1258849).\n- arm64: Add support for TSV110 Spectre-BHB mitigation (git-fixes).\n- arm64: Disable branch profiling for all arm64 code (git-fixes).\n- arm64: Set __nocfi on swsusp_arch_resume() (git-fixes).\n- ASoC: amd: drop unused Kconfig symbols (git-fixes).\n- ASoC: amd: fix memory leak in acp3x pdm dma ops (git-fixes).\n- ASoC: amd: yc: Add ASUS ExpertBook PM1503CDA to quirks list (stable-fixes).\n- ASoC: amd: yc: Add DMI quirk for Acer TravelMate P216-41-TCO (stable-fixes).\n- ASoC: amd: yc: Add DMI quirk for ASUS Vivobook Pro 15X M6501RR (stable-fixes).\n- ASoC: amd: yc: Add quirk for HP 200 G2a 16 (stable-fixes).\n- ASoC: amd: yc: Fix microphone on ASUS M6500RE (stable-fixes).\n- ASoC: codecs: max98390: Check return value of devm_gpiod_get_optional() in max98390_i2c_probe() (stable-fixes).\n- ASoC: cs35l45: Corrects ASP_TX5 DAPM widget channel (stable-fixes).\n- ASoC: cs42l43: Correct handling of 3-pole jack load detection (stable-fixes).\n- ASoC: davinci-evm: Fix reference leak in davinci_evm_probe (stable-fixes).\n- ASoC: Intel: sof_es8336: Add DMI quirk for Huawei BOD-WXX9 (stable-fixes).\n- ASoC: nau8821: Avoid unnecessary blocking in IRQ handler (stable-fixes).\n- ASoC: nau8821: Cancel delayed work on component remove (git-fixes).\n- ASoC: nau8821: Cancel pending work before suspend (git-fixes).\n- ASoC: nau8821: Consistently clear interrupts before unmasking (git-fixes).\n- ASoC: nau8821: Fixup nau8821_enable_jack_detect() (git-fixes).\n- ASoC: pxa: drop unused Kconfig symbol (git-fixes).\n- ASoC: rockchip: i2s-tdm: Use param rate if not provided by set_sysclk (git-fixes).\n- ASoC: SOF: ipc4-control: If there is no data do not send bytes update (git-fixes).\n- ASoC: SOF: ipc4-control: Keep the payload size up to date (git-fixes).\n- ASoC: SOF: ipc4-control: Use the correct size for scontrol-\u003eipc_control_data (git-fixes).\n- ASoC: SOF: ipc4-topology: Correct the allocation size for bytes controls (git-fixes).\n- ASoC: sunxi: sun50i-dmic: Add missing check for devm_regmap_init_mmio (stable-fixes).\n- ASoC: tlv320adcx140: Propagate error codes during probe (stable-fixes).\n- ASoC: wm8962: Add WM8962_ADC_MONOMIX to \u00273D Coefficients\u0027 mask (stable-fixes).\n- ASoC: wm8962: Don\u0027t report a microphone if it\u0027s shorted to ground on plug (stable-fixes).\n- ata: libata: avoid long timeouts on hot-unplugged SATA DAS (stable-fixes).\n- ata: pata_ftide010: Fix some DMA timings (git-fixes).\n- atm: fore200e: fix use-after-free in tasklets during device removal (git-fixes).\n- auxdisplay: arm-charlcd: fix release_mem_region() size (git-fixes).\n- backlight: qcom-wled: Change PM8950 WLED configurations (git-fixes).\n- backlight: qcom-wled: Support ovp values for PMI8994 (git-fixes).\n- batman-adv: Avoid double-rtnl_lock ELP metric worker (git-fixes).\n- block,bfq: fix aux stat accumulation destination (git-fixes).\n- Bluetooth: btintel_pcie: Use IRQF_ONESHOT and default primary handler (git-fixes).\n- Bluetooth: btusb: Add device ID for Realtek RTL8761BU (stable-fixes).\n- Bluetooth: btusb: Add new VID/PID for RTL8852CE (stable-fixes).\n- Bluetooth: btusb: Add USB ID 7392:e611 for Edimax EW-7611UXB (stable-fixes).\n- Bluetooth: hci_conn: Set link_policy on incoming ACL connections (stable-fixes).\n- Bluetooth: hci_conn: use mod_delayed_work for active mode timeout (stable-fixes).\n- Bluetooth: hci_qca: Cleanup on all setup failures (git-fixes).\n- Bluetooth: L2CAP: Fix invalid response to L2CAP_ECRED_RECONF_REQ (git-fixes).\n- Bluetooth: L2CAP: Fix missing key size check for L2CAP_LE_CONN_REQ (git-fixes).\n- Bluetooth: L2CAP: Fix not checking output MTU is acceptable on L2CAP_ECRED_CONN_REQ (git-fixes).\n- Bluetooth: L2CAP: Fix response to L2CAP_ECRED_CONN_REQ (git-fixes).\n- Bluetooth: L2CAP: Fix result of L2CAP_ECRED_CONN_RSP when MTU is too short (git-fixes).\n- bonding: only set speed/duplex to unknown, if getting speed failed (bsc#1253691).\n- bpf: selftests: Move xfrm tunnel test to test_progs (bsc#1258860).\n- bpf: selftests: test_tunnel: Setup fresh topology for each subtest (bsc#1258860).\n- bpf: selftests: test_tunnel: Use vmlinux.h declarations (bsc#1258860).\n- bpf: verifier improvement in 32bit shift sign extension pattern (git-fixes).\n- bpf: xfrm: Add bpf_xdp_get_xfrm_state() kfunc (bsc#1258860).\n- bpf: xfrm: Add selftest for bpf_xdp_get_xfrm_state() (bsc#1258860).\n- btrfs: scrub: always update btrfs_scrub_progress::last_physical (git-fixes).\n- bus: fsl-mc: fix an error handling in fsl_mc_device_add() (git-fixes).\n- bus: fsl-mc: fix use-after-free in driver_override_show() (git-fixes).\n- bus: fsl-mc: Replace snprintf and sprintf with sysfs_emit in sysfs show functions (stable-fixes).\n- can: bcm: fix locking for bcm_op runtime updates (git-fixes).\n- can: ems_usb: ems_usb_read_bulk_callback(): check the proper length of a message (git-fixes).\n- can: hi311x: hi3110_open(): add check for hi3110_power_enable() return value (git-fixes).\n- can: mcp251x: fix deadlock in error path of mcp251x_open (git-fixes).\n- can: ucan: Fix infinite loop from zero-length messages (git-fixes).\n- can: usb: etas_es58x: correctly anchor the urb in the read bulk callback (git-fixes).\n- cgroup: Fix incorrect WARN_ON_ONCE() in css_release_work_fn() (bsc#1256564 bsc#1259130).\n- cgroup: Show # of subsystem CSSes in cgroup.stat (bsc#1256564 bsc#1259130).\n- char: tpm: cr50: Remove IRQF_ONESHOT (git-fixes).\n- char: tpm: cr50: Remove IRQF_ONESHOT (stable-fixes).\n- cifs: add xid to query server interface call (git-fixes).\n- clk: clk-apple-nco: Add \u0027apple,t8103-nco\u0027 compatible (git-fixes).\n- clk: mediatek: Fix error handling in runtime PM setup (git-fixes).\n- clk: meson: g12a: Limit the HDMI PLL OD to /4 (git-fixes).\n- clk: meson: gxbb: Limit the HDMI PLL OD to /4 on GXL/GXM SoCs (git-fixes).\n- clk: mvebu: cp110 add CLK_IGNORE_UNUSED to pcie_x10, pcie_x11 \u0026 (git-fixes).\n- clk: qcom: dispcc-sdm845: Enable parents for pixel clocks (git-fixes).\n- clk: qcom: gcc-msm8917: Remove ALWAYS_ON flag from cpp_gdsc (git-fixes).\n- clk: qcom: gcc-msm8953: Remove ALWAYS_ON flag from cpp_gdsc (git-fixes).\n- clk: qcom: gfx3d: add parent to parent request map (git-fixes).\n- clk: qcom: rcg2: compute 2d using duty fraction directly (git-fixes).\n- clk: renesas: rzg2l: Fix intin variable size (git-fixes).\n- clk: renesas: rzg2l: Select correct div round macro (git-fixes).\n- clk: tegra: tegra124-emc: fix device leak on set_rate() (git-fixes).\n- clk: tegra: tegra124-emc: Fix potential memory leak in tegra124_clk_register_emc() (git-fixes).\n- clocksource: hyper-v: Fix warnings for missing export.h header inclusion (git-fixes).\n- clocksource: Print durations for sync check unconditionally (bsc#1241345).\n- clocksource: Reduce watchdog readout delay limit to prevent false positives (bsc#1241345).\n- config.conf: add kernel-azure as additonal flavor (bsc#1258037).\n- config.conf: Drop armv7hl builds (bsc#1255265).\n- cpu: export lockdep_assert_cpus_held() (git-fixes).\n- cpufreq/amd-pstate: Add missing NULL ptr check in amd_pstate_update (bsc#1247180).\n- cpufreq/amd-pstate: Add the missing cpufreq_cpu_put() (bsc#1247180).\n- cpufreq/amd-pstate: fix setting policy current frequency value (bsc#1247180).\n- cpufreq/amd-pstate: Fix the clamping of perf values (bsc#1247180).\n- cpufreq/amd-pstate: Modularize perf\u003c-\u003efreq conversion (bsc#1247180).\n- cpufreq/amd-pstate: Refactor max frequency calculation (bsc#1247180).\n- cpufreq/amd-pstate: store all values in cpudata struct in khz (bsc#1247180).\n- cpufreq: amd-pstate: Unify computation of {max,min,nominal,lowest_nonlinear}_freq (bsc#1247180).\n- crypto: cavium - fix dma_free_coherent() size (git-fixes).\n- crypto: ccp - Add an S4 restore flow (git-fixes).\n- crypto: hisilicon/sec2 - support skcipher/aead fallback for hardware queue unavailable (git-fixes).\n- crypto: hisilicon/trng - support tfms sharing the device (git-fixes).\n- crypto: hisilicon/zip - adjust the way to obtain the req in the callback function (git-fixes).\n- crypto: iaa - Fix out-of-bounds index in find_empty_iaa_compression_mode (git-fixes).\n- crypto: octeontx - fix dma_free_coherent() size (git-fixes).\n- crypto: octeontx - Fix length check to avoid truncation in ucode_load_store (git-fixes).\n- crypto: omap - Allocate OMAP_CRYPTO_FORCE_COPY scatterlists correctly (git-fixes).\n- crypto: qat - fix parameter order used in ICP_QAT_FW_COMN_FLAGS_BUILD (git-fixes).\n- crypto: qat - fix warning on adf_pfvf_pf_proto.c (git-fixes).\n- crypto: virtio - Add spinlock protection with virtqueue notification (git-fixes).\n- crypto: virtio - Remove duplicated virtqueue_kick in virtio_crypto_skcipher_crypt_req (git-fixes).\n- device property: Allow secondary lookup in fwnode_get_next_child_node() (git-fixes).\n- dm mpath: make pg_init_delay_msecs settable (git-fixes).\n- dm-bufio: align write boundary on physical block size (git-fixes).\n- dm-ebs: Mark full buffer dirty even on partial write (git-fixes).\n- dm-snapshot: fix \u0027scheduling while atomic\u0027 on real-time kernels (git-fixes).\n- dm: clear cloned request bio pointer when last clone bio completes (git-fixes).\n- dm: remove fake timeout to avoid leak request (git-fixes).\n- dma: dma-axi-dmac: fix SW cyclic transfers (git-fixes).\n- dmaengine: mediatek: uart-apdma: Fix above 4G addressing TX/RX (git-fixes).\n- dmaengine: sun6i: Choose appropriate burst length under maxburst (stable-fixes).\n- Documentation: mailbox: mbox_chan_ops.flush() is optional (git-fixes).\n- Documentation: PCI: endpoint: Fix ntb/vntb copy \u0026 paste errors (git-fixes).\n- drivers/hv: add CPU offlining support (git-fixes).\n- drivers/hv: introduce vmbus_channel_set_cpu() (git-fixes).\n- Drivers: hv: Allocate interrupt and monitor pages aligned to system page boundary (git-fixes).\n- Drivers: hv: Always do Hyper-V panic notification in hv_kmsg_dump() (git-fixes).\n- Drivers: hv: Fix bad pointer dereference in hv_get_partition_id (git-fixes).\n- Drivers: hv: fix missing kernel-doc description for \u0027size\u0027 in request_arr_init() (git-fixes).\n- Drivers: hv: Fix the check for HYPERVISOR_CALLBACK_VECTOR (git-fixes).\n- Drivers: hv: Fix warnings for missing export.h header inclusion (git-fixes).\n- Drivers: hv: remove stale comment (git-fixes).\n- Drivers: hv: Resolve ambiguity in hypervisor version log (git-fixes).\n- Drivers: hv: use kmalloc_array() instead of kmalloc() (git-fixes).\n- Drivers: hv: Use kzalloc for panic page allocation (git-fixes).\n- Drivers: hv: util: Cosmetic changes for hv_utils_transport.c (git-fixes).\n- Drivers: hv: vmbus: Add comments about races with \u0027channels\u0027 sysfs dir (git-fixes).\n- Drivers: hv: vmbus: Clean up sscanf format specifier in target_cpu_store() (git-fixes).\n- Drivers: hv: vmbus: Fix sysfs output format for ring buffer index (git-fixes).\n- Drivers: hv: vmbus: Fix typos in vmbus_drv.c (git-fixes).\n- Drivers: hv: vmbus: Get the IRQ number from DeviceTree (git-fixes).\n- Drivers: hv: vmbus: Introduce hv_get_vmbus_root_device() (git-fixes).\n- drivers: iio: mpu3050: use dev_err_probe for regulator request (git-fixes).\n- drm/amd/display: Add signal type check for dcn401 get_phyd32clk_src (stable-fixes).\n- drm/amd/display: Add USB-C DP Alt Mode lane limitation in DCN32 (stable-fixes).\n- drm/amd/display: avoid dig reg access timeout on usb4 link training fail (stable-fixes).\n- drm/amd/display: Avoid updating surface with the same surface under MPO (stable-fixes).\n- drm/amd/display: bypass post csc for additional color spaces in dal (stable-fixes).\n- drm/amd/display: Disable FEC when powering down encoders (stable-fixes).\n- drm/amd/display: extend delta clamping logic to CM3 LUT helper (stable-fixes).\n- drm/amd/display: Fix dsc eDP issue (stable-fixes).\n- drm/amd/display: Fix GFX12 family constant checks (stable-fixes).\n- drm/amd/display: Fix out-of-bounds stream encoder index v3 (git-fixes).\n- drm/amd/display: Fix system resume lag issue (stable-fixes).\n- drm/amd/display: Fix writeback on DCN 3.2+ (stable-fixes).\n- drm/amd/display: fix wrong color value mapping on MCM shaper LUT (git-fixes).\n- drm/amd/display: Increase DCN35 SR enter/exit latency (stable-fixes).\n- drm/amd/display: only power down dig on phy endpoints (stable-fixes).\n- drm/amd/display: Reject cursor plane on DCE when scaled differently than primary (git-fixes).\n- drm/amd/display: remove assert around dpp_base replacement (stable-fixes).\n- drm/amd/display: Remove conditional for shaper 3DLUT power-on (stable-fixes).\n- drm/amd/display: Use same max plane scaling limits for all 64 bpp formats (git-fixes).\n- drm/amd/pm: Disable MMIO access during SMU Mode 1 reset (stable-fixes).\n- drm/amd: Disable MES LR compute W/A (git-fixes).\n- drm/amd: Drop \u0027amdgpu kernel modesetting enabled\u0027 message (git-fixes).\n- drm/amd: Fix hang on amdgpu unload by using pci_dev_is_disconnected() (git-fixes).\n- drm/amdgpu/gfx10: fix wptr reset in KGQ init (stable-fixes).\n- drm/amdgpu/gfx11: fix wptr reset in KGQ init (stable-fixes).\n- drm/amdgpu/gfx12: fix wptr reset in KGQ init (stable-fixes).\n- drm/amdgpu/soc21: fix xclk for APUs (stable-fixes).\n- drm/amdgpu: Add HAINAN clock adjustment (stable-fixes).\n- drm/amdgpu: add support for HDP IP version 6.1.1 (stable-fixes).\n- drm/amdgpu: Adjust usleep_range in fence wait (stable-fixes).\n- drm/amdgpu: avoid a warning in timedout job handler (stable-fixes).\n- drm/amdgpu: ensure no_hw_access is visible before MMIO (git-fixes).\n- drm/amdgpu: Fix locking bugs in error paths (git-fixes).\n- drm/amdgpu: Fix memory leak in amdgpu_acpi_enumerate_xcc() (git-fixes).\n- drm/amdgpu: Fix memory leak in amdgpu_ras_init() (git-fixes).\n- drm/amdgpu: fix NULL pointer issue buffer funcs (stable-fixes).\n- drm/amdgpu: fix sync handling in amdgpu_dma_buf_move_notify (git-fixes).\n- drm/amdgpu: keep vga memory on MacBooks with switchable graphics (stable-fixes).\n- drm/amdgpu: remove invalid usage of sched.ready (stable-fixes).\n- drm/amdgpu: Replace kzalloc + copy_from_user with memdup_user (stable-fixes).\n- drm/amdgpu: Skip loading SDMA_RS64 in VF (stable-fixes).\n- drm/amdgpu: stop unmapping MQD for kernel queues v3 (stable-fixes).\n- drm/amdgpu: Unlock a mutex before destroying it (git-fixes).\n- drm/amdgpu: Use kvfree instead of kfree in amdgpu_gmc_get_nps_memranges() (git-fixes).\n- drm/amdkfd: fix debug watchpoints for logical devices (stable-fixes).\n- drm/amdkfd: Fix GART PTE for non-4K pagesize in svm_migrate_gart_map() (stable-fixes).\n- drm/amdkfd: Fix out-of-bounds write in kfd_event_page_set() (stable-fixes).\n- drm/amdkfd: Fix signal_eviction_fence() bool return value (git-fixes).\n- drm/amdkfd: Fix watch_id bounds checking in debug address watch v2 (git-fixes).\n- drm/amdkfd: Handle GPU reset and drain retry fault race (stable-fixes).\n- drm/amdkfd: Relax size checking during queue buffer get (stable-fixes).\n- drm/atmel-hlcdc: don\u0027t reject the commit if the src rect has fractional parts (stable-fixes).\n- drm/atmel-hlcdc: fix memory leak from the atomic_destroy_state callback (stable-fixes).\n- drm/atmel-hlcdc: fix use-after-free of drm_crtc_commit after release (stable-fixes).\n- drm/bridge: anx7625: Fix invalid EDID size (git-fixes).\n- drm/bridge: samsung-dsim: Fix memory leak in error path (git-fixes).\n- drm/bridge: ti-sn65dsi86: Enable HPD polling if IRQ is not used (git-fixes).\n- drm/buddy: Prevent BUG_ON by validating rounded allocation (git-fixes).\n- drm/display/dp_mst: Add protection against 0 vcpi (stable-fixes).\n- drm/i915/acpi: free _DSM package when no connectors (git-fixes).\n- drm/i915/display: Add quirk to skip retraining of dp link (bsc#1253129).\n- drm/i915/wakeref: clean up INTEL_WAKEREF_PUT_* flag macros (stable-fixes).\n- drm/logicvc: Fix device node reference leak in logicvc_drm_config_parse() (git-fixes).\n- drm/mgag200: fix mgag200_bmc_stop_scanout() (git-fixes).\n- drm/msm/a2xx: fix pixel shader start on A225 (git-fixes).\n- drm/msm/disp: set num_planes to 1 for interleaved YUV formats (git-fixes).\n- drm/msm/dpu: drop intr_start from DPU 3.x catalog files (git-fixes).\n- drm/msm/dpu: fix CMD panels on DPU 1.x - 3.x (git-fixes).\n- drm/msm/dpu: fix WD timer handling on DPU 8.x (git-fixes).\n- drm/msm/dpu: Set vsync source irrespective of mdp top support (git-fixes).\n- drm/panel: Fix a possible null-pointer dereference in jdi_panel_dsi_remove() (stable-fixes).\n- drm/panel: sw43408: Remove manual invocation of unprepare at remove (git-fixes).\n- drm/panthor: Evict groups before VM termination (git-fixes).\n- drm/panthor: Fix immediate ticking on a disabled tick (git-fixes).\n- drm/panthor: Fix the full_tick check (git-fixes).\n- drm/panthor: Fix the group priority rotation logic (git-fixes).\n- drm/panthor: Fix the logic that decides when to stop ticking (git-fixes).\n- drm/panthor: Make sure we resume the tick when new jobs are submitted (git-fixes).\n- drm/panthor: Recover from panthor_gpu_flush_caches() failures (git-fixes).\n- drm/radeon: Add HAINAN clock adjustment (stable-fixes).\n- drm/radeon: delete radeon_fence_process in is_signaled, no deadlock (stable-fixes).\n- drm/sched: Fix kernel-doc warning for drm_sched_job_done() (git-fixes).\n- drm/solomon: Fix page start when updating rectangle in page addressing mode (git-fixes).\n- drm/tegra: dsi: fix device leak on probe (git-fixes).\n- drm/tegra: hdmi: sor: Fix error: variable \u0027j\u0027 set but not used (stable-fixes).\n- drm/tests: shmem: Swap names of export tests (git-fixes).\n- drm/v3d: Set DMA segment size to avoid debug warnings (stable-fixes).\n- drm/vmwgfx: Fix invalid kref_put callback in vmw_bo_dirty_release (git-fixes).\n- drm/vmwgfx: Return the correct value in vmw_translate_ptr functions (git-fixes).\n- drm/xe/mmio: Avoid double-adjust in 64-bit reads (git-fixes).\n- drm/xe/pm: Also avoid missing outer rpm warning on system suspend (stable-fixes).\n- drm/xe/pm: Disable D3Cold for BMG only on specific platforms (git-fixes).\n- drm/xe/ptl: Apply Wa_13011645652 (stable-fixes).\n- drm/xe/query: Fix topology query pointer advance (git-fixes).\n- drm/xe/sync: Cleanup partially initialized sync on parse failure (git-fixes).\n- drm/xe/xe2_hpg: Add set of workarounds (stable-fixes).\n- drm/xe/xe2_hpg: Fix handling of Wa_14019988906 \u0026 Wa_14019877138 (git-fixes).\n- drm/xe: Add xe_tile backpointer to xe_mmio (stable-fixes).\n- drm/xe: Adjust mmio code to pass VF substructure to SRIOV code (stable-fixes).\n- drm/xe: Clarify size of MMIO region (stable-fixes).\n- drm/xe: Create dedicated xe_mmio structure (stable-fixes).\n- drm/xe: Defer gt-\u003emmio initialization until after multi-tile setup (git-fixes).\n- drm/xe: Move forcewake to \u0027gt.pm\u0027 substructure (stable-fixes).\n- drm/xe: Move GSI offset adjustment fields into \u0027struct xe_mmio\u0027 (stable-fixes).\n- drm/xe: Only toggle scheduling in TDR if GuC is running (stable-fixes).\n- drm/xe: Populate GT\u0027s mmio iomap from tile during init (stable-fixes).\n- drm/xe: Switch MMIO interface to take xe_mmio instead of xe_gt (stable-fixes).\n- drm/xe: Switch mmio_ext to use \u0027struct xe_mmio\u0027 (stable-fixes).\n- drm/xe: Unregister drm device on probe error (git-fixes).\n- drm: Account property blob allocations to memcg (stable-fixes).\n- efi: Fix reservation of unaccepted memory table (git-fixes).\n- efivarfs: fix error propagation in efivar_entry_get() (git-fixes).\n- ext4: fix iloc.bh leak in ext4_xattr_inode_update_ref (git-fixes).\n- fbcon: check return value of con2fb_acquire_newinfo() (git-fixes).\n- fbdev: au1200fb: Fix a memory leak in au1200fb_drv_probe() (git-fixes).\n- fbdev: ffb: fix corrupted video output on Sun FFB1 (stable-fixes).\n- fbdev: of: display_timing: fix refcount leak in of_get_display_timings() (git-fixes).\n- fbdev: rivafb: fix divide error in nv3_arb() (git-fixes).\n- fbdev: smscufx: properly copy ioctl memory to kernelspace (stable-fixes).\n- fbdev: vt8500lcdfb: fix missing dma_free_coherent() (git-fixes).\n- fpga: dfl: use subsys_initcall to allow built-in drivers to be added (git-fixes).\n- fpga: of-fpga-region: Fail if any bridge is missing (stable-fixes).\n- genirq: Set IRQF_COND_ONESHOT in devm_request_irq() (git-fixes).\n- gpio: aspeed-sgpio: Change the macro to support deferred probe (stable-fixes).\n- gpio: pca953x: mask interrupts in irq shutdown (stable-fixes).\n- gpio: sprd: Change sprd_gpio lock to raw_spin_lock (stable-fixes).\n- gpu/panel-edp: add AUO panel entry for B140HAN06.4 (stable-fixes).\n- HID: apple: Add \u0027SONiX KN85 Keyboard\u0027 to the list of non-apple keyboards (stable-fixes).\n- HID: Apply quirk HID_QUIRK_ALWAYS_POLL to Edifier QR30 (2d99:a101) (stable-fixes).\n- HID: elecom: Add support for ELECOM HUGE Plus M-HT1MRBK (stable-fixes).\n- HID: hid-pl: handle probe errors (git-fixes).\n- HID: i2c-hid: fix potential buffer overflow in i2c_hid_get_report() (stable-fixes).\n- HID: intel-ish-hid: fix NULL-ptr-deref in ishtp_bus_remove_all_clients (git-fixes).\n- HID: intel-ish-hid: Reset enum_devices_done before enumeration (stable-fixes).\n- HID: intel-ish-hid: Update ishtp bus match to support device ID table (stable-fixes).\n- HID: logitech-hidpp: Check maxfield in hidpp_get_report_length() (stable-fixes).\n- HID: magicmouse: Do not crash on missing msc-\u003einput (stable-fixes).\n- HID: multitouch: add eGalaxTouch EXC3188 support (stable-fixes).\n- HID: multitouch: add MT_QUIRK_STICKY_FINGERS to MT_CLS_VTL (stable-fixes).\n- HID: playstation: Add missing check for input_ff_create_memless (git-fixes).\n- HID: playstation: Center initial joystick axes to prevent spurious events (stable-fixes).\n- HID: prodikeys: Check presence of pm-\u003einput_ep82 (stable-fixes).\n- HID: quirks: Add another Chicony HP 5MP Cameras to hid_ignore_list (stable-fixes).\n- hwmon: (f71882fg) Add F81968 support (stable-fixes).\n- hwmon: (it87) Check the it87_lock() return value (git-fixes).\n- hwmon: (max16065) Use READ/WRITE_ONCE to avoid compiler optimization induced race (git-fixes).\n- hwmon: (nct6775) Add ASUS Pro WS WRX90E-SAGE SE (stable-fixes).\n- hwmon: (occ) Mark occ_init_attribute() as __printf (git-fixes).\n- hwmon: (pmbus/q54sj108a2) fix stack overflow in debugfs read (git-fixes).\n- hyperv: Convert hypercall statuses to linux error codes (git-fixes).\n- hyperv: Move arch/x86/hyperv/hv_proc.c to drivers/hv (git-fixes).\n- hyperv: Move hv_current_partition_id to arch-generic code (git-fixes).\n- i3c: dw: Initialize spinlock to avoid upsetting lockdep (git-fixes).\n- i3c: master: svc: Initialize \u0027dev\u0027 to NULL in svc_i3c_master_ibi_isr() (stable-fixes).\n- i3c: master: Update hot-join flag only on success (git-fixes).\n- i3c: Move device name assignment after i3c_bus_init (git-fixes).\n- iio: gyro: itg3200: Fix unchecked return value in read_raw (git-fixes).\n- iio: magnetometer: Remove IRQF_ONESHOT (stable-fixes).\n- iio: sca3000: Fix a resource leak in sca3000_probe() (git-fixes).\n- iio: Use IRQF_NO_THREAD (stable-fixes).\n- Input: stmfts - correct wording for the warning message (git-fixes).\n- Input: stmfts - make comments correct (git-fixes).\n- iomap: account for unaligned end offsets when truncating read range (git-fixes).\n- ipmi: ipmb: initialise event handler read bytes (git-fixes).\n- ktls, sockmap: Fix missing uncharge operation (bsc#1252008).\n- KVM: nSVM: Clear exit_code_hi in VMCB when synthesizing nested VM-Exits (git-fixes).\n- KVM: nSVM: Set exit_code_hi to -1 when synthesizing SVM_EXIT_ERR (failed VMRUN) (git-fixes).\n- KVM: x86: Don\u0027t clear async #PF queue when CR0.PG is disabled (e.g. on #SMI) (git-fixes).\n- KVM: x86: Explicitly set new periodic hrtimer expiration in apic_timer_fn() (git-fixes).\n- KVM: x86: WARN if hrtimer callback for periodic APIC timer fires with period=0 (git-fixes).\n- landlock: Optimize file path walks and prepare for audit support (bsc#1255698).\n- leds: qcom-lpg: Check the return value of regmap_bulk_write() (git-fixes).\n- media: adv7180: fix frame interval in progressive mode (stable-fixes).\n- media: amphion: Clear last_buffer_dequeued flag for DEC_CMD_START (stable-fixes).\n- media: amphion: Drop min_queued_buffers assignment (git-fixes).\n- media: ccs: Accommodate C-PHY into the calculation (git-fixes).\n- media: ccs: Avoid possible division by zero (git-fixes).\n- media: ccs: Fix setting initial sub-device state (git-fixes).\n- media: chips-media: wave5: Fix memory leak on codec_info allocation failure (git-fixes).\n- media: cx88: Add missing unmap in snd_cx88_hw_params() (git-fixes).\n- media: cx23885: Add missing unmap in snd_cx23885_hw_params() (git-fixes).\n- media: cx25821: Add missing unmap in snd_cx25821_hw_params() (git-fixes).\n- media: cx25821: Fix a resource leak in cx25821_dev_setup() (stable-fixes).\n- media: dvb-core: dmxdevfilter must always flush bufs (stable-fixes).\n- media: dvb-core: fix wrong reinitialization of ringbuffer on reopen (git-fixes).\n- media: dvb-net: fix OOB access in ULE extension header tables (git-fixes).\n- media: i2c/tw9903: Fix potential memory leak in tw9903_probe() (git-fixes).\n- media: i2c/tw9906: Fix potential memory leak in tw9906_probe() (git-fixes).\n- media: i2c: ov5647: Correct minimum VBLANK value (git-fixes).\n- media: i2c: ov5647: Correct pixel array offset (git-fixes).\n- media: i2c: ov5647: Fix PIXEL_RATE value for VGA mode (git-fixes).\n- media: i2c: ov5647: Initialize subdev before controls (git-fixes).\n- media: i2c: ov5647: Sensor should report RAW color space (git-fixes).\n- media: i2c: ov5647: use our own mutex for the ctrl lock (git-fixes).\n- media: ipu6: Fix RPM reference leak in probe error paths (git-fixes).\n- media: ipu6: Fix typo and wrong constant in ipu6-mmu.c (git-fixes).\n- media: mtk-mdp: Fix a reference leak bug in mtk_mdp_remove() (git-fixes).\n- media: mtk-mdp: Fix error handling in probe function (git-fixes).\n- media: omap3isp: isp_video_mbus_to_pix/pix_to_mbus fixes (stable-fixes).\n- media: omap3isp: isppreview: always clamp in preview_try_format() (stable-fixes).\n- media: omap3isp: set initial format (stable-fixes).\n- media: pvrusb2: fix URB leak in pvr2_send_request_ex (stable-fixes).\n- media: qcom: camss: vfe: Fix out-of-bounds access in vfe_isr_reg_update() (git-fixes).\n- media: radio-keene: fix memory leak in error path (git-fixes).\n- media: rkisp1: Fix filter mode register configuration (stable-fixes).\n- media: solo6x10: Check for out of bounds chip_id (stable-fixes).\n- media: tegra-video: Fix memory leak in __tegra_channel_try_format() (git-fixes).\n- media: uvcvideo: Fix allocation for small frame sizes (git-fixes).\n- media: v4l2-async: Fix error handling on steps after finding a match (stable-fixes).\n- media: venus: vdec: fix error state assignment for zero bytesused (git-fixes).\n- media: verisilicon: AV1: Fix enable cdef computation (git-fixes).\n- media: verisilicon: AV1: Fix tile info buffer size (git-fixes).\n- media: verisilicon: AV1: Fix tx mode bit setting (git-fixes).\n- media: verisilicon: AV1: Set IDR flag for intra_only frame type (git-fixes).\n- mfd: arizona: Fix regulator resource leak on wm5102_clear_write_sequencer() failure (git-fixes).\n- mfd: core: Add locking around \u0027mfd_of_node_list\u0027 (git-fixes).\n- mfd: tps6105x: Fix kernel-doc warnings relating to the core struct and tps6105x_mode (git-fixes).\n- mfd: wm8350-core: Use IRQF_ONESHOT (git-fixes).\n- misc: bcm_vk: Fix possible null-pointer dereferences in bcm_vk_read() (stable-fixes).\n- misc: eeprom: Fix EWEN/EWDS/ERAL commands for 93xx56 and 93xx66 (stable-fixes).\n- mmc: mmci: Fix device_node reference leak in of_get_dml_pipe_index() (git-fixes).\n- mmc: rtsx_pci_sdmmc: increase power-on settling delay to 5ms (git-fixes).\n- mtd: parsers: Fix memory leak in mtd_parser_tplink_safeloader_parse() (git-fixes).\n- mtd: parsers: ofpart: fix OF node refcount leak in parse_fixed_partitions() (git-fixes).\n- mtd: rawnand: cadence: Fix return type of CDMA send-and-wait helper (git-fixes).\n- mtd: rawnand: pl353: Fix software ECC support (git-fixes).\n- mtd: spinand: Fix kernel doc (git-fixes).\n- myri10ge: avoid uninitialized variable use (stable-fixes).\n- net: mana: Fix double destroy_workqueue on service rescan PCI path (git-fixes).\n- net: mana: Implement ndo_tx_timeout and serialize queue resets per port (bsc#1257472).\n- net: mana: Ring doorbell at 4 CQ wraparounds (git-fixes).\n- net: mana: Support HW link state events (bsc#1253049).\n- net: nfc: nci: Fix parameter validation for packet data (git-fixes).\n- net: nfc: nci: Fix zero-length proprietary notifications (git-fixes).\n- net: usb: catc: enable basic endpoint checking (git-fixes).\n- net: usb: kalmia: validate USB endpoints (git-fixes).\n- net: usb: kaweth: remove TX queue manipulation in kaweth_set_rx_mode (git-fixes).\n- net: usb: kaweth: validate USB endpoints (git-fixes).\n- net: usb: lan78xx: fix silent drop of packets with checksum errors (git-fixes).\n- net: usb: lan78xx: fix TX byte statistics for small packets (git-fixes).\n- net: usb: lan78xx: scan all MDIO addresses on LAN7801 (git-fixes).\n- net: usb: pegasus: enable basic endpoint checking (git-fixes).\n- net: usb: r8152: fix transmit queue timeout (stable-fixes).\n- net: usb: sr9700: remove code to drive nonexistent multicast filter (stable-fixes).\n- net: usb: sr9700: support devices with virtual driver CD (stable-fixes).\n- net: wan/fsl_ucc_hdlc: Fix dma_free_coherent() in uhdlc_memclean() (git-fixes).\n- net: wan: farsync: Fix use-after-free bugs caused by unfinished tasklets (git-fixes).\n- nfc: hci: shdlc: Stop timers and work before freeing context (git-fixes).\n- nfc: nci: clear NCI_DATA_EXCHANGE before calling completion callback (git-fixes).\n- nfc: nci: free skb on nci_transceive early error paths (git-fixes).\n- nfc: nxp-nci: remove interrupt trigger type (stable-fixes).\n- nfc: pn533: properly drop the usb interface reference on disconnect (git-fixes).\n- nfc: rawsock: cancel tx_work before socket teardown (git-fixes).\n- nfsd: check that server is running in unlock_filesystem (bsc#1257279).\n- nfsd: use correct loop termination in nfsd4_revoke_states() (git-fixes).\n- nouveau/dpcd: return EBUSY for aux xfer if the device is asleep (git-fixes).\n- ntb: ntb_hw_switchtec: Fix array-index-out-of-bounds access (stable-fixes).\n- ntb: ntb_hw_switchtec: Fix shift-out-of-bounds for 0 mw lut (stable-fixes).\n- NTB: ntb_transport: Fix too small buffer for debugfs_name (git-fixes).\n- nvme-fc: don\u0027t hold rport lock when putting ctrl (git-fixes).\n- nvme-fc: release admin tagset if init fails (git-fixes).\n- nvme-pci: disable secondary temp for Wodposit WPBSNM8 (git-fixes).\n- PCI/ACPI: Restrict program_hpx_type2() to AER bits (git-fixes).\n- PCI/IOV: Fix race between SR-IOV enable/disable and hotplug (git-fixes).\n- PCI/MSI: Unmap MSI-X region on error (git-fixes).\n- PCI/MSI: Unmap MSI-X region on error (stable-fixes).\n- PCI/P2PDMA: Release per-CPU pgmap ref when vm_insert_page() fails (git-fixes).\n- PCI/PM: Avoid redundant delays on D3hot-\u003eD3cold (git-fixes).\n- PCI/portdrv: Fix potential resource leak (git-fixes).\n- PCI: Add ACS quirk for Pericom PI7C9X2G404 switches [12d8:b404] (git-fixes).\n- PCI: Add ACS quirk for Qualcomm Hamoa \u0026 Glymur (git-fixes).\n- PCI: Add ACS quirk for Qualcomm Hamoa \u0026 Glymur (stable-fixes).\n- PCI: Add defines for bridge window indexing (stable-fixes).\n- PCI: Add PCIE_MSG_CODE_ASSERT_INTx message macros (stable-fixes).\n- PCI: Correct PCI_CAP_EXP_ENDPOINT_SIZEOF_V2 value (git-fixes).\n- PCI: Do not attempt to set ExtTag for VFs (git-fixes).\n- PCI: dw-rockchip: Disable BAR 0 and BAR 1 for Root Port (git-fixes).\n- PCI: dw-rockchip: Disable BAR 0 and BAR 1 for Root Port (stable-fixes).\n- PCI: Enable ACS after configuring IOMMU for OF platforms (git-fixes).\n- PCI: Enable ACS after configuring IOMMU for OF platforms (stable-fixes).\n- PCI: endpoint: Fix swapped parameters in pci_{primary/secondary}_epc_epf_unlink() functions (git-fixes).\n- PCI: Fix pci_slot_lock () device locking (git-fixes).\n- PCI: Fix pci_slot_lock () device locking (stable-fixes).\n- PCI: Fix pci_slot_trylock() error handling (git-fixes).\n- PCI: hv: Correct a comment (git-fixes).\n- PCI: hv: Fix warnings for missing export.h header inclusion (git-fixes).\n- PCI: hv: Remove unnecessary flex array in struct pci_packet (git-fixes).\n- PCI: hv: remove unnecessary module_init/exit functions (git-fixes).\n- PCI: hv: Remove unused field pci_bus in struct hv_pcibus_device (git-fixes).\n- PCI: Initialize RCB from pci_configure_device() (git-fixes).\n- PCI: Log bridge info when first enumerating bridge (stable-fixes).\n- PCI: Log bridge windows conditionally (stable-fixes).\n- PCI: Mark 3ware-9650SA Root Port Extended Tags as broken (git-fixes).\n- PCI: Mark ASM1164 SATA controller to avoid bus reset (git-fixes).\n- PCI: Mark ASM1164 SATA controller to avoid bus reset (stable-fixes).\n- PCI: Mark Nvidia GB10 to avoid bus reset (git-fixes).\n- PCI: Mark Nvidia GB10 to avoid bus reset (stable-fixes).\n- PCI: mediatek: Fix IRQ domain leak when MSI allocation fails (git-fixes).\n- PCI: Move pci_read_bridge_windows() below individual window accessors (stable-fixes).\n- PCI: Supply bridge device, not secondary bus, to read window details (stable-fixes).\n- phy: fsl-imx8mq-usb: disable bind/unbind platform driver feature (stable-fixes).\n- phy: mvebu-cp110-utmi: fix dr_mode property read from dts (stable-fixes).\n- pinctrl: equilibrium: Fix device node reference leak in pinbank_init() (git-fixes).\n- pinctrl: meson: mark the GPIO controller as sleeping (git-fixes).\n- pinctrl: qcom: sm8250-lpass-lpi: Fix i2s2_data_groups definition (git-fixes).\n- pinctrl: single: fix refcount leak in pcs_add_gpio_func() (git-fixes).\n- platform/chrome: cros_ec_lightbar: Fix response size initialization (git-fixes).\n- platform/chrome: cros_typec_switch: Don\u0027t touch struct fwnode_handle::dev (git-fixes).\n- platform/x86/amd/pmc: Add quirk for MECHREVO Wujie 15X Pro (stable-fixes).\n- platform/x86: classmate-laptop: Add missing NULL pointer checks (stable-fixes).\n- platform/x86: dell-wmi-sysman: Don\u0027t hex dump plaintext password data (git-fixes).\n- platform/x86: hp-bioscfg: Skip empty attribute names (git-fixes).\n- platform/x86: int0002: Remove IRQF_ONESHOT from request_irq() (git-fixes).\n- platform/x86: intel_telemetry: Fix PSS event register mask (git-fixes).\n- platform/x86: intel_telemetry: Fix swapped arrays in PSS output (git-fixes).\n- platform/x86: ISST: Add missing write block check (git-fixes).\n- platform/x86: panasonic-laptop: Fix sysfs group leak in error path (stable-fixes).\n- platform/x86: toshiba_haps: Fix memory leaks in add/remove routines (git-fixes).\n- PM: sleep: wakeirq: harden dev_pm_clear_wake_irq() against races (git-fixes).\n- PM: sleep: wakeirq: Update outdated documentation comments (git-fixes).\n- PM: wakeup: Handle empty list in wakeup_sources_walk_start() (git-fixes).\n- pmdomain: imx: gpcv2: Fix the imx8mm gpu hang due to wrong adb400 reset (git-fixes).\n- power: reset: nvmem-reboot-mode: respect cell size for nvmem_cell_write (git-fixes).\n- power: supply: ab8500: Fix use-after-free in power_supply_changed() (git-fixes).\n- power: supply: act8945a: Fix use-after-free in power_supply_changed() (git-fixes).\n- power: supply: bq27xxx: fix wrong errno when bus ops are unsupported (git-fixes).\n- power: supply: bq256xx: Fix use-after-free in power_supply_changed() (git-fixes).\n- power: supply: bq25980: Fix use-after-free in power_supply_changed() (git-fixes).\n- power: supply: cpcap-battery: Fix use-after-free in power_supply_changed() (git-fixes).\n- power: supply: goldfish: Fix use-after-free in power_supply_changed() (git-fixes).\n- power: supply: qcom_battmgr: Recognize \u0027LiP\u0027 as lithium-polymer (git-fixes).\n- power: supply: rt9455: Fix use-after-free in power_supply_changed() (git-fixes).\n- power: supply: sbs-battery: Fix use-after-free in power_supply_changed() (git-fixes).\n- power: supply: wm97xx: Fix NULL pointer dereference in power_supply_changed() (git-fixes).\n- powercap: intel_rapl_tpmi: Remove FW_BUG from invalid version check (git-fixes).\n- qmi_wwan: allow max_mtu above hard_mtu to control rx_urb_size (git-fixes).\n- rapidio: replace rio_free_net() with kfree() in rio_scan_alloc_net() (git-fixes).\n- RDMA/mana_ib: Add device-memory support (git-fixes).\n- RDMA/mana_ib: Take CQ type from the device type (git-fixes).\n- RDMA/rtrs-clt: For conn rejection use actual err number (git-fixes).\n- regmap: maple: free entry on mas_store_gfp() failure (stable-fixes).\n- regulator: core: fix locking in regulator_resolve_supply() error path (git-fixes).\n- regulator: core: move supply check earlier in set_machine_constraints() (git-fixes).\n- remoteproc: sysmon: Correct subsys_name_len type in QMI request (git-fixes).\n- Revert \u0027bpf: xfrm: Add bpf_xdp_get_xfrm_state() kfunc (bsc#1258860).\n- Revert \u0027drm/amd: Check if ASPM is enabled from PCIe subsystem\u0027 (git-fixes).\n- Revert \u0027drm/nouveau/disp: Set drm_mode_config_funcs.atomic_(check|commit)\u0027 (git-fixes).\n- Revert \u0027hwmon: (ibmpex) fix use-after-free in high/low store\u0027 (git-fixes).\n- Revert \u0027mfd: da9052-spi: Change read-mask to write-mask\u0027 (stable-fixes).\n- Revert \u0027mmc: rtsx_pci_sdmmc: increase power-on settling delay to 5ms\u0027 (git-fixes).\n- Revert \u0027PCI/IOV: Add PCI rescan-remove locking when enabling/disabling SR-IOV\u0027 (git-fixes).\n- Revert \u0027selftests/bpf: Add tc helpers (bsc#1258860).\n- Revert \u0027selftests/bpf: Remove \u0027\u0026\u003e\u0027 usage in the selftests (bsc#1258860).\n- Revert \u0027selftests/bpf: Remove test_tc_tunnel.sh (bsc#1258860).\n- Revert \u0027selftests/bpf: Support when CONFIG_VXLAN=m (bsc#1258860).\n- Revert \u0027selftests/bpf: test_tunnel: Add ping helpers (bsc#1258860).\n- Revert \u0027selftests/bpf: test_tunnel: Remove test_tunnel.sh (bsc#1258860).\n- Revert \u0027selftests/bpf: Use make_sockaddr in test_sock_addr (bsc#1258860).\n- rpmsg: core: fix race in driver_override_show() and use core helper (git-fixes).\n- rtc: interface: Alarm race handling should not discard preceding error (git-fixes).\n- rtc: zynqmp: correct frequency value (stable-fixes).\n- s390/cio: Update purge function to unregister the unused subchannels (bsc#1254214).\n- s390/ipl: Clear SBP flag when bootprog is set (bsc#1258176).\n- s390/mm: Fix __ptep_rdp() inline assembly (bsc#1253644).\n- s390: Disable ARCH_WANT_OPTIMIZE_HUGETLB_VMEMMAP (bsc#1254306).\n- scsi: mpi3mr: Event processing debug improvement (bsc#1251186 bsc#1258832).\n- scsi: storvsc: Fix scheduling while atomic on PREEMPT_RT (git-fixes).\n- scsi: storvsc: Remove redundant ternary operators (git-fixes).\n- selftests/bpf: Add tc helpers (bsc#1258860).\n- selftests/bpf: add verifier sign extension bound computation tests (git-fixes).\n- selftests/bpf: Integrate test_tc_tunnel.sh tests into test_progs (bsc#1258860).\n- selftests/bpf: Make test_tc_tunnel.bpf.c compatible with big endian platforms (bsc#1258860).\n- selftests/bpf: Remove \u0027\u0026\u003e\u0027 usage in the selftests (bsc#1258860).\n- selftests/bpf: Remove test_tc_tunnel.sh (bsc#1258860).\n- selftests/bpf: Support when CONFIG_VXLAN=m (bsc#1258860).\n- selftests/bpf: test_tunnel: Add generic_attach* helpers (bsc#1258860).\n- selftests/bpf: test_tunnel: Add ping helpers (bsc#1258860).\n- selftests/bpf: test_tunnel: Move erspan tunnel tests to test_progs (bsc#1258860).\n- selftests/bpf: test_tunnel: Move geneve tunnel test to test_progs (bsc#1258860).\n- selftests/bpf: test_tunnel: Move gre tunnel test to test_progs (bsc#1258860).\n- selftests/bpf: test_tunnel: Move ip6erspan tunnel test to test_progs (bsc#1258860).\n- selftests/bpf: test_tunnel: Move ip6geneve tunnel test to test_progs (bsc#1258860).\n- selftests/bpf: test_tunnel: Move ip6gre tunnel test to test_progs (bsc#1258860).\n- selftests/bpf: test_tunnel: Move ip6tnl tunnel tests to test_progs (bsc#1258860).\n- selftests/bpf: test_tunnel: Remove test_tunnel.sh (bsc#1258860).\n- selftests/bpf: Use connect_to_addr in test_sock_addr (bsc#1258860).\n- selftests/bpf: Use log_err in open_netns/close_netns (bsc#1258860).\n- selftests/bpf: Use make_sockaddr in test_sock_addr (bsc#1258860).\n- selftests/bpf: Use start_server_addr in test_sock_addr (bsc#1258860).\n- serial: 8250: 8250_omap.c: Clear DMA RX running status only after DMA termination is done (git-fixes).\n- serial: 8250: 8250_omap.c: Clear DMA RX running status only after DMA termination is done (stable-fixes).\n- serial: 8250_dw: handle clock enable errors in runtime_resume (git-fixes).\n- serial: 8250_dw: handle clock enable errors in runtime_resume (stable-fixes).\n- serial: imx: change SERIAL_IMX_CONSOLE to bool (git-fixes).\n- serial: SH_SCI: improve \u0027DMA support\u0027 prompt (git-fixes).\n- shrink_slab_memcg: clear_bits of skipped shrinkers (bsc#1256564).\n- soc: mediatek: svs: Fix memory leak in svs_enable_debug_write() (git-fixes).\n- soc: qcom: cmd-db: Use devm_memremap() to fix memory leak in cmd_db_dev_probe (git-fixes).\n- soc: qcom: smem: handle ENOMEM error during probe (git-fixes).\n- soc: ti: k3-socinfo: Fix regmap leak on probe failure (git-fixes).\n- soc: ti: pruss: Fix double free in pruss_clk_mux_setup() (git-fixes).\n- soundwire: dmi-quirks: add mapping for Avell B.ON (OEM rebranded of NUC15) (stable-fixes).\n- soundwire: intel_ace2x: add SND_HDA_CORE dependency (git-fixes).\n- spi-geni-qcom: initialize mode related registers to 0 (stable-fixes).\n- spi-geni-qcom: use xfer-\u003ebits_per_word for can_dma() (stable-fixes).\n- spi: spi-mem: Limit octal DTR constraints to octal DTR situations (git-fixes).\n- spi: spi-mem: Limit octal DTR constraints to octal DTR situations (stable-fixes).\n- spi: spi-mem: Protect dirmap_create() with spi_mem_access_start/end (git-fixes).\n- spi: spi-mem: Protect dirmap_create() with spi_mem_access_start/end (stable-fixes).\n- spi: spidev: fix lock inversion between spi_lock and buf_lock (git-fixes).\n- spi: stm32: fix Overrun issue at \u003c 8bpw (stable-fixes).\n- spi: tegra114: Preserve SPI mode bits in def_command1_reg (git-fixes).\n- spi: tegra210-quad: Move curr_xfer read inside spinlock (bsc#1257952).\n- spi: tegra210-quad: Move curr_xfer read inside spinlock (git-fixes).\n- spi: tegra210-quad: Protect curr_xfer assignment in (bsc#1257952).\n- spi: tegra210-quad: Protect curr_xfer assignment in tegra_qspi_setup_transfer_one (git-fixes).\n- spi: tegra210-quad: Protect curr_xfer check in IRQ handler (bsc#1257952).\n- spi: tegra210-quad: Protect curr_xfer check in IRQ handler (git-fixes).\n- spi: tegra210-quad: Protect curr_xfer clearing in (bsc#1257952).\n- spi: tegra210-quad: Protect curr_xfer clearing in tegra_qspi_non_combined_seq_xfer (git-fixes).\n- spi: tegra210-quad: Protect curr_xfer in tegra_qspi_combined_seq_xfer (bsc#1257952).\n- spi: tegra210-quad: Protect curr_xfer in tegra_qspi_combined_seq_xfer (git-fixes).\n- spi: tegra210-quad: Return IRQ_HANDLED when timeout already processed (bsc#1257952).\n- spi: tegra210-quad: Return IRQ_HANDLED when timeout already processed transfer (git-fixes).\n- spi: tegra: Fix a memory leak in tegra_slink_probe() (git-fixes).\n- spi: wpcm-fiu: Fix potential NULL pointer dereference in wpcm_fiu_probe() (git-fixes).\n- spi: wpcm-fiu: Fix uninitialized res (git-fixes).\n- spi: wpcm-fiu: Simplify with dev_err_probe() (stable-fixes).\n- spi: wpcm-fiu: Use devm_platform_ioremap_resource_byname() (stable-fixes).\n- staging: rtl8723bs: fix memory leak on failure path (stable-fixes).\n- staging: rtl8723bs: fix missing status update on sdio_alloc_irq() failure (stable-fixes).\n- staging: rtl8723bs: fix null dereference in find_network (git-fixes).\n- thermal: int340x: Fix sysfs group leak on DLVR registration failure (stable-fixes).\n- thermal: intel: x86_pkg_temp_thermal: Handle invalid temperature (git-fixes).\n- tools/hv: fcopy: Fix irregularities with size of ring buffer (git-fixes).\n- tools/power cpupower: Reset errno before strtoull() (stable-fixes).\n- tools/power/x86/intel-speed-select: Fix file descriptor leak in isolate_cpus() (git-fixes).\n- tools: hv: Enable debug logs for hv_kvp_daemon (git-fixes).\n- tpm: st33zp24: Fix missing cleanup on get_burstcount() error (git-fixes).\n- tpm: tpm_i2c_infineon: Fix locality leak on get_burstcount() failure (git-fixes).\n- uio_hv_generic: Align ring size to system page (git-fixes).\n- uio_hv_generic: Use correct size for interrupt and monitor pages (git-fixes).\n- Update \u0027drm/mgag200: fix mgag200_bmc_stop_scanout()\u0027 bug number (bsc#1258153 bsc#1258226).\n- Update \u0027drm/mgag200: fix mgag200_bmc_stop_scanout()\u0027 bug number (bsc#1258153).\n- usb: bdc: fix sleep during atomic (git-fixes).\n- usb: dwc2: fix resume failure if dr_mode is host (git-fixes).\n- usb: gadget: tegra-xudc: Add handling for BLCG_COREPLL_PWRDN (git-fixes).\n- USB: serial: option: add Telit FN920C04 RNDIS compositions (stable-fixes).\n- usb: typec: ucsi: psy: Fix voltage and current max for non-Fixed PDOs (git-fixes).\n- watchdog: imx7ulp_wdt: handle the nowayout option (stable-fixes).\n- wifi: ath9k: debug.h: fix kernel-doc bad lines and struct ath_tx_stats (git-fixes).\n- wifi: ath9k: fix kernel-doc warnings in common-debug.h (git-fixes).\n- wifi: ath10k: fix lock protection in ath10k_wmi_event_peer_sta_ps_state_chg() (stable-fixes).\n- wifi: ath10k: sdio: add missing lock protection in ath10k_sdio_fw_crashed_dump() (git-fixes).\n- wifi: ath11k: add pm quirk for Thinkpad Z13/Z16 Gen1 (stable-fixes).\n- wifi: ath11k: Fix failure to connect to a 6 GHz AP (stable-fixes).\n- wifi: ath12k: fix preferred hardware mode calculation (stable-fixes).\n- wifi: cfg80211: allow only one NAN interface, also in multi radio (stable-fixes).\n- wifi: cfg80211: cancel rfkill_block work in wiphy_unregister() (git-fixes).\n- wifi: cfg80211: Fix bitrate calculation overflow for HE rates (stable-fixes).\n- wifi: cfg80211: Fix use_for flag update on BSS refresh (git-fixes).\n- wifi: cfg80211: stop NAN and P2P in cfg80211_leave (git-fixes).\n- wifi: cfg80211: wext: fix IGTK key ID off-by-one (git-fixes).\n- wifi: cw1200: Fix locking in error paths (git-fixes).\n- wifi: iwlegacy: add missing mutex protection in il3945_store_measurement() (stable-fixes).\n- wifi: iwlegacy: add missing mutex protection in il4965_store_tx_power() (stable-fixes).\n- wifi: iwlwifi: mvm: check the validity of noa_len (stable-fixes).\n- wifi: iwlwifi: mvm: pause TCM on fast resume (git-fixes).\n- wifi: libertas: fix WARNING in usb_tx_block (stable-fixes).\n- wifi: mac80211: bounds-check link_id in ieee80211_ml_reconfiguration (git-fixes).\n- wifi: mac80211: collect station statistics earlier when disconnect (stable-fixes).\n- wifi: mac80211: correctly check if CSA is active (stable-fixes).\n- wifi: mac80211: don\u0027t increment crypto_tx_tailroom_needed_cnt twice (stable-fixes).\n- wifi: mac80211: fix NULL pointer dereference in mesh_rx_csa_frame() (git-fixes).\n- wifi: mac80211: ocb: skip rx_no_sta when interface is not joined (stable-fixes).\n- wifi: mt76: Fix possible oob access in mt76_connac2_mac_write_txwi_80211() (git-fixes).\n- wifi: mt76: mt7925: Fix possible oob access in mt7925_mac_write_txwi_80211() (git-fixes).\n- wifi: mt76: mt7996: Fix possible oob access in mt7996_mac_write_txwi_80211() (git-fixes).\n- wifi: radiotap: reject radiotap with unknown bits (git-fixes).\n- wifi: rsi: Don\u0027t default to -EOPNOTSUPP in rsi_mac80211_config (git-fixes).\n- wifi: rtl8xxxu: fix slab-out-of-bounds in rtl8xxxu_sta_add (git-fixes).\n- wifi: rtw88: 8822b: Avoid WARNING in rtw8822b_config_trx_mode() (stable-fixes).\n- wifi: rtw88: Fix alignment fault in rtw_core_enable_beacon() (git-fixes).\n- wifi: rtw88: fix DTIM period handling when conf-\u003edtim_period is zero (stable-fixes).\n- wifi: rtw88: rtw8821cu: Add ID for Mercusys MU6H (stable-fixes).\n- wifi: rtw89: 8922a: set random mac if efuse contains zeroes (stable-fixes).\n- wifi: rtw89: mac: correct page number for CSI response (stable-fixes).\n- wifi: rtw89: pci: restore LDO setting after device resume (stable-fixes).\n- wifi: rtw89: ser: enable error IMR after recovering from L1 (stable-fixes).\n- wifi: rtw89: wow: add reason codes for disassociation in WoWLAN mode (stable-fixes).\n- wifi: wlcore: ensure skb headroom before skb_push (stable-fixes).\n- wifi: wlcore: Fix a locking bug (git-fixes).\n- workqueue: mark power efficient workqueue as unbounded if (bsc#1257891).\n- x86/hyperv: fix an indentation issue in mshyperv.h (git-fixes).\n- x86/hyperv: Fix usage of cpu_online_mask to get valid cpu (git-fixes).\n- x86/hyperv: Fix warnings for missing export.h header inclusion (git-fixes).\n- x86/hyperv: Use named operands in inline asm (git-fixes).\n",
"title": "Description of the patch"
},
{
"category": "details",
"text": "SUSE-2026-1081,SUSE-SLE-Module-Basesystem-15-SP7-2026-1081,SUSE-SLE-Module-Development-Tools-15-SP7-2026-1081,SUSE-SLE-Module-Legacy-15-SP7-2026-1081,SUSE-SLE-Module-Live-Patching-15-SP7-2026-1081,SUSE-SLE-Module-Public-Cloud-15-SP7-2026-1081,SUSE-SLE-Product-HA-15-SP7-2026-1081,SUSE-SLE-Product-WE-15-SP7-2026-1081",
"title": "Patchnames"
},
{
"category": "legal_disclaimer",
"text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
"title": "Terms of use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://www.suse.com/support/security/contact/",
"name": "SUSE Product Security Team",
"namespace": "https://www.suse.com/"
},
"references": [
{
"category": "external",
"summary": "SUSE ratings",
"url": "https://www.suse.com/support/security/rating/"
},
{
"category": "self",
"summary": "URL of this CSAF notice",
"url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2026_1081-1.json"
},
{
"category": "self",
"summary": "URL for SUSE-SU-2026:1081-1",
"url": "https://www.suse.com/support/update/announcement/2026/suse-su-20261081-1/"
},
{
"category": "self",
"summary": "E-Mail link for SUSE-SU-2026:1081-1",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-March/024953.html"
},
{
"category": "self",
"summary": "SUSE Bug 1241345",
"url": "https://bugzilla.suse.com/1241345"
},
{
"category": "self",
"summary": "SUSE Bug 1243055",
"url": "https://bugzilla.suse.com/1243055"
},
{
"category": "self",
"summary": "SUSE Bug 1245728",
"url": "https://bugzilla.suse.com/1245728"
},
{
"category": "self",
"summary": "SUSE Bug 1247180",
"url": "https://bugzilla.suse.com/1247180"
},
{
"category": "self",
"summary": "SUSE Bug 1249587",
"url": "https://bugzilla.suse.com/1249587"
},
{
"category": "self",
"summary": "SUSE Bug 1249998",
"url": "https://bugzilla.suse.com/1249998"
},
{
"category": "self",
"summary": "SUSE Bug 1251135",
"url": "https://bugzilla.suse.com/1251135"
},
{
"category": "self",
"summary": "SUSE Bug 1251186",
"url": "https://bugzilla.suse.com/1251186"
},
{
"category": "self",
"summary": "SUSE Bug 1251966",
"url": "https://bugzilla.suse.com/1251966"
},
{
"category": "self",
"summary": "SUSE Bug 1251971",
"url": "https://bugzilla.suse.com/1251971"
},
{
"category": "self",
"summary": "SUSE Bug 1252008",
"url": "https://bugzilla.suse.com/1252008"
},
{
"category": "self",
"summary": "SUSE Bug 1252266",
"url": "https://bugzilla.suse.com/1252266"
},
{
"category": "self",
"summary": "SUSE Bug 1252911",
"url": "https://bugzilla.suse.com/1252911"
},
{
"category": "self",
"summary": "SUSE Bug 1252924",
"url": "https://bugzilla.suse.com/1252924"
},
{
"category": "self",
"summary": "SUSE Bug 1253049",
"url": "https://bugzilla.suse.com/1253049"
},
{
"category": "self",
"summary": "SUSE Bug 1253129",
"url": "https://bugzilla.suse.com/1253129"
},
{
"category": "self",
"summary": "SUSE Bug 1253455",
"url": "https://bugzilla.suse.com/1253455"
},
{
"category": "self",
"summary": "SUSE Bug 1253644",
"url": "https://bugzilla.suse.com/1253644"
},
{
"category": "self",
"summary": "SUSE Bug 1253691",
"url": "https://bugzilla.suse.com/1253691"
},
{
"category": "self",
"summary": "SUSE Bug 1254214",
"url": "https://bugzilla.suse.com/1254214"
},
{
"category": "self",
"summary": "SUSE Bug 1254306",
"url": "https://bugzilla.suse.com/1254306"
},
{
"category": "self",
"summary": "SUSE Bug 1254992",
"url": "https://bugzilla.suse.com/1254992"
},
{
"category": "self",
"summary": "SUSE Bug 1255084",
"url": "https://bugzilla.suse.com/1255084"
},
{
"category": "self",
"summary": "SUSE Bug 1255129",
"url": "https://bugzilla.suse.com/1255129"
},
{
"category": "self",
"summary": "SUSE Bug 1255265",
"url": "https://bugzilla.suse.com/1255265"
},
{
"category": "self",
"summary": "SUSE Bug 1255379",
"url": "https://bugzilla.suse.com/1255379"
},
{
"category": "self",
"summary": "SUSE Bug 1255530",
"url": "https://bugzilla.suse.com/1255530"
},
{
"category": "self",
"summary": "SUSE Bug 1255698",
"url": "https://bugzilla.suse.com/1255698"
},
{
"category": "self",
"summary": "SUSE Bug 1255811",
"url": "https://bugzilla.suse.com/1255811"
},
{
"category": "self",
"summary": "SUSE Bug 1256564",
"url": "https://bugzilla.suse.com/1256564"
},
{
"category": "self",
"summary": "SUSE Bug 1256640",
"url": "https://bugzilla.suse.com/1256640"
},
{
"category": "self",
"summary": "SUSE Bug 1256645",
"url": "https://bugzilla.suse.com/1256645"
},
{
"category": "self",
"summary": "SUSE Bug 1256679",
"url": "https://bugzilla.suse.com/1256679"
},
{
"category": "self",
"summary": "SUSE Bug 1256683",
"url": "https://bugzilla.suse.com/1256683"
},
{
"category": "self",
"summary": "SUSE Bug 1256708",
"url": "https://bugzilla.suse.com/1256708"
},
{
"category": "self",
"summary": "SUSE Bug 1256716",
"url": "https://bugzilla.suse.com/1256716"
},
{
"category": "self",
"summary": "SUSE Bug 1256755",
"url": "https://bugzilla.suse.com/1256755"
},
{
"category": "self",
"summary": "SUSE Bug 1256784",
"url": "https://bugzilla.suse.com/1256784"
},
{
"category": "self",
"summary": "SUSE Bug 1256802",
"url": "https://bugzilla.suse.com/1256802"
},
{
"category": "self",
"summary": "SUSE Bug 1256863",
"url": "https://bugzilla.suse.com/1256863"
},
{
"category": "self",
"summary": "SUSE Bug 1257159",
"url": "https://bugzilla.suse.com/1257159"
},
{
"category": "self",
"summary": "SUSE Bug 1257179",
"url": "https://bugzilla.suse.com/1257179"
},
{
"category": "self",
"summary": "SUSE Bug 1257209",
"url": "https://bugzilla.suse.com/1257209"
},
{
"category": "self",
"summary": "SUSE Bug 1257228",
"url": "https://bugzilla.suse.com/1257228"
},
{
"category": "self",
"summary": "SUSE Bug 1257231",
"url": "https://bugzilla.suse.com/1257231"
},
{
"category": "self",
"summary": "SUSE Bug 1257246",
"url": "https://bugzilla.suse.com/1257246"
},
{
"category": "self",
"summary": "SUSE Bug 1257279",
"url": "https://bugzilla.suse.com/1257279"
},
{
"category": "self",
"summary": "SUSE Bug 1257332",
"url": "https://bugzilla.suse.com/1257332"
},
{
"category": "self",
"summary": "SUSE Bug 1257466",
"url": "https://bugzilla.suse.com/1257466"
},
{
"category": "self",
"summary": "SUSE Bug 1257472",
"url": "https://bugzilla.suse.com/1257472"
},
{
"category": "self",
"summary": "SUSE Bug 1257473",
"url": "https://bugzilla.suse.com/1257473"
},
{
"category": "self",
"summary": "SUSE Bug 1257552",
"url": "https://bugzilla.suse.com/1257552"
},
{
"category": "self",
"summary": "SUSE Bug 1257553",
"url": "https://bugzilla.suse.com/1257553"
},
{
"category": "self",
"summary": "SUSE Bug 1257554",
"url": "https://bugzilla.suse.com/1257554"
},
{
"category": "self",
"summary": "SUSE Bug 1257556",
"url": "https://bugzilla.suse.com/1257556"
},
{
"category": "self",
"summary": "SUSE Bug 1257557",
"url": "https://bugzilla.suse.com/1257557"
},
{
"category": "self",
"summary": "SUSE Bug 1257559",
"url": "https://bugzilla.suse.com/1257559"
},
{
"category": "self",
"summary": "SUSE Bug 1257560",
"url": "https://bugzilla.suse.com/1257560"
},
{
"category": "self",
"summary": "SUSE Bug 1257562",
"url": "https://bugzilla.suse.com/1257562"
},
{
"category": "self",
"summary": "SUSE Bug 1257570",
"url": "https://bugzilla.suse.com/1257570"
},
{
"category": "self",
"summary": "SUSE Bug 1257573",
"url": "https://bugzilla.suse.com/1257573"
},
{
"category": "self",
"summary": "SUSE Bug 1257576",
"url": "https://bugzilla.suse.com/1257576"
},
{
"category": "self",
"summary": "SUSE Bug 1257579",
"url": "https://bugzilla.suse.com/1257579"
},
{
"category": "self",
"summary": "SUSE Bug 1257580",
"url": "https://bugzilla.suse.com/1257580"
},
{
"category": "self",
"summary": "SUSE Bug 1257586",
"url": "https://bugzilla.suse.com/1257586"
},
{
"category": "self",
"summary": "SUSE Bug 1257635",
"url": "https://bugzilla.suse.com/1257635"
},
{
"category": "self",
"summary": "SUSE Bug 1257679",
"url": "https://bugzilla.suse.com/1257679"
},
{
"category": "self",
"summary": "SUSE Bug 1257687",
"url": "https://bugzilla.suse.com/1257687"
},
{
"category": "self",
"summary": "SUSE Bug 1257704",
"url": "https://bugzilla.suse.com/1257704"
},
{
"category": "self",
"summary": "SUSE Bug 1257706",
"url": "https://bugzilla.suse.com/1257706"
},
{
"category": "self",
"summary": "SUSE Bug 1257707",
"url": "https://bugzilla.suse.com/1257707"
},
{
"category": "self",
"summary": "SUSE Bug 1257709",
"url": "https://bugzilla.suse.com/1257709"
},
{
"category": "self",
"summary": "SUSE Bug 1257714",
"url": "https://bugzilla.suse.com/1257714"
},
{
"category": "self",
"summary": "SUSE Bug 1257715",
"url": "https://bugzilla.suse.com/1257715"
},
{
"category": "self",
"summary": "SUSE Bug 1257716",
"url": "https://bugzilla.suse.com/1257716"
},
{
"category": "self",
"summary": "SUSE Bug 1257718",
"url": "https://bugzilla.suse.com/1257718"
},
{
"category": "self",
"summary": "SUSE Bug 1257722",
"url": "https://bugzilla.suse.com/1257722"
},
{
"category": "self",
"summary": "SUSE Bug 1257723",
"url": "https://bugzilla.suse.com/1257723"
},
{
"category": "self",
"summary": "SUSE Bug 1257729",
"url": "https://bugzilla.suse.com/1257729"
},
{
"category": "self",
"summary": "SUSE Bug 1257732",
"url": "https://bugzilla.suse.com/1257732"
},
{
"category": "self",
"summary": "SUSE Bug 1257734",
"url": "https://bugzilla.suse.com/1257734"
},
{
"category": "self",
"summary": "SUSE Bug 1257735",
"url": "https://bugzilla.suse.com/1257735"
},
{
"category": "self",
"summary": "SUSE Bug 1257739",
"url": "https://bugzilla.suse.com/1257739"
},
{
"category": "self",
"summary": "SUSE Bug 1257740",
"url": "https://bugzilla.suse.com/1257740"
},
{
"category": "self",
"summary": "SUSE Bug 1257741",
"url": "https://bugzilla.suse.com/1257741"
},
{
"category": "self",
"summary": "SUSE Bug 1257742",
"url": "https://bugzilla.suse.com/1257742"
},
{
"category": "self",
"summary": "SUSE Bug 1257743",
"url": "https://bugzilla.suse.com/1257743"
},
{
"category": "self",
"summary": "SUSE Bug 1257745",
"url": "https://bugzilla.suse.com/1257745"
},
{
"category": "self",
"summary": "SUSE Bug 1257749",
"url": "https://bugzilla.suse.com/1257749"
},
{
"category": "self",
"summary": "SUSE Bug 1257750",
"url": "https://bugzilla.suse.com/1257750"
},
{
"category": "self",
"summary": "SUSE Bug 1257755",
"url": "https://bugzilla.suse.com/1257755"
},
{
"category": "self",
"summary": "SUSE Bug 1257757",
"url": "https://bugzilla.suse.com/1257757"
},
{
"category": "self",
"summary": "SUSE Bug 1257758",
"url": "https://bugzilla.suse.com/1257758"
},
{
"category": "self",
"summary": "SUSE Bug 1257759",
"url": "https://bugzilla.suse.com/1257759"
},
{
"category": "self",
"summary": "SUSE Bug 1257761",
"url": "https://bugzilla.suse.com/1257761"
},
{
"category": "self",
"summary": "SUSE Bug 1257762",
"url": "https://bugzilla.suse.com/1257762"
},
{
"category": "self",
"summary": "SUSE Bug 1257763",
"url": "https://bugzilla.suse.com/1257763"
},
{
"category": "self",
"summary": "SUSE Bug 1257765",
"url": "https://bugzilla.suse.com/1257765"
},
{
"category": "self",
"summary": "SUSE Bug 1257768",
"url": "https://bugzilla.suse.com/1257768"
},
{
"category": "self",
"summary": "SUSE Bug 1257770",
"url": "https://bugzilla.suse.com/1257770"
},
{
"category": "self",
"summary": "SUSE Bug 1257772",
"url": "https://bugzilla.suse.com/1257772"
},
{
"category": "self",
"summary": "SUSE Bug 1257775",
"url": "https://bugzilla.suse.com/1257775"
},
{
"category": "self",
"summary": "SUSE Bug 1257776",
"url": "https://bugzilla.suse.com/1257776"
},
{
"category": "self",
"summary": "SUSE Bug 1257788",
"url": "https://bugzilla.suse.com/1257788"
},
{
"category": "self",
"summary": "SUSE Bug 1257789",
"url": "https://bugzilla.suse.com/1257789"
},
{
"category": "self",
"summary": "SUSE Bug 1257790",
"url": "https://bugzilla.suse.com/1257790"
},
{
"category": "self",
"summary": "SUSE Bug 1257805",
"url": "https://bugzilla.suse.com/1257805"
},
{
"category": "self",
"summary": "SUSE Bug 1257808",
"url": "https://bugzilla.suse.com/1257808"
},
{
"category": "self",
"summary": "SUSE Bug 1257809",
"url": "https://bugzilla.suse.com/1257809"
},
{
"category": "self",
"summary": "SUSE Bug 1257811",
"url": "https://bugzilla.suse.com/1257811"
},
{
"category": "self",
"summary": "SUSE Bug 1257813",
"url": "https://bugzilla.suse.com/1257813"
},
{
"category": "self",
"summary": "SUSE Bug 1257814",
"url": "https://bugzilla.suse.com/1257814"
},
{
"category": "self",
"summary": "SUSE Bug 1257816",
"url": "https://bugzilla.suse.com/1257816"
},
{
"category": "self",
"summary": "SUSE Bug 1257830",
"url": "https://bugzilla.suse.com/1257830"
},
{
"category": "self",
"summary": "SUSE Bug 1257891",
"url": "https://bugzilla.suse.com/1257891"
},
{
"category": "self",
"summary": "SUSE Bug 1257942",
"url": "https://bugzilla.suse.com/1257942"
},
{
"category": "self",
"summary": "SUSE Bug 1257952",
"url": "https://bugzilla.suse.com/1257952"
},
{
"category": "self",
"summary": "SUSE Bug 1258037",
"url": "https://bugzilla.suse.com/1258037"
},
{
"category": "self",
"summary": "SUSE Bug 1258153",
"url": "https://bugzilla.suse.com/1258153"
},
{
"category": "self",
"summary": "SUSE Bug 1258176",
"url": "https://bugzilla.suse.com/1258176"
},
{
"category": "self",
"summary": "SUSE Bug 1258181",
"url": "https://bugzilla.suse.com/1258181"
},
{
"category": "self",
"summary": "SUSE Bug 1258184",
"url": "https://bugzilla.suse.com/1258184"
},
{
"category": "self",
"summary": "SUSE Bug 1258222",
"url": "https://bugzilla.suse.com/1258222"
},
{
"category": "self",
"summary": "SUSE Bug 1258226",
"url": "https://bugzilla.suse.com/1258226"
},
{
"category": "self",
"summary": "SUSE Bug 1258234",
"url": "https://bugzilla.suse.com/1258234"
},
{
"category": "self",
"summary": "SUSE Bug 1258237",
"url": "https://bugzilla.suse.com/1258237"
},
{
"category": "self",
"summary": "SUSE Bug 1258245",
"url": "https://bugzilla.suse.com/1258245"
},
{
"category": "self",
"summary": "SUSE Bug 1258249",
"url": "https://bugzilla.suse.com/1258249"
},
{
"category": "self",
"summary": "SUSE Bug 1258252",
"url": "https://bugzilla.suse.com/1258252"
},
{
"category": "self",
"summary": "SUSE Bug 1258256",
"url": "https://bugzilla.suse.com/1258256"
},
{
"category": "self",
"summary": "SUSE Bug 1258259",
"url": "https://bugzilla.suse.com/1258259"
},
{
"category": "self",
"summary": "SUSE Bug 1258272",
"url": "https://bugzilla.suse.com/1258272"
},
{
"category": "self",
"summary": "SUSE Bug 1258273",
"url": "https://bugzilla.suse.com/1258273"
},
{
"category": "self",
"summary": "SUSE Bug 1258277",
"url": "https://bugzilla.suse.com/1258277"
},
{
"category": "self",
"summary": "SUSE Bug 1258278",
"url": "https://bugzilla.suse.com/1258278"
},
{
"category": "self",
"summary": "SUSE Bug 1258279",
"url": "https://bugzilla.suse.com/1258279"
},
{
"category": "self",
"summary": "SUSE Bug 1258286",
"url": "https://bugzilla.suse.com/1258286"
},
{
"category": "self",
"summary": "SUSE Bug 1258293",
"url": "https://bugzilla.suse.com/1258293"
},
{
"category": "self",
"summary": "SUSE Bug 1258297",
"url": "https://bugzilla.suse.com/1258297"
},
{
"category": "self",
"summary": "SUSE Bug 1258298",
"url": "https://bugzilla.suse.com/1258298"
},
{
"category": "self",
"summary": "SUSE Bug 1258299",
"url": "https://bugzilla.suse.com/1258299"
},
{
"category": "self",
"summary": "SUSE Bug 1258304",
"url": "https://bugzilla.suse.com/1258304"
},
{
"category": "self",
"summary": "SUSE Bug 1258309",
"url": "https://bugzilla.suse.com/1258309"
},
{
"category": "self",
"summary": "SUSE Bug 1258313",
"url": "https://bugzilla.suse.com/1258313"
},
{
"category": "self",
"summary": "SUSE Bug 1258317",
"url": "https://bugzilla.suse.com/1258317"
},
{
"category": "self",
"summary": "SUSE Bug 1258321",
"url": "https://bugzilla.suse.com/1258321"
},
{
"category": "self",
"summary": "SUSE Bug 1258326",
"url": "https://bugzilla.suse.com/1258326"
},
{
"category": "self",
"summary": "SUSE Bug 1258338",
"url": "https://bugzilla.suse.com/1258338"
},
{
"category": "self",
"summary": "SUSE Bug 1258340",
"url": "https://bugzilla.suse.com/1258340"
},
{
"category": "self",
"summary": "SUSE Bug 1258349",
"url": "https://bugzilla.suse.com/1258349"
},
{
"category": "self",
"summary": "SUSE Bug 1258354",
"url": "https://bugzilla.suse.com/1258354"
},
{
"category": "self",
"summary": "SUSE Bug 1258358",
"url": "https://bugzilla.suse.com/1258358"
},
{
"category": "self",
"summary": "SUSE Bug 1258374",
"url": "https://bugzilla.suse.com/1258374"
},
{
"category": "self",
"summary": "SUSE Bug 1258376",
"url": "https://bugzilla.suse.com/1258376"
},
{
"category": "self",
"summary": "SUSE Bug 1258377",
"url": "https://bugzilla.suse.com/1258377"
},
{
"category": "self",
"summary": "SUSE Bug 1258379",
"url": "https://bugzilla.suse.com/1258379"
},
{
"category": "self",
"summary": "SUSE Bug 1258389",
"url": "https://bugzilla.suse.com/1258389"
},
{
"category": "self",
"summary": "SUSE Bug 1258394",
"url": "https://bugzilla.suse.com/1258394"
},
{
"category": "self",
"summary": "SUSE Bug 1258395",
"url": "https://bugzilla.suse.com/1258395"
},
{
"category": "self",
"summary": "SUSE Bug 1258397",
"url": "https://bugzilla.suse.com/1258397"
},
{
"category": "self",
"summary": "SUSE Bug 1258411",
"url": "https://bugzilla.suse.com/1258411"
},
{
"category": "self",
"summary": "SUSE Bug 1258415",
"url": "https://bugzilla.suse.com/1258415"
},
{
"category": "self",
"summary": "SUSE Bug 1258419",
"url": "https://bugzilla.suse.com/1258419"
},
{
"category": "self",
"summary": "SUSE Bug 1258422",
"url": "https://bugzilla.suse.com/1258422"
},
{
"category": "self",
"summary": "SUSE Bug 1258424",
"url": "https://bugzilla.suse.com/1258424"
},
{
"category": "self",
"summary": "SUSE Bug 1258429",
"url": "https://bugzilla.suse.com/1258429"
},
{
"category": "self",
"summary": "SUSE Bug 1258442",
"url": "https://bugzilla.suse.com/1258442"
},
{
"category": "self",
"summary": "SUSE Bug 1258464",
"url": "https://bugzilla.suse.com/1258464"
},
{
"category": "self",
"summary": "SUSE Bug 1258465",
"url": "https://bugzilla.suse.com/1258465"
},
{
"category": "self",
"summary": "SUSE Bug 1258468",
"url": "https://bugzilla.suse.com/1258468"
},
{
"category": "self",
"summary": "SUSE Bug 1258469",
"url": "https://bugzilla.suse.com/1258469"
},
{
"category": "self",
"summary": "SUSE Bug 1258484",
"url": "https://bugzilla.suse.com/1258484"
},
{
"category": "self",
"summary": "SUSE Bug 1258517",
"url": "https://bugzilla.suse.com/1258517"
},
{
"category": "self",
"summary": "SUSE Bug 1258518",
"url": "https://bugzilla.suse.com/1258518"
},
{
"category": "self",
"summary": "SUSE Bug 1258519",
"url": "https://bugzilla.suse.com/1258519"
},
{
"category": "self",
"summary": "SUSE Bug 1258520",
"url": "https://bugzilla.suse.com/1258520"
},
{
"category": "self",
"summary": "SUSE Bug 1258524",
"url": "https://bugzilla.suse.com/1258524"
},
{
"category": "self",
"summary": "SUSE Bug 1258544",
"url": "https://bugzilla.suse.com/1258544"
},
{
"category": "self",
"summary": "SUSE Bug 1258660",
"url": "https://bugzilla.suse.com/1258660"
},
{
"category": "self",
"summary": "SUSE Bug 1258824",
"url": "https://bugzilla.suse.com/1258824"
},
{
"category": "self",
"summary": "SUSE Bug 1258832",
"url": "https://bugzilla.suse.com/1258832"
},
{
"category": "self",
"summary": "SUSE Bug 1258849",
"url": "https://bugzilla.suse.com/1258849"
},
{
"category": "self",
"summary": "SUSE Bug 1258850",
"url": "https://bugzilla.suse.com/1258850"
},
{
"category": "self",
"summary": "SUSE Bug 1258860",
"url": "https://bugzilla.suse.com/1258860"
},
{
"category": "self",
"summary": "SUSE Bug 1258928",
"url": "https://bugzilla.suse.com/1258928"
},
{
"category": "self",
"summary": "SUSE Bug 1259070",
"url": "https://bugzilla.suse.com/1259070"
},
{
"category": "self",
"summary": "SUSE Bug 1259130",
"url": "https://bugzilla.suse.com/1259130"
},
{
"category": "self",
"summary": "SUSE Bug 1259558",
"url": "https://bugzilla.suse.com/1259558"
},
{
"category": "self",
"summary": "SUSE Bug 1259580",
"url": "https://bugzilla.suse.com/1259580"
},
{
"category": "self",
"summary": "SUSE Bug 1259857",
"url": "https://bugzilla.suse.com/1259857"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2023-53817 page",
"url": "https://www.suse.com/security/cve/CVE-2023-53817/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-37861 page",
"url": "https://www.suse.com/security/cve/CVE-2025-37861/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-39748 page",
"url": "https://www.suse.com/security/cve/CVE-2025-39748/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-39817 page",
"url": "https://www.suse.com/security/cve/CVE-2025-39817/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-39964 page",
"url": "https://www.suse.com/security/cve/CVE-2025-39964/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40099 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40099/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40103 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40103/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40201 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40201/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40253 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40253/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-68283 page",
"url": "https://www.suse.com/security/cve/CVE-2025-68283/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-68295 page",
"url": "https://www.suse.com/security/cve/CVE-2025-68295/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-68374 page",
"url": "https://www.suse.com/security/cve/CVE-2025-68374/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-68735 page",
"url": "https://www.suse.com/security/cve/CVE-2025-68735/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-68736 page",
"url": "https://www.suse.com/security/cve/CVE-2025-68736/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-68778 page",
"url": "https://www.suse.com/security/cve/CVE-2025-68778/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-68785 page",
"url": "https://www.suse.com/security/cve/CVE-2025-68785/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-68810 page",
"url": "https://www.suse.com/security/cve/CVE-2025-68810/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-71066 page",
"url": "https://www.suse.com/security/cve/CVE-2025-71066/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-71071 page",
"url": "https://www.suse.com/security/cve/CVE-2025-71071/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-71104 page",
"url": "https://www.suse.com/security/cve/CVE-2025-71104/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-71113 page",
"url": "https://www.suse.com/security/cve/CVE-2025-71113/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-71125 page",
"url": "https://www.suse.com/security/cve/CVE-2025-71125/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-71126 page",
"url": "https://www.suse.com/security/cve/CVE-2025-71126/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-71148 page",
"url": "https://www.suse.com/security/cve/CVE-2025-71148/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-71182 page",
"url": "https://www.suse.com/security/cve/CVE-2025-71182/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-71184 page",
"url": "https://www.suse.com/security/cve/CVE-2025-71184/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-71185 page",
"url": "https://www.suse.com/security/cve/CVE-2025-71185/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-71188 page",
"url": "https://www.suse.com/security/cve/CVE-2025-71188/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-71189 page",
"url": "https://www.suse.com/security/cve/CVE-2025-71189/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-71190 page",
"url": "https://www.suse.com/security/cve/CVE-2025-71190/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-71191 page",
"url": "https://www.suse.com/security/cve/CVE-2025-71191/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-71192 page",
"url": "https://www.suse.com/security/cve/CVE-2025-71192/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-71194 page",
"url": "https://www.suse.com/security/cve/CVE-2025-71194/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-71195 page",
"url": "https://www.suse.com/security/cve/CVE-2025-71195/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-71196 page",
"url": "https://www.suse.com/security/cve/CVE-2025-71196/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-71197 page",
"url": "https://www.suse.com/security/cve/CVE-2025-71197/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-71198 page",
"url": "https://www.suse.com/security/cve/CVE-2025-71198/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-71199 page",
"url": "https://www.suse.com/security/cve/CVE-2025-71199/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-71200 page",
"url": "https://www.suse.com/security/cve/CVE-2025-71200/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-71222 page",
"url": "https://www.suse.com/security/cve/CVE-2025-71222/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-71224 page",
"url": "https://www.suse.com/security/cve/CVE-2025-71224/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-71225 page",
"url": "https://www.suse.com/security/cve/CVE-2025-71225/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-71229 page",
"url": "https://www.suse.com/security/cve/CVE-2025-71229/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-71231 page",
"url": "https://www.suse.com/security/cve/CVE-2025-71231/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-71232 page",
"url": "https://www.suse.com/security/cve/CVE-2025-71232/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-71234 page",
"url": "https://www.suse.com/security/cve/CVE-2025-71234/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-71235 page",
"url": "https://www.suse.com/security/cve/CVE-2025-71235/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-71236 page",
"url": "https://www.suse.com/security/cve/CVE-2025-71236/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2026-22979 page",
"url": "https://www.suse.com/security/cve/CVE-2026-22979/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2026-22982 page",
"url": "https://www.suse.com/security/cve/CVE-2026-22982/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2026-22989 page",
"url": "https://www.suse.com/security/cve/CVE-2026-22989/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2026-22998 page",
"url": "https://www.suse.com/security/cve/CVE-2026-22998/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2026-23003 page",
"url": "https://www.suse.com/security/cve/CVE-2026-23003/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2026-23004 page",
"url": "https://www.suse.com/security/cve/CVE-2026-23004/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2026-23010 page",
"url": "https://www.suse.com/security/cve/CVE-2026-23010/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2026-23017 page",
"url": "https://www.suse.com/security/cve/CVE-2026-23017/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2026-23021 page",
"url": "https://www.suse.com/security/cve/CVE-2026-23021/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2026-23023 page",
"url": "https://www.suse.com/security/cve/CVE-2026-23023/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2026-23026 page",
"url": "https://www.suse.com/security/cve/CVE-2026-23026/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2026-23033 page",
"url": "https://www.suse.com/security/cve/CVE-2026-23033/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2026-23035 page",
"url": "https://www.suse.com/security/cve/CVE-2026-23035/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2026-23037 page",
"url": "https://www.suse.com/security/cve/CVE-2026-23037/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2026-23038 page",
"url": "https://www.suse.com/security/cve/CVE-2026-23038/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2026-23049 page",
"url": "https://www.suse.com/security/cve/CVE-2026-23049/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2026-23053 page",
"url": "https://www.suse.com/security/cve/CVE-2026-23053/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2026-23054 page",
"url": "https://www.suse.com/security/cve/CVE-2026-23054/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2026-23056 page",
"url": "https://www.suse.com/security/cve/CVE-2026-23056/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2026-23057 page",
"url": "https://www.suse.com/security/cve/CVE-2026-23057/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2026-23058 page",
"url": "https://www.suse.com/security/cve/CVE-2026-23058/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2026-23060 page",
"url": "https://www.suse.com/security/cve/CVE-2026-23060/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2026-23061 page",
"url": "https://www.suse.com/security/cve/CVE-2026-23061/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2026-23062 page",
"url": "https://www.suse.com/security/cve/CVE-2026-23062/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2026-23063 page",
"url": "https://www.suse.com/security/cve/CVE-2026-23063/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2026-23064 page",
"url": "https://www.suse.com/security/cve/CVE-2026-23064/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2026-23065 page",
"url": "https://www.suse.com/security/cve/CVE-2026-23065/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2026-23068 page",
"url": "https://www.suse.com/security/cve/CVE-2026-23068/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2026-23069 page",
"url": "https://www.suse.com/security/cve/CVE-2026-23069/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2026-23070 page",
"url": "https://www.suse.com/security/cve/CVE-2026-23070/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2026-23071 page",
"url": "https://www.suse.com/security/cve/CVE-2026-23071/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2026-23073 page",
"url": "https://www.suse.com/security/cve/CVE-2026-23073/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2026-23074 page",
"url": "https://www.suse.com/security/cve/CVE-2026-23074/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2026-23076 page",
"url": "https://www.suse.com/security/cve/CVE-2026-23076/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2026-23078 page",
"url": "https://www.suse.com/security/cve/CVE-2026-23078/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2026-23080 page",
"url": "https://www.suse.com/security/cve/CVE-2026-23080/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2026-23082 page",
"url": "https://www.suse.com/security/cve/CVE-2026-23082/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2026-23083 page",
"url": "https://www.suse.com/security/cve/CVE-2026-23083/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2026-23084 page",
"url": "https://www.suse.com/security/cve/CVE-2026-23084/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2026-23085 page",
"url": "https://www.suse.com/security/cve/CVE-2026-23085/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2026-23086 page",
"url": "https://www.suse.com/security/cve/CVE-2026-23086/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2026-23088 page",
"url": "https://www.suse.com/security/cve/CVE-2026-23088/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2026-23089 page",
"url": "https://www.suse.com/security/cve/CVE-2026-23089/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2026-23090 page",
"url": "https://www.suse.com/security/cve/CVE-2026-23090/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2026-23091 page",
"url": "https://www.suse.com/security/cve/CVE-2026-23091/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2026-23094 page",
"url": "https://www.suse.com/security/cve/CVE-2026-23094/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2026-23095 page",
"url": "https://www.suse.com/security/cve/CVE-2026-23095/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2026-23096 page",
"url": "https://www.suse.com/security/cve/CVE-2026-23096/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2026-23099 page",
"url": "https://www.suse.com/security/cve/CVE-2026-23099/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2026-23101 page",
"url": "https://www.suse.com/security/cve/CVE-2026-23101/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2026-23102 page",
"url": "https://www.suse.com/security/cve/CVE-2026-23102/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2026-23104 page",
"url": "https://www.suse.com/security/cve/CVE-2026-23104/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2026-23105 page",
"url": "https://www.suse.com/security/cve/CVE-2026-23105/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2026-23107 page",
"url": "https://www.suse.com/security/cve/CVE-2026-23107/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2026-23108 page",
"url": "https://www.suse.com/security/cve/CVE-2026-23108/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2026-23110 page",
"url": "https://www.suse.com/security/cve/CVE-2026-23110/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2026-23111 page",
"url": "https://www.suse.com/security/cve/CVE-2026-23111/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2026-23112 page",
"url": "https://www.suse.com/security/cve/CVE-2026-23112/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2026-23113 page",
"url": "https://www.suse.com/security/cve/CVE-2026-23113/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2026-23116 page",
"url": "https://www.suse.com/security/cve/CVE-2026-23116/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2026-23119 page",
"url": "https://www.suse.com/security/cve/CVE-2026-23119/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2026-23121 page",
"url": "https://www.suse.com/security/cve/CVE-2026-23121/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2026-23125 page",
"url": "https://www.suse.com/security/cve/CVE-2026-23125/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2026-23128 page",
"url": "https://www.suse.com/security/cve/CVE-2026-23128/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2026-23129 page",
"url": "https://www.suse.com/security/cve/CVE-2026-23129/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2026-23131 page",
"url": "https://www.suse.com/security/cve/CVE-2026-23131/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2026-23133 page",
"url": "https://www.suse.com/security/cve/CVE-2026-23133/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2026-23135 page",
"url": "https://www.suse.com/security/cve/CVE-2026-23135/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2026-23139 page",
"url": "https://www.suse.com/security/cve/CVE-2026-23139/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2026-23141 page",
"url": "https://www.suse.com/security/cve/CVE-2026-23141/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2026-23145 page",
"url": "https://www.suse.com/security/cve/CVE-2026-23145/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2026-23146 page",
"url": "https://www.suse.com/security/cve/CVE-2026-23146/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2026-23150 page",
"url": "https://www.suse.com/security/cve/CVE-2026-23150/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2026-23151 page",
"url": "https://www.suse.com/security/cve/CVE-2026-23151/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2026-23152 page",
"url": "https://www.suse.com/security/cve/CVE-2026-23152/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2026-23154 page",
"url": "https://www.suse.com/security/cve/CVE-2026-23154/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2026-23155 page",
"url": "https://www.suse.com/security/cve/CVE-2026-23155/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2026-23156 page",
"url": "https://www.suse.com/security/cve/CVE-2026-23156/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2026-23157 page",
"url": "https://www.suse.com/security/cve/CVE-2026-23157/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2026-23163 page",
"url": "https://www.suse.com/security/cve/CVE-2026-23163/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2026-23166 page",
"url": "https://www.suse.com/security/cve/CVE-2026-23166/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2026-23167 page",
"url": "https://www.suse.com/security/cve/CVE-2026-23167/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2026-23169 page",
"url": "https://www.suse.com/security/cve/CVE-2026-23169/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2026-23170 page",
"url": "https://www.suse.com/security/cve/CVE-2026-23170/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2026-23171 page",
"url": "https://www.suse.com/security/cve/CVE-2026-23171/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2026-23172 page",
"url": "https://www.suse.com/security/cve/CVE-2026-23172/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2026-23173 page",
"url": "https://www.suse.com/security/cve/CVE-2026-23173/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2026-23176 page",
"url": "https://www.suse.com/security/cve/CVE-2026-23176/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2026-23178 page",
"url": "https://www.suse.com/security/cve/CVE-2026-23178/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2026-23179 page",
"url": "https://www.suse.com/security/cve/CVE-2026-23179/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2026-23182 page",
"url": "https://www.suse.com/security/cve/CVE-2026-23182/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2026-23190 page",
"url": "https://www.suse.com/security/cve/CVE-2026-23190/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2026-23191 page",
"url": "https://www.suse.com/security/cve/CVE-2026-23191/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2026-23198 page",
"url": "https://www.suse.com/security/cve/CVE-2026-23198/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2026-23202 page",
"url": "https://www.suse.com/security/cve/CVE-2026-23202/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2026-23204 page",
"url": "https://www.suse.com/security/cve/CVE-2026-23204/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2026-23207 page",
"url": "https://www.suse.com/security/cve/CVE-2026-23207/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2026-23208 page",
"url": "https://www.suse.com/security/cve/CVE-2026-23208/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2026-23209 page",
"url": "https://www.suse.com/security/cve/CVE-2026-23209/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2026-23210 page",
"url": "https://www.suse.com/security/cve/CVE-2026-23210/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2026-23213 page",
"url": "https://www.suse.com/security/cve/CVE-2026-23213/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2026-23214 page",
"url": "https://www.suse.com/security/cve/CVE-2026-23214/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2026-23221 page",
"url": "https://www.suse.com/security/cve/CVE-2026-23221/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2026-23222 page",
"url": "https://www.suse.com/security/cve/CVE-2026-23222/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2026-23229 page",
"url": "https://www.suse.com/security/cve/CVE-2026-23229/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2026-23268 page",
"url": "https://www.suse.com/security/cve/CVE-2026-23268/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2026-23269 page",
"url": "https://www.suse.com/security/cve/CVE-2026-23269/"
}
],
"title": "Security update for the Linux Kernel",
"tracking": {
"current_release_date": "2026-03-26T13:23:51Z",
"generator": {
"date": "2026-03-26T13:23:51Z",
"engine": {
"name": "cve-database.git:bin/generate-csaf.pl",
"version": "1"
}
},
"id": "SUSE-SU-2026:1081-1",
"initial_release_date": "2026-03-26T13:23:51Z",
"revision_history": [
{
"date": "2026-03-26T13:23:51Z",
"number": "1",
"summary": "Current version"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "cluster-md-kmp-64kb-6.4.0-150700.53.34.1.aarch64",
"product": {
"name": "cluster-md-kmp-64kb-6.4.0-150700.53.34.1.aarch64",
"product_id": "cluster-md-kmp-64kb-6.4.0-150700.53.34.1.aarch64"
}
},
{
"category": "product_version",
"name": "cluster-md-kmp-azure-6.4.0-150700.53.34.1.aarch64",
"product": {
"name": "cluster-md-kmp-azure-6.4.0-150700.53.34.1.aarch64",
"product_id": "cluster-md-kmp-azure-6.4.0-150700.53.34.1.aarch64"
}
},
{
"category": "product_version",
"name": "cluster-md-kmp-default-6.4.0-150700.53.34.1.aarch64",
"product": {
"name": "cluster-md-kmp-default-6.4.0-150700.53.34.1.aarch64",
"product_id": "cluster-md-kmp-default-6.4.0-150700.53.34.1.aarch64"
}
},
{
"category": "product_version",
"name": "dlm-kmp-64kb-6.4.0-150700.53.34.1.aarch64",
"product": {
"name": "dlm-kmp-64kb-6.4.0-150700.53.34.1.aarch64",
"product_id": "dlm-kmp-64kb-6.4.0-150700.53.34.1.aarch64"
}
},
{
"category": "product_version",
"name": "dlm-kmp-azure-6.4.0-150700.53.34.1.aarch64",
"product": {
"name": "dlm-kmp-azure-6.4.0-150700.53.34.1.aarch64",
"product_id": "dlm-kmp-azure-6.4.0-150700.53.34.1.aarch64"
}
},
{
"category": "product_version",
"name": "dlm-kmp-default-6.4.0-150700.53.34.1.aarch64",
"product": {
"name": "dlm-kmp-default-6.4.0-150700.53.34.1.aarch64",
"product_id": "dlm-kmp-default-6.4.0-150700.53.34.1.aarch64"
}
},
{
"category": "product_version",
"name": "dtb-allwinner-6.4.0-150700.53.34.1.aarch64",
"product": {
"name": "dtb-allwinner-6.4.0-150700.53.34.1.aarch64",
"product_id": "dtb-allwinner-6.4.0-150700.53.34.1.aarch64"
}
},
{
"category": "product_version",
"name": "dtb-altera-6.4.0-150700.53.34.1.aarch64",
"product": {
"name": "dtb-altera-6.4.0-150700.53.34.1.aarch64",
"product_id": "dtb-altera-6.4.0-150700.53.34.1.aarch64"
}
},
{
"category": "product_version",
"name": "dtb-amazon-6.4.0-150700.53.34.1.aarch64",
"product": {
"name": "dtb-amazon-6.4.0-150700.53.34.1.aarch64",
"product_id": "dtb-amazon-6.4.0-150700.53.34.1.aarch64"
}
},
{
"category": "product_version",
"name": "dtb-amd-6.4.0-150700.53.34.1.aarch64",
"product": {
"name": "dtb-amd-6.4.0-150700.53.34.1.aarch64",
"product_id": "dtb-amd-6.4.0-150700.53.34.1.aarch64"
}
},
{
"category": "product_version",
"name": "dtb-amlogic-6.4.0-150700.53.34.1.aarch64",
"product": {
"name": "dtb-amlogic-6.4.0-150700.53.34.1.aarch64",
"product_id": "dtb-amlogic-6.4.0-150700.53.34.1.aarch64"
}
},
{
"category": "product_version",
"name": "dtb-apm-6.4.0-150700.53.34.1.aarch64",
"product": {
"name": "dtb-apm-6.4.0-150700.53.34.1.aarch64",
"product_id": "dtb-apm-6.4.0-150700.53.34.1.aarch64"
}
},
{
"category": "product_version",
"name": "dtb-apple-6.4.0-150700.53.34.1.aarch64",
"product": {
"name": "dtb-apple-6.4.0-150700.53.34.1.aarch64",
"product_id": "dtb-apple-6.4.0-150700.53.34.1.aarch64"
}
},
{
"category": "product_version",
"name": "dtb-arm-6.4.0-150700.53.34.1.aarch64",
"product": {
"name": "dtb-arm-6.4.0-150700.53.34.1.aarch64",
"product_id": "dtb-arm-6.4.0-150700.53.34.1.aarch64"
}
},
{
"category": "product_version",
"name": "dtb-broadcom-6.4.0-150700.53.34.1.aarch64",
"product": {
"name": "dtb-broadcom-6.4.0-150700.53.34.1.aarch64",
"product_id": "dtb-broadcom-6.4.0-150700.53.34.1.aarch64"
}
},
{
"category": "product_version",
"name": "dtb-cavium-6.4.0-150700.53.34.1.aarch64",
"product": {
"name": "dtb-cavium-6.4.0-150700.53.34.1.aarch64",
"product_id": "dtb-cavium-6.4.0-150700.53.34.1.aarch64"
}
},
{
"category": "product_version",
"name": "dtb-exynos-6.4.0-150700.53.34.1.aarch64",
"product": {
"name": "dtb-exynos-6.4.0-150700.53.34.1.aarch64",
"product_id": "dtb-exynos-6.4.0-150700.53.34.1.aarch64"
}
},
{
"category": "product_version",
"name": "dtb-freescale-6.4.0-150700.53.34.1.aarch64",
"product": {
"name": "dtb-freescale-6.4.0-150700.53.34.1.aarch64",
"product_id": "dtb-freescale-6.4.0-150700.53.34.1.aarch64"
}
},
{
"category": "product_version",
"name": "dtb-hisilicon-6.4.0-150700.53.34.1.aarch64",
"product": {
"name": "dtb-hisilicon-6.4.0-150700.53.34.1.aarch64",
"product_id": "dtb-hisilicon-6.4.0-150700.53.34.1.aarch64"
}
},
{
"category": "product_version",
"name": "dtb-lg-6.4.0-150700.53.34.1.aarch64",
"product": {
"name": "dtb-lg-6.4.0-150700.53.34.1.aarch64",
"product_id": "dtb-lg-6.4.0-150700.53.34.1.aarch64"
}
},
{
"category": "product_version",
"name": "dtb-marvell-6.4.0-150700.53.34.1.aarch64",
"product": {
"name": "dtb-marvell-6.4.0-150700.53.34.1.aarch64",
"product_id": "dtb-marvell-6.4.0-150700.53.34.1.aarch64"
}
},
{
"category": "product_version",
"name": "dtb-mediatek-6.4.0-150700.53.34.1.aarch64",
"product": {
"name": "dtb-mediatek-6.4.0-150700.53.34.1.aarch64",
"product_id": "dtb-mediatek-6.4.0-150700.53.34.1.aarch64"
}
},
{
"category": "product_version",
"name": "dtb-nvidia-6.4.0-150700.53.34.1.aarch64",
"product": {
"name": "dtb-nvidia-6.4.0-150700.53.34.1.aarch64",
"product_id": "dtb-nvidia-6.4.0-150700.53.34.1.aarch64"
}
},
{
"category": "product_version",
"name": "dtb-qcom-6.4.0-150700.53.34.1.aarch64",
"product": {
"name": "dtb-qcom-6.4.0-150700.53.34.1.aarch64",
"product_id": "dtb-qcom-6.4.0-150700.53.34.1.aarch64"
}
},
{
"category": "product_version",
"name": "dtb-renesas-6.4.0-150700.53.34.1.aarch64",
"product": {
"name": "dtb-renesas-6.4.0-150700.53.34.1.aarch64",
"product_id": "dtb-renesas-6.4.0-150700.53.34.1.aarch64"
}
},
{
"category": "product_version",
"name": "dtb-rockchip-6.4.0-150700.53.34.1.aarch64",
"product": {
"name": "dtb-rockchip-6.4.0-150700.53.34.1.aarch64",
"product_id": "dtb-rockchip-6.4.0-150700.53.34.1.aarch64"
}
},
{
"category": "product_version",
"name": "dtb-socionext-6.4.0-150700.53.34.1.aarch64",
"product": {
"name": "dtb-socionext-6.4.0-150700.53.34.1.aarch64",
"product_id": "dtb-socionext-6.4.0-150700.53.34.1.aarch64"
}
},
{
"category": "product_version",
"name": "dtb-sprd-6.4.0-150700.53.34.1.aarch64",
"product": {
"name": "dtb-sprd-6.4.0-150700.53.34.1.aarch64",
"product_id": "dtb-sprd-6.4.0-150700.53.34.1.aarch64"
}
},
{
"category": "product_version",
"name": "dtb-xilinx-6.4.0-150700.53.34.1.aarch64",
"product": {
"name": "dtb-xilinx-6.4.0-150700.53.34.1.aarch64",
"product_id": "dtb-xilinx-6.4.0-150700.53.34.1.aarch64"
}
},
{
"category": "product_version",
"name": "gfs2-kmp-64kb-6.4.0-150700.53.34.1.aarch64",
"product": {
"name": "gfs2-kmp-64kb-6.4.0-150700.53.34.1.aarch64",
"product_id": "gfs2-kmp-64kb-6.4.0-150700.53.34.1.aarch64"
}
},
{
"category": "product_version",
"name": "gfs2-kmp-azure-6.4.0-150700.53.34.1.aarch64",
"product": {
"name": "gfs2-kmp-azure-6.4.0-150700.53.34.1.aarch64",
"product_id": "gfs2-kmp-azure-6.4.0-150700.53.34.1.aarch64"
}
},
{
"category": "product_version",
"name": "gfs2-kmp-default-6.4.0-150700.53.34.1.aarch64",
"product": {
"name": "gfs2-kmp-default-6.4.0-150700.53.34.1.aarch64",
"product_id": "gfs2-kmp-default-6.4.0-150700.53.34.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-64kb-6.4.0-150700.53.34.1.aarch64",
"product": {
"name": "kernel-64kb-6.4.0-150700.53.34.1.aarch64",
"product_id": "kernel-64kb-6.4.0-150700.53.34.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-64kb-devel-6.4.0-150700.53.34.1.aarch64",
"product": {
"name": "kernel-64kb-devel-6.4.0-150700.53.34.1.aarch64",
"product_id": "kernel-64kb-devel-6.4.0-150700.53.34.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-64kb-extra-6.4.0-150700.53.34.1.aarch64",
"product": {
"name": "kernel-64kb-extra-6.4.0-150700.53.34.1.aarch64",
"product_id": "kernel-64kb-extra-6.4.0-150700.53.34.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-64kb-optional-6.4.0-150700.53.34.1.aarch64",
"product": {
"name": "kernel-64kb-optional-6.4.0-150700.53.34.1.aarch64",
"product_id": "kernel-64kb-optional-6.4.0-150700.53.34.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-azure-6.4.0-150700.53.34.1.aarch64",
"product": {
"name": "kernel-azure-6.4.0-150700.53.34.1.aarch64",
"product_id": "kernel-azure-6.4.0-150700.53.34.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-azure-devel-6.4.0-150700.53.34.1.aarch64",
"product": {
"name": "kernel-azure-devel-6.4.0-150700.53.34.1.aarch64",
"product_id": "kernel-azure-devel-6.4.0-150700.53.34.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-azure-extra-6.4.0-150700.53.34.1.aarch64",
"product": {
"name": "kernel-azure-extra-6.4.0-150700.53.34.1.aarch64",
"product_id": "kernel-azure-extra-6.4.0-150700.53.34.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-azure-optional-6.4.0-150700.53.34.1.aarch64",
"product": {
"name": "kernel-azure-optional-6.4.0-150700.53.34.1.aarch64",
"product_id": "kernel-azure-optional-6.4.0-150700.53.34.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-default-6.4.0-150700.53.34.1.aarch64",
"product": {
"name": "kernel-default-6.4.0-150700.53.34.1.aarch64",
"product_id": "kernel-default-6.4.0-150700.53.34.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-default-base-6.4.0-150700.53.34.1.150700.17.23.1.aarch64",
"product": {
"name": "kernel-default-base-6.4.0-150700.53.34.1.150700.17.23.1.aarch64",
"product_id": "kernel-default-base-6.4.0-150700.53.34.1.150700.17.23.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-default-base-rebuild-6.4.0-150700.53.34.1.150700.17.23.1.aarch64",
"product": {
"name": "kernel-default-base-rebuild-6.4.0-150700.53.34.1.150700.17.23.1.aarch64",
"product_id": "kernel-default-base-rebuild-6.4.0-150700.53.34.1.150700.17.23.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-default-devel-6.4.0-150700.53.34.1.aarch64",
"product": {
"name": "kernel-default-devel-6.4.0-150700.53.34.1.aarch64",
"product_id": "kernel-default-devel-6.4.0-150700.53.34.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-default-extra-6.4.0-150700.53.34.1.aarch64",
"product": {
"name": "kernel-default-extra-6.4.0-150700.53.34.1.aarch64",
"product_id": "kernel-default-extra-6.4.0-150700.53.34.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-default-livepatch-6.4.0-150700.53.34.1.aarch64",
"product": {
"name": "kernel-default-livepatch-6.4.0-150700.53.34.1.aarch64",
"product_id": "kernel-default-livepatch-6.4.0-150700.53.34.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-default-optional-6.4.0-150700.53.34.1.aarch64",
"product": {
"name": "kernel-default-optional-6.4.0-150700.53.34.1.aarch64",
"product_id": "kernel-default-optional-6.4.0-150700.53.34.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-kvmsmall-6.4.0-150700.53.34.1.aarch64",
"product": {
"name": "kernel-kvmsmall-6.4.0-150700.53.34.1.aarch64",
"product_id": "kernel-kvmsmall-6.4.0-150700.53.34.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-kvmsmall-devel-6.4.0-150700.53.34.1.aarch64",
"product": {
"name": "kernel-kvmsmall-devel-6.4.0-150700.53.34.1.aarch64",
"product_id": "kernel-kvmsmall-devel-6.4.0-150700.53.34.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-obs-build-6.4.0-150700.53.34.1.aarch64",
"product": {
"name": "kernel-obs-build-6.4.0-150700.53.34.1.aarch64",
"product_id": "kernel-obs-build-6.4.0-150700.53.34.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-obs-qa-6.4.0-150700.53.34.1.aarch64",
"product": {
"name": "kernel-obs-qa-6.4.0-150700.53.34.1.aarch64",
"product_id": "kernel-obs-qa-6.4.0-150700.53.34.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-syms-6.4.0-150700.53.34.1.aarch64",
"product": {
"name": "kernel-syms-6.4.0-150700.53.34.1.aarch64",
"product_id": "kernel-syms-6.4.0-150700.53.34.1.aarch64"
}
},
{
"category": "product_version",
"name": "kselftests-kmp-64kb-6.4.0-150700.53.34.1.aarch64",
"product": {
"name": "kselftests-kmp-64kb-6.4.0-150700.53.34.1.aarch64",
"product_id": "kselftests-kmp-64kb-6.4.0-150700.53.34.1.aarch64"
}
},
{
"category": "product_version",
"name": "kselftests-kmp-azure-6.4.0-150700.53.34.1.aarch64",
"product": {
"name": "kselftests-kmp-azure-6.4.0-150700.53.34.1.aarch64",
"product_id": "kselftests-kmp-azure-6.4.0-150700.53.34.1.aarch64"
}
},
{
"category": "product_version",
"name": "kselftests-kmp-default-6.4.0-150700.53.34.1.aarch64",
"product": {
"name": "kselftests-kmp-default-6.4.0-150700.53.34.1.aarch64",
"product_id": "kselftests-kmp-default-6.4.0-150700.53.34.1.aarch64"
}
},
{
"category": "product_version",
"name": "ocfs2-kmp-64kb-6.4.0-150700.53.34.1.aarch64",
"product": {
"name": "ocfs2-kmp-64kb-6.4.0-150700.53.34.1.aarch64",
"product_id": "ocfs2-kmp-64kb-6.4.0-150700.53.34.1.aarch64"
}
},
{
"category": "product_version",
"name": "ocfs2-kmp-azure-6.4.0-150700.53.34.1.aarch64",
"product": {
"name": "ocfs2-kmp-azure-6.4.0-150700.53.34.1.aarch64",
"product_id": "ocfs2-kmp-azure-6.4.0-150700.53.34.1.aarch64"
}
},
{
"category": "product_version",
"name": "ocfs2-kmp-default-6.4.0-150700.53.34.1.aarch64",
"product": {
"name": "ocfs2-kmp-default-6.4.0-150700.53.34.1.aarch64",
"product_id": "ocfs2-kmp-default-6.4.0-150700.53.34.1.aarch64"
}
},
{
"category": "product_version",
"name": "reiserfs-kmp-64kb-6.4.0-150700.53.34.1.aarch64",
"product": {
"name": "reiserfs-kmp-64kb-6.4.0-150700.53.34.1.aarch64",
"product_id": "reiserfs-kmp-64kb-6.4.0-150700.53.34.1.aarch64"
}
},
{
"category": "product_version",
"name": "reiserfs-kmp-azure-6.4.0-150700.53.34.1.aarch64",
"product": {
"name": "reiserfs-kmp-azure-6.4.0-150700.53.34.1.aarch64",
"product_id": "reiserfs-kmp-azure-6.4.0-150700.53.34.1.aarch64"
}
},
{
"category": "product_version",
"name": "reiserfs-kmp-default-6.4.0-150700.53.34.1.aarch64",
"product": {
"name": "reiserfs-kmp-default-6.4.0-150700.53.34.1.aarch64",
"product_id": "reiserfs-kmp-default-6.4.0-150700.53.34.1.aarch64"
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-devel-6.4.0-150700.53.34.1.noarch",
"product": {
"name": "kernel-devel-6.4.0-150700.53.34.1.noarch",
"product_id": "kernel-devel-6.4.0-150700.53.34.1.noarch"
}
},
{
"category": "product_version",
"name": "kernel-docs-6.4.0-150700.53.34.1.noarch",
"product": {
"name": "kernel-docs-6.4.0-150700.53.34.1.noarch",
"product_id": "kernel-docs-6.4.0-150700.53.34.1.noarch"
}
},
{
"category": "product_version",
"name": "kernel-docs-html-6.4.0-150700.53.34.1.noarch",
"product": {
"name": "kernel-docs-html-6.4.0-150700.53.34.1.noarch",
"product_id": "kernel-docs-html-6.4.0-150700.53.34.1.noarch"
}
},
{
"category": "product_version",
"name": "kernel-macros-6.4.0-150700.53.34.1.noarch",
"product": {
"name": "kernel-macros-6.4.0-150700.53.34.1.noarch",
"product_id": "kernel-macros-6.4.0-150700.53.34.1.noarch"
}
},
{
"category": "product_version",
"name": "kernel-source-6.4.0-150700.53.34.1.noarch",
"product": {
"name": "kernel-source-6.4.0-150700.53.34.1.noarch",
"product_id": "kernel-source-6.4.0-150700.53.34.1.noarch"
}
},
{
"category": "product_version",
"name": "kernel-source-vanilla-6.4.0-150700.53.34.1.noarch",
"product": {
"name": "kernel-source-vanilla-6.4.0-150700.53.34.1.noarch",
"product_id": "kernel-source-vanilla-6.4.0-150700.53.34.1.noarch"
}
}
],
"category": "architecture",
"name": "noarch"
},
{
"branches": [
{
"category": "product_version",
"name": "cluster-md-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"product": {
"name": "cluster-md-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"product_id": "cluster-md-kmp-default-6.4.0-150700.53.34.1.ppc64le"
}
},
{
"category": "product_version",
"name": "dlm-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"product": {
"name": "dlm-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"product_id": "dlm-kmp-default-6.4.0-150700.53.34.1.ppc64le"
}
},
{
"category": "product_version",
"name": "gfs2-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"product": {
"name": "gfs2-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"product_id": "gfs2-kmp-default-6.4.0-150700.53.34.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-default-6.4.0-150700.53.34.1.ppc64le",
"product": {
"name": "kernel-default-6.4.0-150700.53.34.1.ppc64le",
"product_id": "kernel-default-6.4.0-150700.53.34.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-default-base-6.4.0-150700.53.34.1.150700.17.23.1.ppc64le",
"product": {
"name": "kernel-default-base-6.4.0-150700.53.34.1.150700.17.23.1.ppc64le",
"product_id": "kernel-default-base-6.4.0-150700.53.34.1.150700.17.23.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-default-base-rebuild-6.4.0-150700.53.34.1.150700.17.23.1.ppc64le",
"product": {
"name": "kernel-default-base-rebuild-6.4.0-150700.53.34.1.150700.17.23.1.ppc64le",
"product_id": "kernel-default-base-rebuild-6.4.0-150700.53.34.1.150700.17.23.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-default-devel-6.4.0-150700.53.34.1.ppc64le",
"product": {
"name": "kernel-default-devel-6.4.0-150700.53.34.1.ppc64le",
"product_id": "kernel-default-devel-6.4.0-150700.53.34.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-default-extra-6.4.0-150700.53.34.1.ppc64le",
"product": {
"name": "kernel-default-extra-6.4.0-150700.53.34.1.ppc64le",
"product_id": "kernel-default-extra-6.4.0-150700.53.34.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-default-livepatch-6.4.0-150700.53.34.1.ppc64le",
"product": {
"name": "kernel-default-livepatch-6.4.0-150700.53.34.1.ppc64le",
"product_id": "kernel-default-livepatch-6.4.0-150700.53.34.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-default-livepatch-devel-6.4.0-150700.53.34.1.ppc64le",
"product": {
"name": "kernel-default-livepatch-devel-6.4.0-150700.53.34.1.ppc64le",
"product_id": "kernel-default-livepatch-devel-6.4.0-150700.53.34.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-default-optional-6.4.0-150700.53.34.1.ppc64le",
"product": {
"name": "kernel-default-optional-6.4.0-150700.53.34.1.ppc64le",
"product_id": "kernel-default-optional-6.4.0-150700.53.34.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-kvmsmall-6.4.0-150700.53.34.1.ppc64le",
"product": {
"name": "kernel-kvmsmall-6.4.0-150700.53.34.1.ppc64le",
"product_id": "kernel-kvmsmall-6.4.0-150700.53.34.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-kvmsmall-devel-6.4.0-150700.53.34.1.ppc64le",
"product": {
"name": "kernel-kvmsmall-devel-6.4.0-150700.53.34.1.ppc64le",
"product_id": "kernel-kvmsmall-devel-6.4.0-150700.53.34.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-livepatch-6_4_0-150700_53_34-default-1-150700.15.3.1.ppc64le",
"product": {
"name": "kernel-livepatch-6_4_0-150700_53_34-default-1-150700.15.3.1.ppc64le",
"product_id": "kernel-livepatch-6_4_0-150700_53_34-default-1-150700.15.3.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-obs-build-6.4.0-150700.53.34.1.ppc64le",
"product": {
"name": "kernel-obs-build-6.4.0-150700.53.34.1.ppc64le",
"product_id": "kernel-obs-build-6.4.0-150700.53.34.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-obs-qa-6.4.0-150700.53.34.1.ppc64le",
"product": {
"name": "kernel-obs-qa-6.4.0-150700.53.34.1.ppc64le",
"product_id": "kernel-obs-qa-6.4.0-150700.53.34.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-syms-6.4.0-150700.53.34.1.ppc64le",
"product": {
"name": "kernel-syms-6.4.0-150700.53.34.1.ppc64le",
"product_id": "kernel-syms-6.4.0-150700.53.34.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kselftests-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"product": {
"name": "kselftests-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"product_id": "kselftests-kmp-default-6.4.0-150700.53.34.1.ppc64le"
}
},
{
"category": "product_version",
"name": "ocfs2-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"product": {
"name": "ocfs2-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"product_id": "ocfs2-kmp-default-6.4.0-150700.53.34.1.ppc64le"
}
},
{
"category": "product_version",
"name": "reiserfs-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"product": {
"name": "reiserfs-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"product_id": "reiserfs-kmp-default-6.4.0-150700.53.34.1.ppc64le"
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "cluster-md-kmp-default-6.4.0-150700.53.34.1.s390x",
"product": {
"name": "cluster-md-kmp-default-6.4.0-150700.53.34.1.s390x",
"product_id": "cluster-md-kmp-default-6.4.0-150700.53.34.1.s390x"
}
},
{
"category": "product_version",
"name": "dlm-kmp-default-6.4.0-150700.53.34.1.s390x",
"product": {
"name": "dlm-kmp-default-6.4.0-150700.53.34.1.s390x",
"product_id": "dlm-kmp-default-6.4.0-150700.53.34.1.s390x"
}
},
{
"category": "product_version",
"name": "gfs2-kmp-default-6.4.0-150700.53.34.1.s390x",
"product": {
"name": "gfs2-kmp-default-6.4.0-150700.53.34.1.s390x",
"product_id": "gfs2-kmp-default-6.4.0-150700.53.34.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-default-6.4.0-150700.53.34.1.s390x",
"product": {
"name": "kernel-default-6.4.0-150700.53.34.1.s390x",
"product_id": "kernel-default-6.4.0-150700.53.34.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-default-devel-6.4.0-150700.53.34.1.s390x",
"product": {
"name": "kernel-default-devel-6.4.0-150700.53.34.1.s390x",
"product_id": "kernel-default-devel-6.4.0-150700.53.34.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-default-extra-6.4.0-150700.53.34.1.s390x",
"product": {
"name": "kernel-default-extra-6.4.0-150700.53.34.1.s390x",
"product_id": "kernel-default-extra-6.4.0-150700.53.34.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-default-livepatch-6.4.0-150700.53.34.1.s390x",
"product": {
"name": "kernel-default-livepatch-6.4.0-150700.53.34.1.s390x",
"product_id": "kernel-default-livepatch-6.4.0-150700.53.34.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-default-livepatch-devel-6.4.0-150700.53.34.1.s390x",
"product": {
"name": "kernel-default-livepatch-devel-6.4.0-150700.53.34.1.s390x",
"product_id": "kernel-default-livepatch-devel-6.4.0-150700.53.34.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-default-optional-6.4.0-150700.53.34.1.s390x",
"product": {
"name": "kernel-default-optional-6.4.0-150700.53.34.1.s390x",
"product_id": "kernel-default-optional-6.4.0-150700.53.34.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-livepatch-6_4_0-150700_53_34-default-1-150700.15.3.1.s390x",
"product": {
"name": "kernel-livepatch-6_4_0-150700_53_34-default-1-150700.15.3.1.s390x",
"product_id": "kernel-livepatch-6_4_0-150700_53_34-default-1-150700.15.3.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-obs-build-6.4.0-150700.53.34.1.s390x",
"product": {
"name": "kernel-obs-build-6.4.0-150700.53.34.1.s390x",
"product_id": "kernel-obs-build-6.4.0-150700.53.34.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-obs-qa-6.4.0-150700.53.34.1.s390x",
"product": {
"name": "kernel-obs-qa-6.4.0-150700.53.34.1.s390x",
"product_id": "kernel-obs-qa-6.4.0-150700.53.34.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-syms-6.4.0-150700.53.34.1.s390x",
"product": {
"name": "kernel-syms-6.4.0-150700.53.34.1.s390x",
"product_id": "kernel-syms-6.4.0-150700.53.34.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-zfcpdump-6.4.0-150700.53.34.1.s390x",
"product": {
"name": "kernel-zfcpdump-6.4.0-150700.53.34.1.s390x",
"product_id": "kernel-zfcpdump-6.4.0-150700.53.34.1.s390x"
}
},
{
"category": "product_version",
"name": "kselftests-kmp-default-6.4.0-150700.53.34.1.s390x",
"product": {
"name": "kselftests-kmp-default-6.4.0-150700.53.34.1.s390x",
"product_id": "kselftests-kmp-default-6.4.0-150700.53.34.1.s390x"
}
},
{
"category": "product_version",
"name": "ocfs2-kmp-default-6.4.0-150700.53.34.1.s390x",
"product": {
"name": "ocfs2-kmp-default-6.4.0-150700.53.34.1.s390x",
"product_id": "ocfs2-kmp-default-6.4.0-150700.53.34.1.s390x"
}
},
{
"category": "product_version",
"name": "reiserfs-kmp-default-6.4.0-150700.53.34.1.s390x",
"product": {
"name": "reiserfs-kmp-default-6.4.0-150700.53.34.1.s390x",
"product_id": "reiserfs-kmp-default-6.4.0-150700.53.34.1.s390x"
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "cluster-md-kmp-azure-6.4.0-150700.53.34.1.x86_64",
"product": {
"name": "cluster-md-kmp-azure-6.4.0-150700.53.34.1.x86_64",
"product_id": "cluster-md-kmp-azure-6.4.0-150700.53.34.1.x86_64"
}
},
{
"category": "product_version",
"name": "cluster-md-kmp-default-6.4.0-150700.53.34.1.x86_64",
"product": {
"name": "cluster-md-kmp-default-6.4.0-150700.53.34.1.x86_64",
"product_id": "cluster-md-kmp-default-6.4.0-150700.53.34.1.x86_64"
}
},
{
"category": "product_version",
"name": "dlm-kmp-azure-6.4.0-150700.53.34.1.x86_64",
"product": {
"name": "dlm-kmp-azure-6.4.0-150700.53.34.1.x86_64",
"product_id": "dlm-kmp-azure-6.4.0-150700.53.34.1.x86_64"
}
},
{
"category": "product_version",
"name": "dlm-kmp-default-6.4.0-150700.53.34.1.x86_64",
"product": {
"name": "dlm-kmp-default-6.4.0-150700.53.34.1.x86_64",
"product_id": "dlm-kmp-default-6.4.0-150700.53.34.1.x86_64"
}
},
{
"category": "product_version",
"name": "gfs2-kmp-azure-6.4.0-150700.53.34.1.x86_64",
"product": {
"name": "gfs2-kmp-azure-6.4.0-150700.53.34.1.x86_64",
"product_id": "gfs2-kmp-azure-6.4.0-150700.53.34.1.x86_64"
}
},
{
"category": "product_version",
"name": "gfs2-kmp-default-6.4.0-150700.53.34.1.x86_64",
"product": {
"name": "gfs2-kmp-default-6.4.0-150700.53.34.1.x86_64",
"product_id": "gfs2-kmp-default-6.4.0-150700.53.34.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-azure-6.4.0-150700.53.34.1.x86_64",
"product": {
"name": "kernel-azure-6.4.0-150700.53.34.1.x86_64",
"product_id": "kernel-azure-6.4.0-150700.53.34.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-azure-devel-6.4.0-150700.53.34.1.x86_64",
"product": {
"name": "kernel-azure-devel-6.4.0-150700.53.34.1.x86_64",
"product_id": "kernel-azure-devel-6.4.0-150700.53.34.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-azure-extra-6.4.0-150700.53.34.1.x86_64",
"product": {
"name": "kernel-azure-extra-6.4.0-150700.53.34.1.x86_64",
"product_id": "kernel-azure-extra-6.4.0-150700.53.34.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-azure-optional-6.4.0-150700.53.34.1.x86_64",
"product": {
"name": "kernel-azure-optional-6.4.0-150700.53.34.1.x86_64",
"product_id": "kernel-azure-optional-6.4.0-150700.53.34.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-azure-vdso-6.4.0-150700.53.34.1.x86_64",
"product": {
"name": "kernel-azure-vdso-6.4.0-150700.53.34.1.x86_64",
"product_id": "kernel-azure-vdso-6.4.0-150700.53.34.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-default-6.4.0-150700.53.34.1.x86_64",
"product": {
"name": "kernel-default-6.4.0-150700.53.34.1.x86_64",
"product_id": "kernel-default-6.4.0-150700.53.34.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-default-base-6.4.0-150700.53.34.1.150700.17.23.1.x86_64",
"product": {
"name": "kernel-default-base-6.4.0-150700.53.34.1.150700.17.23.1.x86_64",
"product_id": "kernel-default-base-6.4.0-150700.53.34.1.150700.17.23.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-default-base-rebuild-6.4.0-150700.53.34.1.150700.17.23.1.x86_64",
"product": {
"name": "kernel-default-base-rebuild-6.4.0-150700.53.34.1.150700.17.23.1.x86_64",
"product_id": "kernel-default-base-rebuild-6.4.0-150700.53.34.1.150700.17.23.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-default-devel-6.4.0-150700.53.34.1.x86_64",
"product": {
"name": "kernel-default-devel-6.4.0-150700.53.34.1.x86_64",
"product_id": "kernel-default-devel-6.4.0-150700.53.34.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-default-extra-6.4.0-150700.53.34.1.x86_64",
"product": {
"name": "kernel-default-extra-6.4.0-150700.53.34.1.x86_64",
"product_id": "kernel-default-extra-6.4.0-150700.53.34.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-default-livepatch-6.4.0-150700.53.34.1.x86_64",
"product": {
"name": "kernel-default-livepatch-6.4.0-150700.53.34.1.x86_64",
"product_id": "kernel-default-livepatch-6.4.0-150700.53.34.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-default-livepatch-devel-6.4.0-150700.53.34.1.x86_64",
"product": {
"name": "kernel-default-livepatch-devel-6.4.0-150700.53.34.1.x86_64",
"product_id": "kernel-default-livepatch-devel-6.4.0-150700.53.34.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-default-optional-6.4.0-150700.53.34.1.x86_64",
"product": {
"name": "kernel-default-optional-6.4.0-150700.53.34.1.x86_64",
"product_id": "kernel-default-optional-6.4.0-150700.53.34.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-default-vdso-6.4.0-150700.53.34.1.x86_64",
"product": {
"name": "kernel-default-vdso-6.4.0-150700.53.34.1.x86_64",
"product_id": "kernel-default-vdso-6.4.0-150700.53.34.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-kvmsmall-6.4.0-150700.53.34.1.x86_64",
"product": {
"name": "kernel-kvmsmall-6.4.0-150700.53.34.1.x86_64",
"product_id": "kernel-kvmsmall-6.4.0-150700.53.34.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-kvmsmall-devel-6.4.0-150700.53.34.1.x86_64",
"product": {
"name": "kernel-kvmsmall-devel-6.4.0-150700.53.34.1.x86_64",
"product_id": "kernel-kvmsmall-devel-6.4.0-150700.53.34.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-kvmsmall-vdso-6.4.0-150700.53.34.1.x86_64",
"product": {
"name": "kernel-kvmsmall-vdso-6.4.0-150700.53.34.1.x86_64",
"product_id": "kernel-kvmsmall-vdso-6.4.0-150700.53.34.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-livepatch-6_4_0-150700_53_34-default-1-150700.15.3.1.x86_64",
"product": {
"name": "kernel-livepatch-6_4_0-150700_53_34-default-1-150700.15.3.1.x86_64",
"product_id": "kernel-livepatch-6_4_0-150700_53_34-default-1-150700.15.3.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-obs-build-6.4.0-150700.53.34.1.x86_64",
"product": {
"name": "kernel-obs-build-6.4.0-150700.53.34.1.x86_64",
"product_id": "kernel-obs-build-6.4.0-150700.53.34.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-obs-qa-6.4.0-150700.53.34.1.x86_64",
"product": {
"name": "kernel-obs-qa-6.4.0-150700.53.34.1.x86_64",
"product_id": "kernel-obs-qa-6.4.0-150700.53.34.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-syms-6.4.0-150700.53.34.1.x86_64",
"product": {
"name": "kernel-syms-6.4.0-150700.53.34.1.x86_64",
"product_id": "kernel-syms-6.4.0-150700.53.34.1.x86_64"
}
},
{
"category": "product_version",
"name": "kselftests-kmp-azure-6.4.0-150700.53.34.1.x86_64",
"product": {
"name": "kselftests-kmp-azure-6.4.0-150700.53.34.1.x86_64",
"product_id": "kselftests-kmp-azure-6.4.0-150700.53.34.1.x86_64"
}
},
{
"category": "product_version",
"name": "kselftests-kmp-default-6.4.0-150700.53.34.1.x86_64",
"product": {
"name": "kselftests-kmp-default-6.4.0-150700.53.34.1.x86_64",
"product_id": "kselftests-kmp-default-6.4.0-150700.53.34.1.x86_64"
}
},
{
"category": "product_version",
"name": "ocfs2-kmp-azure-6.4.0-150700.53.34.1.x86_64",
"product": {
"name": "ocfs2-kmp-azure-6.4.0-150700.53.34.1.x86_64",
"product_id": "ocfs2-kmp-azure-6.4.0-150700.53.34.1.x86_64"
}
},
{
"category": "product_version",
"name": "ocfs2-kmp-default-6.4.0-150700.53.34.1.x86_64",
"product": {
"name": "ocfs2-kmp-default-6.4.0-150700.53.34.1.x86_64",
"product_id": "ocfs2-kmp-default-6.4.0-150700.53.34.1.x86_64"
}
},
{
"category": "product_version",
"name": "reiserfs-kmp-azure-6.4.0-150700.53.34.1.x86_64",
"product": {
"name": "reiserfs-kmp-azure-6.4.0-150700.53.34.1.x86_64",
"product_id": "reiserfs-kmp-azure-6.4.0-150700.53.34.1.x86_64"
}
},
{
"category": "product_version",
"name": "reiserfs-kmp-default-6.4.0-150700.53.34.1.x86_64",
"product": {
"name": "reiserfs-kmp-default-6.4.0-150700.53.34.1.x86_64",
"product_id": "reiserfs-kmp-default-6.4.0-150700.53.34.1.x86_64"
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_name",
"name": "SUSE Linux Enterprise Module for Basesystem 15 SP7",
"product": {
"name": "SUSE Linux Enterprise Module for Basesystem 15 SP7",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP7",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle-module-basesystem:15:sp7"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Module for Development Tools 15 SP7",
"product": {
"name": "SUSE Linux Enterprise Module for Development Tools 15 SP7",
"product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP7",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle-module-development-tools:15:sp7"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Module for Legacy 15 SP7",
"product": {
"name": "SUSE Linux Enterprise Module for Legacy 15 SP7",
"product_id": "SUSE Linux Enterprise Module for Legacy 15 SP7",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle-module-legacy:15:sp7"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Live Patching 15 SP7",
"product": {
"name": "SUSE Linux Enterprise Live Patching 15 SP7",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP7",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle-module-live-patching:15:sp7"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Module for Public Cloud 15 SP7",
"product": {
"name": "SUSE Linux Enterprise Module for Public Cloud 15 SP7",
"product_id": "SUSE Linux Enterprise Module for Public Cloud 15 SP7",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle-module-public-cloud:15:sp7"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise High Availability Extension 15 SP7",
"product": {
"name": "SUSE Linux Enterprise High Availability Extension 15 SP7",
"product_id": "SUSE Linux Enterprise High Availability Extension 15 SP7",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle-ha:15:sp7"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Workstation Extension 15 SP7",
"product": {
"name": "SUSE Linux Enterprise Workstation Extension 15 SP7",
"product_id": "SUSE Linux Enterprise Workstation Extension 15 SP7",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle-we:15:sp7"
}
}
}
],
"category": "product_family",
"name": "SUSE Linux Enterprise"
}
],
"category": "vendor",
"name": "SUSE"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-64kb-6.4.0-150700.53.34.1.aarch64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP7",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-6.4.0-150700.53.34.1.aarch64"
},
"product_reference": "kernel-64kb-6.4.0-150700.53.34.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-64kb-devel-6.4.0-150700.53.34.1.aarch64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP7",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-devel-6.4.0-150700.53.34.1.aarch64"
},
"product_reference": "kernel-64kb-devel-6.4.0-150700.53.34.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-6.4.0-150700.53.34.1.aarch64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP7",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.aarch64"
},
"product_reference": "kernel-default-6.4.0-150700.53.34.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-6.4.0-150700.53.34.1.ppc64le as component of SUSE Linux Enterprise Module for Basesystem 15 SP7",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.ppc64le"
},
"product_reference": "kernel-default-6.4.0-150700.53.34.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-6.4.0-150700.53.34.1.s390x as component of SUSE Linux Enterprise Module for Basesystem 15 SP7",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.s390x"
},
"product_reference": "kernel-default-6.4.0-150700.53.34.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-6.4.0-150700.53.34.1.x86_64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP7",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.x86_64"
},
"product_reference": "kernel-default-6.4.0-150700.53.34.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-base-6.4.0-150700.53.34.1.150700.17.23.1.aarch64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP7",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.34.1.150700.17.23.1.aarch64"
},
"product_reference": "kernel-default-base-6.4.0-150700.53.34.1.150700.17.23.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-base-6.4.0-150700.53.34.1.150700.17.23.1.ppc64le as component of SUSE Linux Enterprise Module for Basesystem 15 SP7",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.34.1.150700.17.23.1.ppc64le"
},
"product_reference": "kernel-default-base-6.4.0-150700.53.34.1.150700.17.23.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-base-6.4.0-150700.53.34.1.150700.17.23.1.x86_64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP7",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.34.1.150700.17.23.1.x86_64"
},
"product_reference": "kernel-default-base-6.4.0-150700.53.34.1.150700.17.23.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-devel-6.4.0-150700.53.34.1.aarch64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP7",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.aarch64"
},
"product_reference": "kernel-default-devel-6.4.0-150700.53.34.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-devel-6.4.0-150700.53.34.1.ppc64le as component of SUSE Linux Enterprise Module for Basesystem 15 SP7",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.ppc64le"
},
"product_reference": "kernel-default-devel-6.4.0-150700.53.34.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-devel-6.4.0-150700.53.34.1.s390x as component of SUSE Linux Enterprise Module for Basesystem 15 SP7",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.s390x"
},
"product_reference": "kernel-default-devel-6.4.0-150700.53.34.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-devel-6.4.0-150700.53.34.1.x86_64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP7",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.x86_64"
},
"product_reference": "kernel-default-devel-6.4.0-150700.53.34.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-6.4.0-150700.53.34.1.noarch as component of SUSE Linux Enterprise Module for Basesystem 15 SP7",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-devel-6.4.0-150700.53.34.1.noarch"
},
"product_reference": "kernel-devel-6.4.0-150700.53.34.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-macros-6.4.0-150700.53.34.1.noarch as component of SUSE Linux Enterprise Module for Basesystem 15 SP7",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-macros-6.4.0-150700.53.34.1.noarch"
},
"product_reference": "kernel-macros-6.4.0-150700.53.34.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-zfcpdump-6.4.0-150700.53.34.1.s390x as component of SUSE Linux Enterprise Module for Basesystem 15 SP7",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-zfcpdump-6.4.0-150700.53.34.1.s390x"
},
"product_reference": "kernel-zfcpdump-6.4.0-150700.53.34.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-docs-6.4.0-150700.53.34.1.noarch as component of SUSE Linux Enterprise Module for Development Tools 15 SP7",
"product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-docs-6.4.0-150700.53.34.1.noarch"
},
"product_reference": "kernel-docs-6.4.0-150700.53.34.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15 SP7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-obs-build-6.4.0-150700.53.34.1.aarch64 as component of SUSE Linux Enterprise Module for Development Tools 15 SP7",
"product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.aarch64"
},
"product_reference": "kernel-obs-build-6.4.0-150700.53.34.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15 SP7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-obs-build-6.4.0-150700.53.34.1.ppc64le as component of SUSE Linux Enterprise Module for Development Tools 15 SP7",
"product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.ppc64le"
},
"product_reference": "kernel-obs-build-6.4.0-150700.53.34.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15 SP7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-obs-build-6.4.0-150700.53.34.1.s390x as component of SUSE Linux Enterprise Module for Development Tools 15 SP7",
"product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.s390x"
},
"product_reference": "kernel-obs-build-6.4.0-150700.53.34.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15 SP7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-obs-build-6.4.0-150700.53.34.1.x86_64 as component of SUSE Linux Enterprise Module for Development Tools 15 SP7",
"product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.x86_64"
},
"product_reference": "kernel-obs-build-6.4.0-150700.53.34.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15 SP7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-source-6.4.0-150700.53.34.1.noarch as component of SUSE Linux Enterprise Module for Development Tools 15 SP7",
"product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-source-6.4.0-150700.53.34.1.noarch"
},
"product_reference": "kernel-source-6.4.0-150700.53.34.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15 SP7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-syms-6.4.0-150700.53.34.1.aarch64 as component of SUSE Linux Enterprise Module for Development Tools 15 SP7",
"product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.aarch64"
},
"product_reference": "kernel-syms-6.4.0-150700.53.34.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15 SP7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-syms-6.4.0-150700.53.34.1.ppc64le as component of SUSE Linux Enterprise Module for Development Tools 15 SP7",
"product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.ppc64le"
},
"product_reference": "kernel-syms-6.4.0-150700.53.34.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15 SP7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-syms-6.4.0-150700.53.34.1.s390x as component of SUSE Linux Enterprise Module for Development Tools 15 SP7",
"product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.s390x"
},
"product_reference": "kernel-syms-6.4.0-150700.53.34.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15 SP7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-syms-6.4.0-150700.53.34.1.x86_64 as component of SUSE Linux Enterprise Module for Development Tools 15 SP7",
"product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.x86_64"
},
"product_reference": "kernel-syms-6.4.0-150700.53.34.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15 SP7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "reiserfs-kmp-default-6.4.0-150700.53.34.1.aarch64 as component of SUSE Linux Enterprise Module for Legacy 15 SP7",
"product_id": "SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.aarch64"
},
"product_reference": "reiserfs-kmp-default-6.4.0-150700.53.34.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Legacy 15 SP7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "reiserfs-kmp-default-6.4.0-150700.53.34.1.ppc64le as component of SUSE Linux Enterprise Module for Legacy 15 SP7",
"product_id": "SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.ppc64le"
},
"product_reference": "reiserfs-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Legacy 15 SP7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "reiserfs-kmp-default-6.4.0-150700.53.34.1.s390x as component of SUSE Linux Enterprise Module for Legacy 15 SP7",
"product_id": "SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.s390x"
},
"product_reference": "reiserfs-kmp-default-6.4.0-150700.53.34.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Legacy 15 SP7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "reiserfs-kmp-default-6.4.0-150700.53.34.1.x86_64 as component of SUSE Linux Enterprise Module for Legacy 15 SP7",
"product_id": "SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.x86_64"
},
"product_reference": "reiserfs-kmp-default-6.4.0-150700.53.34.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Legacy 15 SP7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-livepatch-6.4.0-150700.53.34.1.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP7",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.34.1.ppc64le"
},
"product_reference": "kernel-default-livepatch-6.4.0-150700.53.34.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-livepatch-6.4.0-150700.53.34.1.s390x as component of SUSE Linux Enterprise Live Patching 15 SP7",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.34.1.s390x"
},
"product_reference": "kernel-default-livepatch-6.4.0-150700.53.34.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-livepatch-6.4.0-150700.53.34.1.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP7",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.34.1.x86_64"
},
"product_reference": "kernel-default-livepatch-6.4.0-150700.53.34.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-livepatch-devel-6.4.0-150700.53.34.1.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP7",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.34.1.ppc64le"
},
"product_reference": "kernel-default-livepatch-devel-6.4.0-150700.53.34.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-livepatch-devel-6.4.0-150700.53.34.1.s390x as component of SUSE Linux Enterprise Live Patching 15 SP7",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.34.1.s390x"
},
"product_reference": "kernel-default-livepatch-devel-6.4.0-150700.53.34.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-livepatch-devel-6.4.0-150700.53.34.1.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP7",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.34.1.x86_64"
},
"product_reference": "kernel-default-livepatch-devel-6.4.0-150700.53.34.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-6_4_0-150700_53_34-default-1-150700.15.3.1.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP7",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_34-default-1-150700.15.3.1.ppc64le"
},
"product_reference": "kernel-livepatch-6_4_0-150700_53_34-default-1-150700.15.3.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-6_4_0-150700_53_34-default-1-150700.15.3.1.s390x as component of SUSE Linux Enterprise Live Patching 15 SP7",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_34-default-1-150700.15.3.1.s390x"
},
"product_reference": "kernel-livepatch-6_4_0-150700_53_34-default-1-150700.15.3.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-6_4_0-150700_53_34-default-1-150700.15.3.1.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP7",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_34-default-1-150700.15.3.1.x86_64"
},
"product_reference": "kernel-livepatch-6_4_0-150700_53_34-default-1-150700.15.3.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-azure-6.4.0-150700.53.34.1.aarch64 as component of SUSE Linux Enterprise Module for Public Cloud 15 SP7",
"product_id": "SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.53.34.1.aarch64"
},
"product_reference": "kernel-azure-6.4.0-150700.53.34.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Public Cloud 15 SP7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-azure-6.4.0-150700.53.34.1.x86_64 as component of SUSE Linux Enterprise Module for Public Cloud 15 SP7",
"product_id": "SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.53.34.1.x86_64"
},
"product_reference": "kernel-azure-6.4.0-150700.53.34.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Public Cloud 15 SP7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-azure-devel-6.4.0-150700.53.34.1.aarch64 as component of SUSE Linux Enterprise Module for Public Cloud 15 SP7",
"product_id": "SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.53.34.1.aarch64"
},
"product_reference": "kernel-azure-devel-6.4.0-150700.53.34.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Public Cloud 15 SP7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-azure-devel-6.4.0-150700.53.34.1.x86_64 as component of SUSE Linux Enterprise Module for Public Cloud 15 SP7",
"product_id": "SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.53.34.1.x86_64"
},
"product_reference": "kernel-azure-devel-6.4.0-150700.53.34.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Public Cloud 15 SP7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cluster-md-kmp-default-6.4.0-150700.53.34.1.aarch64 as component of SUSE Linux Enterprise High Availability Extension 15 SP7",
"product_id": "SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.aarch64"
},
"product_reference": "cluster-md-kmp-default-6.4.0-150700.53.34.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15 SP7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cluster-md-kmp-default-6.4.0-150700.53.34.1.ppc64le as component of SUSE Linux Enterprise High Availability Extension 15 SP7",
"product_id": "SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.ppc64le"
},
"product_reference": "cluster-md-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15 SP7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cluster-md-kmp-default-6.4.0-150700.53.34.1.s390x as component of SUSE Linux Enterprise High Availability Extension 15 SP7",
"product_id": "SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.s390x"
},
"product_reference": "cluster-md-kmp-default-6.4.0-150700.53.34.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15 SP7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cluster-md-kmp-default-6.4.0-150700.53.34.1.x86_64 as component of SUSE Linux Enterprise High Availability Extension 15 SP7",
"product_id": "SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.x86_64"
},
"product_reference": "cluster-md-kmp-default-6.4.0-150700.53.34.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15 SP7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dlm-kmp-default-6.4.0-150700.53.34.1.aarch64 as component of SUSE Linux Enterprise High Availability Extension 15 SP7",
"product_id": "SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.aarch64"
},
"product_reference": "dlm-kmp-default-6.4.0-150700.53.34.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15 SP7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dlm-kmp-default-6.4.0-150700.53.34.1.ppc64le as component of SUSE Linux Enterprise High Availability Extension 15 SP7",
"product_id": "SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.ppc64le"
},
"product_reference": "dlm-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15 SP7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dlm-kmp-default-6.4.0-150700.53.34.1.s390x as component of SUSE Linux Enterprise High Availability Extension 15 SP7",
"product_id": "SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.s390x"
},
"product_reference": "dlm-kmp-default-6.4.0-150700.53.34.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15 SP7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dlm-kmp-default-6.4.0-150700.53.34.1.x86_64 as component of SUSE Linux Enterprise High Availability Extension 15 SP7",
"product_id": "SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.x86_64"
},
"product_reference": "dlm-kmp-default-6.4.0-150700.53.34.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15 SP7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "gfs2-kmp-default-6.4.0-150700.53.34.1.aarch64 as component of SUSE Linux Enterprise High Availability Extension 15 SP7",
"product_id": "SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.aarch64"
},
"product_reference": "gfs2-kmp-default-6.4.0-150700.53.34.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15 SP7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "gfs2-kmp-default-6.4.0-150700.53.34.1.ppc64le as component of SUSE Linux Enterprise High Availability Extension 15 SP7",
"product_id": "SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.ppc64le"
},
"product_reference": "gfs2-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15 SP7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "gfs2-kmp-default-6.4.0-150700.53.34.1.s390x as component of SUSE Linux Enterprise High Availability Extension 15 SP7",
"product_id": "SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.s390x"
},
"product_reference": "gfs2-kmp-default-6.4.0-150700.53.34.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15 SP7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "gfs2-kmp-default-6.4.0-150700.53.34.1.x86_64 as component of SUSE Linux Enterprise High Availability Extension 15 SP7",
"product_id": "SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.x86_64"
},
"product_reference": "gfs2-kmp-default-6.4.0-150700.53.34.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15 SP7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ocfs2-kmp-default-6.4.0-150700.53.34.1.aarch64 as component of SUSE Linux Enterprise High Availability Extension 15 SP7",
"product_id": "SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.aarch64"
},
"product_reference": "ocfs2-kmp-default-6.4.0-150700.53.34.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15 SP7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ocfs2-kmp-default-6.4.0-150700.53.34.1.ppc64le as component of SUSE Linux Enterprise High Availability Extension 15 SP7",
"product_id": "SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.ppc64le"
},
"product_reference": "ocfs2-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15 SP7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ocfs2-kmp-default-6.4.0-150700.53.34.1.s390x as component of SUSE Linux Enterprise High Availability Extension 15 SP7",
"product_id": "SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.s390x"
},
"product_reference": "ocfs2-kmp-default-6.4.0-150700.53.34.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15 SP7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ocfs2-kmp-default-6.4.0-150700.53.34.1.x86_64 as component of SUSE Linux Enterprise High Availability Extension 15 SP7",
"product_id": "SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.x86_64"
},
"product_reference": "ocfs2-kmp-default-6.4.0-150700.53.34.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15 SP7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-extra-6.4.0-150700.53.34.1.x86_64 as component of SUSE Linux Enterprise Workstation Extension 15 SP7",
"product_id": "SUSE Linux Enterprise Workstation Extension 15 SP7:kernel-default-extra-6.4.0-150700.53.34.1.x86_64"
},
"product_reference": "kernel-default-extra-6.4.0-150700.53.34.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Workstation Extension 15 SP7"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2023-53817",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2023-53817"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\ncrypto: lib/mpi - avoid null pointer deref in mpi_cmp_ui()\n\nDuring NVMeTCP Authentication a controller can trigger a kernel\noops by specifying the 8192 bit Diffie Hellman group and passing\na correctly sized, but zeroed Diffie Hellamn value.\nmpi_cmp_ui() was detecting this if the second parameter was 0,\nbut 1 is passed from dh_is_pubkey_valid(). This causes the null\npointer u-\u003ed to be dereferenced towards the end of mpi_cmp_ui()",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_34-default-1-150700.15.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_34-default-1-150700.15.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_34-default-1-150700.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-devel-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.34.1.150700.17.23.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.34.1.150700.17.23.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.34.1.150700.17.23.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-devel-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-macros-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-zfcpdump-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-docs-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-source-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP7:kernel-default-extra-6.4.0-150700.53.34.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2023-53817",
"url": "https://www.suse.com/security/cve/CVE-2023-53817"
},
{
"category": "external",
"summary": "SUSE Bug 1254992 for CVE-2023-53817",
"url": "https://bugzilla.suse.com/1254992"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_34-default-1-150700.15.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_34-default-1-150700.15.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_34-default-1-150700.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-devel-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.34.1.150700.17.23.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.34.1.150700.17.23.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.34.1.150700.17.23.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-devel-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-macros-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-zfcpdump-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-docs-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-source-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP7:kernel-default-extra-6.4.0-150700.53.34.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_34-default-1-150700.15.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_34-default-1-150700.15.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_34-default-1-150700.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-devel-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.34.1.150700.17.23.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.34.1.150700.17.23.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.34.1.150700.17.23.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-devel-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-macros-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-zfcpdump-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-docs-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-source-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP7:kernel-default-extra-6.4.0-150700.53.34.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-03-26T13:23:51Z",
"details": "moderate"
}
],
"title": "CVE-2023-53817"
},
{
"cve": "CVE-2025-37861",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-37861"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nscsi: mpi3mr: Synchronous access b/w reset and tm thread for reply queue\n\nWhen the task management thread processes reply queues while the reset\nthread resets them, the task management thread accesses an invalid queue ID\n(0xFFFF), set by the reset thread, which points to unallocated memory,\ncausing a crash.\n\nAdd flag \u0027io_admin_reset_sync\u0027 to synchronize access between the reset,\nI/O, and admin threads. Before a reset, the reset handler sets this flag to\nblock I/O and admin processing threads. If any thread bypasses the initial\ncheck, the reset thread waits up to 10 seconds for processing to finish. If\nthe wait exceeds 10 seconds, the controller is marked as unrecoverable.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_34-default-1-150700.15.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_34-default-1-150700.15.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_34-default-1-150700.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-devel-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.34.1.150700.17.23.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.34.1.150700.17.23.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.34.1.150700.17.23.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-devel-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-macros-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-zfcpdump-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-docs-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-source-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP7:kernel-default-extra-6.4.0-150700.53.34.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-37861",
"url": "https://www.suse.com/security/cve/CVE-2025-37861"
},
{
"category": "external",
"summary": "SUSE Bug 1243055 for CVE-2025-37861",
"url": "https://bugzilla.suse.com/1243055"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_34-default-1-150700.15.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_34-default-1-150700.15.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_34-default-1-150700.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-devel-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.34.1.150700.17.23.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.34.1.150700.17.23.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.34.1.150700.17.23.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-devel-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-macros-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-zfcpdump-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-docs-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-source-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP7:kernel-default-extra-6.4.0-150700.53.34.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.1,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_34-default-1-150700.15.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_34-default-1-150700.15.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_34-default-1-150700.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-devel-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.34.1.150700.17.23.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.34.1.150700.17.23.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.34.1.150700.17.23.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-devel-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-macros-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-zfcpdump-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-docs-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-source-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP7:kernel-default-extra-6.4.0-150700.53.34.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-03-26T13:23:51Z",
"details": "moderate"
}
],
"title": "CVE-2025-37861"
},
{
"cve": "CVE-2025-39748",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-39748"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nbpf: Forget ranges when refining tnum after JSET\n\nSyzbot reported a kernel warning due to a range invariant violation on\nthe following BPF program.\n\n 0: call bpf_get_netns_cookie\n 1: if r0 == 0 goto \u003cexit\u003e\n 2: if r0 \u0026 Oxffffffff goto \u003cexit\u003e\n\nThe issue is on the path where we fall through both jumps.\n\nThat path is unreachable at runtime: after insn 1, we know r0 != 0, but\nwith the sign extension on the jset, we would only fallthrough insn 2\nif r0 == 0. Unfortunately, is_branch_taken() isn\u0027t currently able to\nfigure this out, so the verifier walks all branches. The verifier then\nrefines the register bounds using the second condition and we end\nup with inconsistent bounds on this unreachable path:\n\n 1: if r0 == 0 goto \u003cexit\u003e\n r0: u64=[0x1, 0xffffffffffffffff] var_off=(0, 0xffffffffffffffff)\n 2: if r0 \u0026 0xffffffff goto \u003cexit\u003e\n r0 before reg_bounds_sync: u64=[0x1, 0xffffffffffffffff] var_off=(0, 0)\n r0 after reg_bounds_sync: u64=[0x1, 0] var_off=(0, 0)\n\nImproving the range refinement for JSET to cover all cases is tricky. We\nalso don\u0027t expect many users to rely on JSET given LLVM doesn\u0027t generate\nthose instructions. So instead of improving the range refinement for\nJSETs, Eduard suggested we forget the ranges whenever we\u0027re narrowing\ntnums after a JSET. This patch implements that approach.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_34-default-1-150700.15.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_34-default-1-150700.15.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_34-default-1-150700.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-devel-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.34.1.150700.17.23.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.34.1.150700.17.23.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.34.1.150700.17.23.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-devel-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-macros-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-zfcpdump-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-docs-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-source-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP7:kernel-default-extra-6.4.0-150700.53.34.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-39748",
"url": "https://www.suse.com/security/cve/CVE-2025-39748"
},
{
"category": "external",
"summary": "SUSE Bug 1249587 for CVE-2025-39748",
"url": "https://bugzilla.suse.com/1249587"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_34-default-1-150700.15.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_34-default-1-150700.15.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_34-default-1-150700.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-devel-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.34.1.150700.17.23.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.34.1.150700.17.23.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.34.1.150700.17.23.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-devel-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-macros-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-zfcpdump-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-docs-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-source-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP7:kernel-default-extra-6.4.0-150700.53.34.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_34-default-1-150700.15.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_34-default-1-150700.15.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_34-default-1-150700.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-devel-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.34.1.150700.17.23.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.34.1.150700.17.23.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.34.1.150700.17.23.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-devel-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-macros-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-zfcpdump-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-docs-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-source-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP7:kernel-default-extra-6.4.0-150700.53.34.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-03-26T13:23:51Z",
"details": "moderate"
}
],
"title": "CVE-2025-39748"
},
{
"cve": "CVE-2025-39817",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-39817"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nefivarfs: Fix slab-out-of-bounds in efivarfs_d_compare\n\nObserved on kernel 6.6 (present on master as well):\n\n BUG: KASAN: slab-out-of-bounds in memcmp+0x98/0xd0\n Call trace:\n kasan_check_range+0xe8/0x190\n __asan_loadN+0x1c/0x28\n memcmp+0x98/0xd0\n efivarfs_d_compare+0x68/0xd8\n __d_lookup_rcu_op_compare+0x178/0x218\n __d_lookup_rcu+0x1f8/0x228\n d_alloc_parallel+0x150/0x648\n lookup_open.isra.0+0x5f0/0x8d0\n open_last_lookups+0x264/0x828\n path_openat+0x130/0x3f8\n do_filp_open+0x114/0x248\n do_sys_openat2+0x340/0x3c0\n __arm64_sys_openat+0x120/0x1a0\n\nIf dentry-\u003ed_name.len \u003c EFI_VARIABLE_GUID_LEN , \u0027guid\u0027 can become\nnegative, leadings to oob. The issue can be triggered by parallel\nlookups using invalid filename:\n\n T1\t\t\tT2\n lookup_open\n -\u003elookup\n simple_lookup\n d_add\n // invalid dentry is added to hash list\n\n\t\t\tlookup_open\n\t\t\t d_alloc_parallel\n\t\t\t __d_lookup_rcu\n\t\t\t __d_lookup_rcu_op_compare\n\t\t\t hlist_bl_for_each_entry_rcu\n\t\t\t // invalid dentry can be retrieved\n\t\t\t -\u003ed_compare\n\t\t\t efivarfs_d_compare\n\t\t\t // oob\n\nFix it by checking \u0027guid\u0027 before cmp.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_34-default-1-150700.15.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_34-default-1-150700.15.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_34-default-1-150700.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-devel-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.34.1.150700.17.23.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.34.1.150700.17.23.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.34.1.150700.17.23.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-devel-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-macros-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-zfcpdump-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-docs-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-source-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP7:kernel-default-extra-6.4.0-150700.53.34.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-39817",
"url": "https://www.suse.com/security/cve/CVE-2025-39817"
},
{
"category": "external",
"summary": "SUSE Bug 1249998 for CVE-2025-39817",
"url": "https://bugzilla.suse.com/1249998"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_34-default-1-150700.15.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_34-default-1-150700.15.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_34-default-1-150700.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-devel-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.34.1.150700.17.23.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.34.1.150700.17.23.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.34.1.150700.17.23.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-devel-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-macros-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-zfcpdump-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-docs-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-source-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP7:kernel-default-extra-6.4.0-150700.53.34.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_34-default-1-150700.15.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_34-default-1-150700.15.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_34-default-1-150700.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-devel-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.34.1.150700.17.23.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.34.1.150700.17.23.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.34.1.150700.17.23.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-devel-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-macros-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-zfcpdump-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-docs-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-source-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP7:kernel-default-extra-6.4.0-150700.53.34.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-03-26T13:23:51Z",
"details": "moderate"
}
],
"title": "CVE-2025-39817"
},
{
"cve": "CVE-2025-39964",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-39964"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\ncrypto: af_alg - Disallow concurrent writes in af_alg_sendmsg\n\nIssuing two writes to the same af_alg socket is bogus as the\ndata will be interleaved in an unpredictable fashion. Furthermore,\nconcurrent writes may create inconsistencies in the internal\nsocket state.\n\nDisallow this by adding a new ctx-\u003ewrite field that indiciates\nexclusive ownership for writing.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_34-default-1-150700.15.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_34-default-1-150700.15.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_34-default-1-150700.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-devel-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.34.1.150700.17.23.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.34.1.150700.17.23.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.34.1.150700.17.23.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-devel-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-macros-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-zfcpdump-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-docs-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-source-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP7:kernel-default-extra-6.4.0-150700.53.34.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-39964",
"url": "https://www.suse.com/security/cve/CVE-2025-39964"
},
{
"category": "external",
"summary": "SUSE Bug 1251966 for CVE-2025-39964",
"url": "https://bugzilla.suse.com/1251966"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_34-default-1-150700.15.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_34-default-1-150700.15.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_34-default-1-150700.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-devel-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.34.1.150700.17.23.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.34.1.150700.17.23.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.34.1.150700.17.23.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-devel-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-macros-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-zfcpdump-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-docs-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-source-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP7:kernel-default-extra-6.4.0-150700.53.34.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_34-default-1-150700.15.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_34-default-1-150700.15.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_34-default-1-150700.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-devel-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.34.1.150700.17.23.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.34.1.150700.17.23.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.34.1.150700.17.23.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-devel-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-macros-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-zfcpdump-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-docs-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-source-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP7:kernel-default-extra-6.4.0-150700.53.34.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-03-26T13:23:51Z",
"details": "moderate"
}
],
"title": "CVE-2025-39964"
},
{
"cve": "CVE-2025-40099",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40099"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\ncifs: parse_dfs_referrals: prevent oob on malformed input\n\nMalicious SMB server can send invalid reply to FSCTL_DFS_GET_REFERRALS\n\n- reply smaller than sizeof(struct get_dfs_referral_rsp)\n- reply with number of referrals smaller than NumberOfReferrals in the\nheader\n\nProcessing of such replies will cause oob.\n\nReturn -EINVAL error on such replies to prevent oob-s.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_34-default-1-150700.15.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_34-default-1-150700.15.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_34-default-1-150700.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-devel-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.34.1.150700.17.23.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.34.1.150700.17.23.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.34.1.150700.17.23.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-devel-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-macros-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-zfcpdump-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-docs-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-source-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP7:kernel-default-extra-6.4.0-150700.53.34.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40099",
"url": "https://www.suse.com/security/cve/CVE-2025-40099"
},
{
"category": "external",
"summary": "SUSE Bug 1252911 for CVE-2025-40099",
"url": "https://bugzilla.suse.com/1252911"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_34-default-1-150700.15.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_34-default-1-150700.15.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_34-default-1-150700.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-devel-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.34.1.150700.17.23.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.34.1.150700.17.23.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.34.1.150700.17.23.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-devel-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-macros-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-zfcpdump-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-docs-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-source-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP7:kernel-default-extra-6.4.0-150700.53.34.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_34-default-1-150700.15.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_34-default-1-150700.15.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_34-default-1-150700.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-devel-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.34.1.150700.17.23.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.34.1.150700.17.23.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.34.1.150700.17.23.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-devel-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-macros-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-zfcpdump-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-docs-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-source-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP7:kernel-default-extra-6.4.0-150700.53.34.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-03-26T13:23:51Z",
"details": "moderate"
}
],
"title": "CVE-2025-40099"
},
{
"cve": "CVE-2025-40103",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40103"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nsmb: client: Fix refcount leak for cifs_sb_tlink\n\nFix three refcount inconsistency issues related to `cifs_sb_tlink`.\n\nComments for `cifs_sb_tlink` state that `cifs_put_tlink()` needs to be\ncalled after successful calls to `cifs_sb_tlink()`. Three calls fail to\nupdate refcount accordingly, leading to possible resource leaks.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_34-default-1-150700.15.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_34-default-1-150700.15.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_34-default-1-150700.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-devel-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.34.1.150700.17.23.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.34.1.150700.17.23.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.34.1.150700.17.23.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-devel-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-macros-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-zfcpdump-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-docs-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-source-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP7:kernel-default-extra-6.4.0-150700.53.34.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40103",
"url": "https://www.suse.com/security/cve/CVE-2025-40103"
},
{
"category": "external",
"summary": "SUSE Bug 1252924 for CVE-2025-40103",
"url": "https://bugzilla.suse.com/1252924"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_34-default-1-150700.15.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_34-default-1-150700.15.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_34-default-1-150700.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-devel-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.34.1.150700.17.23.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.34.1.150700.17.23.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.34.1.150700.17.23.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-devel-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-macros-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-zfcpdump-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-docs-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-source-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP7:kernel-default-extra-6.4.0-150700.53.34.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 3.3,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_34-default-1-150700.15.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_34-default-1-150700.15.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_34-default-1-150700.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-devel-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.34.1.150700.17.23.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.34.1.150700.17.23.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.34.1.150700.17.23.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-devel-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-macros-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-zfcpdump-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-docs-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-source-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP7:kernel-default-extra-6.4.0-150700.53.34.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-03-26T13:23:51Z",
"details": "low"
}
],
"title": "CVE-2025-40103"
},
{
"cve": "CVE-2025-40201",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40201"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nkernel/sys.c: fix the racy usage of task_lock(tsk-\u003egroup_leader) in sys_prlimit64() paths\n\nThe usage of task_lock(tsk-\u003egroup_leader) in sys_prlimit64()-\u003edo_prlimit()\npath is very broken.\n\nsys_prlimit64() does get_task_struct(tsk) but this only protects task_struct\nitself. If tsk != current and tsk is not a leader, this process can exit/exec\nand task_lock(tsk-\u003egroup_leader) may use the already freed task_struct.\n\nAnother problem is that sys_prlimit64() can race with mt-exec which changes\n-\u003egroup_leader. In this case do_prlimit() may take the wrong lock, or (worse)\n-\u003egroup_leader may change between task_lock() and task_unlock().\n\nChange sys_prlimit64() to take tasklist_lock when necessary. This is not\nnice, but I don\u0027t see a better fix for -stable.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_34-default-1-150700.15.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_34-default-1-150700.15.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_34-default-1-150700.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-devel-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.34.1.150700.17.23.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.34.1.150700.17.23.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.34.1.150700.17.23.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-devel-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-macros-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-zfcpdump-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-docs-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-source-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP7:kernel-default-extra-6.4.0-150700.53.34.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40201",
"url": "https://www.suse.com/security/cve/CVE-2025-40201"
},
{
"category": "external",
"summary": "SUSE Bug 1253455 for CVE-2025-40201",
"url": "https://bugzilla.suse.com/1253455"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_34-default-1-150700.15.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_34-default-1-150700.15.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_34-default-1-150700.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-devel-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.34.1.150700.17.23.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.34.1.150700.17.23.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.34.1.150700.17.23.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-devel-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-macros-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-zfcpdump-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-docs-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-source-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP7:kernel-default-extra-6.4.0-150700.53.34.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_34-default-1-150700.15.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_34-default-1-150700.15.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_34-default-1-150700.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-devel-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.34.1.150700.17.23.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.34.1.150700.17.23.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.34.1.150700.17.23.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-devel-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-macros-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-zfcpdump-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-docs-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-source-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP7:kernel-default-extra-6.4.0-150700.53.34.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-03-26T13:23:51Z",
"details": "moderate"
}
],
"title": "CVE-2025-40201"
},
{
"cve": "CVE-2025-40253",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40253"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\ns390/ctcm: Fix double-kfree\n\nThe function \u0027mpc_rcvd_sweep_req(mpcginfo)\u0027 is called conditionally\nfrom function \u0027ctcmpc_unpack_skb\u0027. It frees passed mpcginfo.\nAfter that a call to function \u0027kfree\u0027 in function \u0027ctcmpc_unpack_skb\u0027\nfrees it again.\n\nRemove \u0027kfree\u0027 call in function \u0027mpc_rcvd_sweep_req(mpcginfo)\u0027.\n\nBug detected by the clang static analyzer.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_34-default-1-150700.15.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_34-default-1-150700.15.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_34-default-1-150700.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-devel-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.34.1.150700.17.23.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.34.1.150700.17.23.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.34.1.150700.17.23.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-devel-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-macros-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-zfcpdump-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-docs-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-source-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP7:kernel-default-extra-6.4.0-150700.53.34.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40253",
"url": "https://www.suse.com/security/cve/CVE-2025-40253"
},
{
"category": "external",
"summary": "SUSE Bug 1255084 for CVE-2025-40253",
"url": "https://bugzilla.suse.com/1255084"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_34-default-1-150700.15.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_34-default-1-150700.15.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_34-default-1-150700.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-devel-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.34.1.150700.17.23.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.34.1.150700.17.23.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.34.1.150700.17.23.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-devel-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-macros-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-zfcpdump-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-docs-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-source-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP7:kernel-default-extra-6.4.0-150700.53.34.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_34-default-1-150700.15.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_34-default-1-150700.15.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_34-default-1-150700.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-devel-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.34.1.150700.17.23.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.34.1.150700.17.23.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.34.1.150700.17.23.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-devel-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-macros-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-zfcpdump-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-docs-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-source-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP7:kernel-default-extra-6.4.0-150700.53.34.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-03-26T13:23:51Z",
"details": "moderate"
}
],
"title": "CVE-2025-40253"
},
{
"cve": "CVE-2025-68283",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-68283"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nlibceph: replace BUG_ON with bounds check for map-\u003emax_osd\n\nOSD indexes come from untrusted network packets. Boundary checks are\nadded to validate these against map-\u003emax_osd.\n\n[ idryomov: drop BUG_ON in ceph_get_primary_affinity(), minor cosmetic\n edits ]",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_34-default-1-150700.15.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_34-default-1-150700.15.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_34-default-1-150700.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-devel-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.34.1.150700.17.23.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.34.1.150700.17.23.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.34.1.150700.17.23.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-devel-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-macros-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-zfcpdump-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-docs-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-source-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP7:kernel-default-extra-6.4.0-150700.53.34.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-68283",
"url": "https://www.suse.com/security/cve/CVE-2025-68283"
},
{
"category": "external",
"summary": "SUSE Bug 1255379 for CVE-2025-68283",
"url": "https://bugzilla.suse.com/1255379"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_34-default-1-150700.15.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_34-default-1-150700.15.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_34-default-1-150700.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-devel-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.34.1.150700.17.23.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.34.1.150700.17.23.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.34.1.150700.17.23.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-devel-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-macros-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-zfcpdump-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-docs-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-source-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP7:kernel-default-extra-6.4.0-150700.53.34.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:A/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_34-default-1-150700.15.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_34-default-1-150700.15.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_34-default-1-150700.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-devel-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.34.1.150700.17.23.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.34.1.150700.17.23.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.34.1.150700.17.23.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-devel-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-macros-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-zfcpdump-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-docs-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-source-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP7:kernel-default-extra-6.4.0-150700.53.34.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-03-26T13:23:51Z",
"details": "moderate"
}
],
"title": "CVE-2025-68283"
},
{
"cve": "CVE-2025-68295",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-68295"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nsmb: client: fix memory leak in cifs_construct_tcon()\n\nWhen having a multiuser mount with domain= specified and using\ncifscreds, cifs_set_cifscreds() will end up setting @ctx-\u003edomainname,\nso it needs to be freed before leaving cifs_construct_tcon().\n\nThis fixes the following memory leak reported by kmemleak:\n\n mount.cifs //srv/share /mnt -o domain=ZELDA,multiuser,...\n su - testuser\n cifscreds add -d ZELDA -u testuser\n ...\n ls /mnt/1\n ...\n umount /mnt\n echo scan \u003e /sys/kernel/debug/kmemleak\n cat /sys/kernel/debug/kmemleak\n unreferenced object 0xffff8881203c3f08 (size 8):\n comm \"ls\", pid 5060, jiffies 4307222943\n hex dump (first 8 bytes):\n 5a 45 4c 44 41 00 cc cc ZELDA...\n backtrace (crc d109a8cf):\n __kmalloc_node_track_caller_noprof+0x572/0x710\n kstrdup+0x3a/0x70\n cifs_sb_tlink+0x1209/0x1770 [cifs]\n cifs_get_fattr+0xe1/0xf50 [cifs]\n cifs_get_inode_info+0xb5/0x240 [cifs]\n cifs_revalidate_dentry_attr+0x2d1/0x470 [cifs]\n cifs_getattr+0x28e/0x450 [cifs]\n vfs_getattr_nosec+0x126/0x180\n vfs_statx+0xf6/0x220\n do_statx+0xab/0x110\n __x64_sys_statx+0xd5/0x130\n do_syscall_64+0xbb/0x380\n entry_SYSCALL_64_after_hwframe+0x77/0x7f",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_34-default-1-150700.15.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_34-default-1-150700.15.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_34-default-1-150700.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-devel-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.34.1.150700.17.23.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.34.1.150700.17.23.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.34.1.150700.17.23.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-devel-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-macros-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-zfcpdump-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-docs-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-source-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP7:kernel-default-extra-6.4.0-150700.53.34.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-68295",
"url": "https://www.suse.com/security/cve/CVE-2025-68295"
},
{
"category": "external",
"summary": "SUSE Bug 1255129 for CVE-2025-68295",
"url": "https://bugzilla.suse.com/1255129"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_34-default-1-150700.15.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_34-default-1-150700.15.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_34-default-1-150700.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-devel-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.34.1.150700.17.23.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.34.1.150700.17.23.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.34.1.150700.17.23.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-devel-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-macros-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-zfcpdump-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-docs-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-source-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP7:kernel-default-extra-6.4.0-150700.53.34.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_34-default-1-150700.15.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_34-default-1-150700.15.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_34-default-1-150700.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-devel-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.34.1.150700.17.23.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.34.1.150700.17.23.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.34.1.150700.17.23.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-devel-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-macros-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-zfcpdump-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-docs-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-source-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP7:kernel-default-extra-6.4.0-150700.53.34.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-03-26T13:23:51Z",
"details": "moderate"
}
],
"title": "CVE-2025-68295"
},
{
"cve": "CVE-2025-68374",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-68374"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nmd: fix rcu protection in md_wakeup_thread\n\nWe attempted to use RCU to protect the pointer \u0027thread\u0027, but directly\npassed the value when calling md_wakeup_thread(). This means that the\nRCU pointer has been acquired before rcu_read_lock(), which renders\nrcu_read_lock() ineffective and could lead to a use-after-free.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_34-default-1-150700.15.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_34-default-1-150700.15.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_34-default-1-150700.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-devel-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.34.1.150700.17.23.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.34.1.150700.17.23.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.34.1.150700.17.23.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-devel-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-macros-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-zfcpdump-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-docs-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-source-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP7:kernel-default-extra-6.4.0-150700.53.34.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-68374",
"url": "https://www.suse.com/security/cve/CVE-2025-68374"
},
{
"category": "external",
"summary": "SUSE Bug 1255530 for CVE-2025-68374",
"url": "https://bugzilla.suse.com/1255530"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_34-default-1-150700.15.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_34-default-1-150700.15.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_34-default-1-150700.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-devel-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.34.1.150700.17.23.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.34.1.150700.17.23.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.34.1.150700.17.23.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-devel-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-macros-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-zfcpdump-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-docs-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-source-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP7:kernel-default-extra-6.4.0-150700.53.34.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_34-default-1-150700.15.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_34-default-1-150700.15.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_34-default-1-150700.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-devel-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.34.1.150700.17.23.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.34.1.150700.17.23.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.34.1.150700.17.23.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-devel-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-macros-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-zfcpdump-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-docs-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-source-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP7:kernel-default-extra-6.4.0-150700.53.34.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-03-26T13:23:51Z",
"details": "moderate"
}
],
"title": "CVE-2025-68374"
},
{
"cve": "CVE-2025-68735",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-68735"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\ndrm/panthor: Prevent potential UAF in group creation\n\nThis commit prevents the possibility of a use after free issue in the\nGROUP_CREATE ioctl function, which arose as pointer to the group is\naccessed in that ioctl function after storing it in the Xarray.\nA malicious userspace can second guess the handle of a group and try\nto call GROUP_DESTROY ioctl from another thread around the same time\nas GROUP_CREATE ioctl.\n\nTo prevent the use after free exploit, this commit uses a mark on an\nentry of group pool Xarray which is added just before returning from\nthe GROUP_CREATE ioctl function. The mark is checked for all ioctls\nthat specify the group handle and so userspace won\u0027t be abe to delete\na group that isn\u0027t marked yet.\n\nv2: Add R-bs and fixes tags",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_34-default-1-150700.15.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_34-default-1-150700.15.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_34-default-1-150700.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-devel-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.34.1.150700.17.23.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.34.1.150700.17.23.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.34.1.150700.17.23.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-devel-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-macros-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-zfcpdump-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-docs-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-source-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP7:kernel-default-extra-6.4.0-150700.53.34.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-68735",
"url": "https://www.suse.com/security/cve/CVE-2025-68735"
},
{
"category": "external",
"summary": "SUSE Bug 1255811 for CVE-2025-68735",
"url": "https://bugzilla.suse.com/1255811"
},
{
"category": "external",
"summary": "SUSE Bug 1256251 for CVE-2025-68735",
"url": "https://bugzilla.suse.com/1256251"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_34-default-1-150700.15.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_34-default-1-150700.15.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_34-default-1-150700.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-devel-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.34.1.150700.17.23.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.34.1.150700.17.23.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.34.1.150700.17.23.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-devel-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-macros-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-zfcpdump-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-docs-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-source-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP7:kernel-default-extra-6.4.0-150700.53.34.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_34-default-1-150700.15.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_34-default-1-150700.15.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_34-default-1-150700.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-devel-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.34.1.150700.17.23.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.34.1.150700.17.23.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.34.1.150700.17.23.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-devel-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-macros-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-zfcpdump-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-docs-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-source-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP7:kernel-default-extra-6.4.0-150700.53.34.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-03-26T13:23:51Z",
"details": "important"
}
],
"title": "CVE-2025-68735"
},
{
"cve": "CVE-2025-68736",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-68736"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nlandlock: Fix handling of disconnected directories\n\nDisconnected files or directories can appear when they are visible and\nopened from a bind mount, but have been renamed or moved from the source\nof the bind mount in a way that makes them inaccessible from the mount\npoint (i.e. out of scope).\n\nPreviously, access rights tied to files or directories opened through a\ndisconnected directory were collected by walking the related hierarchy\ndown to the root of the filesystem, without taking into account the\nmount point because it couldn\u0027t be found. This could lead to\ninconsistent access results, potential access right widening, and\nhard-to-debug renames, especially since such paths cannot be printed.\n\nFor a sandboxed task to create a disconnected directory, it needs to\nhave write access (i.e. FS_MAKE_REG, FS_REMOVE_FILE, and FS_REFER) to\nthe underlying source of the bind mount, and read access to the related\nmount point. Because a sandboxed task cannot acquire more access\nrights than those defined by its Landlock domain, this could lead to\ninconsistent access rights due to missing permissions that should be\ninherited from the mount point hierarchy, while inheriting permissions\nfrom the filesystem hierarchy hidden by this mount point instead.\n\nLandlock now handles files and directories opened from disconnected\ndirectories by taking into account the filesystem hierarchy when the\nmount point is not found in the hierarchy walk, and also always taking\ninto account the mount point from which these disconnected directories\nwere opened. This ensures that a rename is not allowed if it would\nwiden access rights [1].\n\nThe rationale is that, even if disconnected hierarchies might not be\nvisible or accessible to a sandboxed task, relying on the collected\naccess rights from them improves the guarantee that access rights will\nnot be widened during a rename because of the access right comparison\nbetween the source and the destination (see LANDLOCK_ACCESS_FS_REFER).\nIt may look like this would grant more access on disconnected files and\ndirectories, but the security policies are always enforced for all the\nevaluated hierarchies. This new behavior should be less surprising to\nusers and safer from an access control perspective.\n\nRemove a wrong WARN_ON_ONCE() canary in collect_domain_accesses() and\nfix the related comment.\n\nBecause opened files have their access rights stored in the related file\nsecurity properties, there is no impact for disconnected or unlinked\nfiles.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_34-default-1-150700.15.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_34-default-1-150700.15.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_34-default-1-150700.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-devel-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.34.1.150700.17.23.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.34.1.150700.17.23.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.34.1.150700.17.23.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-devel-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-macros-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-zfcpdump-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-docs-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-source-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP7:kernel-default-extra-6.4.0-150700.53.34.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-68736",
"url": "https://www.suse.com/security/cve/CVE-2025-68736"
},
{
"category": "external",
"summary": "SUSE Bug 1255698 for CVE-2025-68736",
"url": "https://bugzilla.suse.com/1255698"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_34-default-1-150700.15.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_34-default-1-150700.15.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_34-default-1-150700.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-devel-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.34.1.150700.17.23.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.34.1.150700.17.23.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.34.1.150700.17.23.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-devel-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-macros-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-zfcpdump-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-docs-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-source-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP7:kernel-default-extra-6.4.0-150700.53.34.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.7,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:N",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_34-default-1-150700.15.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_34-default-1-150700.15.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_34-default-1-150700.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-devel-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.34.1.150700.17.23.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.34.1.150700.17.23.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.34.1.150700.17.23.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-devel-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-macros-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-zfcpdump-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-docs-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-source-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP7:kernel-default-extra-6.4.0-150700.53.34.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-03-26T13:23:51Z",
"details": "moderate"
}
],
"title": "CVE-2025-68736"
},
{
"cve": "CVE-2025-68778",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-68778"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nbtrfs: don\u0027t log conflicting inode if it\u0027s a dir moved in the current transaction\n\nWe can\u0027t log a conflicting inode if it\u0027s a directory and it was moved\nfrom one parent directory to another parent directory in the current\ntransaction, as this can result an attempt to have a directory with\ntwo hard links during log replay, one for the old parent directory and\nanother for the new parent directory.\n\nThe following scenario triggers that issue:\n\n1) We have directories \"dir1\" and \"dir2\" created in a past transaction.\n Directory \"dir1\" has inode A as its parent directory;\n\n2) We move \"dir1\" to some other directory;\n\n3) We create a file with the name \"dir1\" in directory inode A;\n\n4) We fsync the new file. This results in logging the inode of the new file\n and the inode for the directory \"dir1\" that was previously moved in the\n current transaction. So the log tree has the INODE_REF item for the\n new location of \"dir1\";\n\n5) We move the new file to some other directory. This results in updating\n the log tree to included the new INODE_REF for the new location of the\n file and removes the INODE_REF for the old location. This happens\n during the rename when we call btrfs_log_new_name();\n\n6) We fsync the file, and that persists the log tree changes done in the\n previous step (btrfs_log_new_name() only updates the log tree in\n memory);\n\n7) We have a power failure;\n\n8) Next time the fs is mounted, log replay happens and when processing\n the inode for directory \"dir1\" we find a new INODE_REF and add that\n link, but we don\u0027t remove the old link of the inode since we have\n not logged the old parent directory of the directory inode \"dir1\".\n\nAs a result after log replay finishes when we trigger writeback of the\nsubvolume tree\u0027s extent buffers, the tree check will detect that we have\na directory a hard link count of 2 and we get a mount failure.\nThe errors and stack traces reported in dmesg/syslog are like this:\n\n [ 3845.729764] BTRFS info (device dm-0): start tree-log replay\n [ 3845.730304] page: refcount:3 mapcount:0 mapping:000000005c8a3027 index:0x1d00 pfn:0x11510c\n [ 3845.731236] memcg:ffff9264c02f4e00\n [ 3845.731751] aops:btree_aops [btrfs] ino:1\n [ 3845.732300] flags: 0x17fffc00000400a(uptodate|private|writeback|node=0|zone=2|lastcpupid=0x1ffff)\n [ 3845.733346] raw: 017fffc00000400a 0000000000000000 dead000000000122 ffff9264d978aea8\n [ 3845.734265] raw: 0000000000001d00 ffff92650e6d4738 00000003ffffffff ffff9264c02f4e00\n [ 3845.735305] page dumped because: eb page dump\n [ 3845.735981] BTRFS critical (device dm-0): corrupt leaf: root=5 block=30408704 slot=6 ino=257, invalid nlink: has 2 expect no more than 1 for dir\n [ 3845.737786] BTRFS info (device dm-0): leaf 30408704 gen 10 total ptrs 17 free space 14881 owner 5\n [ 3845.737789] BTRFS info (device dm-0): refs 4 lock_owner 0 current 30701\n [ 3845.737792] \titem 0 key (256 INODE_ITEM 0) itemoff 16123 itemsize 160\n [ 3845.737794] \t\tinode generation 3 transid 9 size 16 nbytes 16384\n [ 3845.737795] \t\tblock group 0 mode 40755 links 1 uid 0 gid 0\n [ 3845.737797] \t\trdev 0 sequence 2 flags 0x0\n [ 3845.737798] \t\tatime 1764259517.0\n [ 3845.737800] \t\tctime 1764259517.572889464\n [ 3845.737801] \t\tmtime 1764259517.572889464\n [ 3845.737802] \t\totime 1764259517.0\n [ 3845.737803] \titem 1 key (256 INODE_REF 256) itemoff 16111 itemsize 12\n [ 3845.737805] \t\tindex 0 name_len 2\n [ 3845.737807] \titem 2 key (256 DIR_ITEM 2363071922) itemoff 16077 itemsize 34\n [ 3845.737808] \t\tlocation key (257 1 0) type 2\n [ 3845.737810] \t\ttransid 9 data_len 0 name_len 4\n [ 3845.737811] \titem 3 key (256 DIR_ITEM 2676584006) itemoff 16043 itemsize 34\n [ 3845.737813] \t\tlocation key (258 1 0) type 2\n [ 3845.737814] \t\ttransid 9 data_len 0 name_len 4\n [ 3845.737815] \titem 4 key (256 DIR_INDEX 2) itemoff 16009 itemsize 34\n [ 3845.737816] \t\tlocation key (257 1 0) type 2\n [\n---truncated---",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_34-default-1-150700.15.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_34-default-1-150700.15.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_34-default-1-150700.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-devel-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.34.1.150700.17.23.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.34.1.150700.17.23.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.34.1.150700.17.23.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-devel-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-macros-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-zfcpdump-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-docs-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-source-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP7:kernel-default-extra-6.4.0-150700.53.34.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-68778",
"url": "https://www.suse.com/security/cve/CVE-2025-68778"
},
{
"category": "external",
"summary": "SUSE Bug 1256683 for CVE-2025-68778",
"url": "https://bugzilla.suse.com/1256683"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_34-default-1-150700.15.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_34-default-1-150700.15.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_34-default-1-150700.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-devel-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.34.1.150700.17.23.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.34.1.150700.17.23.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.34.1.150700.17.23.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-devel-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-macros-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-zfcpdump-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-docs-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-source-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP7:kernel-default-extra-6.4.0-150700.53.34.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.7,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_34-default-1-150700.15.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_34-default-1-150700.15.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_34-default-1-150700.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-devel-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.34.1.150700.17.23.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.34.1.150700.17.23.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.34.1.150700.17.23.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-devel-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-macros-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-zfcpdump-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-docs-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-source-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP7:kernel-default-extra-6.4.0-150700.53.34.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-03-26T13:23:51Z",
"details": "moderate"
}
],
"title": "CVE-2025-68778"
},
{
"cve": "CVE-2025-68785",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-68785"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nnet: openvswitch: fix middle attribute validation in push_nsh() action\n\nThe push_nsh() action structure looks like this:\n\n OVS_ACTION_ATTR_PUSH_NSH(OVS_KEY_ATTR_NSH(OVS_NSH_KEY_ATTR_BASE,...))\n\nThe outermost OVS_ACTION_ATTR_PUSH_NSH attribute is OK\u0027ed by the\nnla_for_each_nested() inside __ovs_nla_copy_actions(). The innermost\nOVS_NSH_KEY_ATTR_BASE/MD1/MD2 are OK\u0027ed by the nla_for_each_nested()\ninside nsh_key_put_from_nlattr(). But nothing checks if the attribute\nin the middle is OK. We don\u0027t even check that this attribute is the\nOVS_KEY_ATTR_NSH. We just do a double unwrap with a pair of nla_data()\ncalls - first time directly while calling validate_push_nsh() and the\nsecond time as part of the nla_for_each_nested() macro, which isn\u0027t\nsafe, potentially causing invalid memory access if the size of this\nattribute is incorrect. The failure may not be noticed during\nvalidation due to larger netlink buffer, but cause trouble later during\naction execution where the buffer is allocated exactly to the size:\n\n BUG: KASAN: slab-out-of-bounds in nsh_hdr_from_nlattr+0x1dd/0x6a0 [openvswitch]\n Read of size 184 at addr ffff88816459a634 by task a.out/22624\n\n CPU: 8 UID: 0 PID: 22624 6.18.0-rc7+ #115 PREEMPT(voluntary)\n Call Trace:\n \u003cTASK\u003e\n dump_stack_lvl+0x51/0x70\n print_address_description.constprop.0+0x2c/0x390\n kasan_report+0xdd/0x110\n kasan_check_range+0x35/0x1b0\n __asan_memcpy+0x20/0x60\n nsh_hdr_from_nlattr+0x1dd/0x6a0 [openvswitch]\n push_nsh+0x82/0x120 [openvswitch]\n do_execute_actions+0x1405/0x2840 [openvswitch]\n ovs_execute_actions+0xd5/0x3b0 [openvswitch]\n ovs_packet_cmd_execute+0x949/0xdb0 [openvswitch]\n genl_family_rcv_msg_doit+0x1d6/0x2b0\n genl_family_rcv_msg+0x336/0x580\n genl_rcv_msg+0x9f/0x130\n netlink_rcv_skb+0x11f/0x370\n genl_rcv+0x24/0x40\n netlink_unicast+0x73e/0xaa0\n netlink_sendmsg+0x744/0xbf0\n __sys_sendto+0x3d6/0x450\n do_syscall_64+0x79/0x2c0\n entry_SYSCALL_64_after_hwframe+0x76/0x7e\n \u003c/TASK\u003e\n\nLet\u0027s add some checks that the attribute is properly sized and it\u0027s\nthe only one attribute inside the action. Technically, there is no\nreal reason for OVS_KEY_ATTR_NSH to be there, as we know that we\u0027re\npushing an NSH header already, it just creates extra nesting, but\nthat\u0027s how uAPI works today. So, keeping as it is.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_34-default-1-150700.15.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_34-default-1-150700.15.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_34-default-1-150700.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-devel-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.34.1.150700.17.23.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.34.1.150700.17.23.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.34.1.150700.17.23.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-devel-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-macros-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-zfcpdump-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-docs-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-source-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP7:kernel-default-extra-6.4.0-150700.53.34.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-68785",
"url": "https://www.suse.com/security/cve/CVE-2025-68785"
},
{
"category": "external",
"summary": "SUSE Bug 1256640 for CVE-2025-68785",
"url": "https://bugzilla.suse.com/1256640"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_34-default-1-150700.15.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_34-default-1-150700.15.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_34-default-1-150700.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-devel-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.34.1.150700.17.23.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.34.1.150700.17.23.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.34.1.150700.17.23.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-devel-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-macros-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-zfcpdump-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-docs-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-source-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP7:kernel-default-extra-6.4.0-150700.53.34.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.7,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_34-default-1-150700.15.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_34-default-1-150700.15.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_34-default-1-150700.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-devel-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.34.1.150700.17.23.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.34.1.150700.17.23.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.34.1.150700.17.23.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-devel-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-macros-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-zfcpdump-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-docs-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-source-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP7:kernel-default-extra-6.4.0-150700.53.34.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-03-26T13:23:51Z",
"details": "moderate"
}
],
"title": "CVE-2025-68785"
},
{
"cve": "CVE-2025-68810",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-68810"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nKVM: Disallow toggling KVM_MEM_GUEST_MEMFD on an existing memslot\n\nReject attempts to disable KVM_MEM_GUEST_MEMFD on a memslot that was\ninitially created with a guest_memfd binding, as KVM doesn\u0027t support\ntoggling KVM_MEM_GUEST_MEMFD on existing memslots. KVM prevents enabling\nKVM_MEM_GUEST_MEMFD, but doesn\u0027t prevent clearing the flag.\n\nFailure to reject the new memslot results in a use-after-free due to KVM\nnot unbinding from the guest_memfd instance. Unbinding on a FLAGS_ONLY\nchange is easy enough, and can/will be done as a hardening measure (in\nanticipation of KVM supporting dirty logging on guest_memfd at some point),\nbut fixing the use-after-free would only address the immediate symptom.\n\n ==================================================================\n BUG: KASAN: slab-use-after-free in kvm_gmem_release+0x362/0x400 [kvm]\n Write of size 8 at addr ffff8881111ae908 by task repro/745\n\n CPU: 7 UID: 1000 PID: 745 Comm: repro Not tainted 6.18.0-rc6-115d5de2eef3-next-kasan #3 NONE\n Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 0.0.0 02/06/2015\n Call Trace:\n \u003cTASK\u003e\n dump_stack_lvl+0x51/0x60\n print_report+0xcb/0x5c0\n kasan_report+0xb4/0xe0\n kvm_gmem_release+0x362/0x400 [kvm]\n __fput+0x2fa/0x9d0\n task_work_run+0x12c/0x200\n do_exit+0x6ae/0x2100\n do_group_exit+0xa8/0x230\n __x64_sys_exit_group+0x3a/0x50\n x64_sys_call+0x737/0x740\n do_syscall_64+0x5b/0x900\n entry_SYSCALL_64_after_hwframe+0x4b/0x53\n RIP: 0033:0x7f581f2eac31\n \u003c/TASK\u003e\n\n Allocated by task 745 on cpu 6 at 9.746971s:\n kasan_save_stack+0x20/0x40\n kasan_save_track+0x13/0x50\n __kasan_kmalloc+0x77/0x90\n kvm_set_memory_region.part.0+0x652/0x1110 [kvm]\n kvm_vm_ioctl+0x14b0/0x3290 [kvm]\n __x64_sys_ioctl+0x129/0x1a0\n do_syscall_64+0x5b/0x900\n entry_SYSCALL_64_after_hwframe+0x4b/0x53\n\n Freed by task 745 on cpu 6 at 9.747467s:\n kasan_save_stack+0x20/0x40\n kasan_save_track+0x13/0x50\n __kasan_save_free_info+0x37/0x50\n __kasan_slab_free+0x3b/0x60\n kfree+0xf5/0x440\n kvm_set_memslot+0x3c2/0x1160 [kvm]\n kvm_set_memory_region.part.0+0x86a/0x1110 [kvm]\n kvm_vm_ioctl+0x14b0/0x3290 [kvm]\n __x64_sys_ioctl+0x129/0x1a0\n do_syscall_64+0x5b/0x900\n entry_SYSCALL_64_after_hwframe+0x4b/0x53",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_34-default-1-150700.15.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_34-default-1-150700.15.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_34-default-1-150700.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-devel-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.34.1.150700.17.23.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.34.1.150700.17.23.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.34.1.150700.17.23.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-devel-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-macros-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-zfcpdump-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-docs-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-source-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP7:kernel-default-extra-6.4.0-150700.53.34.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-68810",
"url": "https://www.suse.com/security/cve/CVE-2025-68810"
},
{
"category": "external",
"summary": "SUSE Bug 1256679 for CVE-2025-68810",
"url": "https://bugzilla.suse.com/1256679"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_34-default-1-150700.15.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_34-default-1-150700.15.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_34-default-1-150700.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-devel-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.34.1.150700.17.23.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.34.1.150700.17.23.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.34.1.150700.17.23.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-devel-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-macros-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-zfcpdump-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-docs-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-source-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP7:kernel-default-extra-6.4.0-150700.53.34.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_34-default-1-150700.15.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_34-default-1-150700.15.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_34-default-1-150700.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-devel-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.34.1.150700.17.23.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.34.1.150700.17.23.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.34.1.150700.17.23.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-devel-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-macros-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-zfcpdump-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-docs-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-source-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP7:kernel-default-extra-6.4.0-150700.53.34.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-03-26T13:23:51Z",
"details": "moderate"
}
],
"title": "CVE-2025-68810"
},
{
"cve": "CVE-2025-71066",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-71066"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nnet/sched: ets: Always remove class from active list before deleting in ets_qdisc_change\n\nzdi-disclosures@trendmicro.com says:\n\nThe vulnerability is a race condition between `ets_qdisc_dequeue` and\n`ets_qdisc_change`. It leads to UAF on `struct Qdisc` object.\nAttacker requires the capability to create new user and network namespace\nin order to trigger the bug.\nSee my additional commentary at the end of the analysis.\n\nAnalysis:\n\nstatic int ets_qdisc_change(struct Qdisc *sch, struct nlattr *opt,\n struct netlink_ext_ack *extack)\n{\n...\n\n // (1) this lock is preventing .change handler (`ets_qdisc_change`)\n //to race with .dequeue handler (`ets_qdisc_dequeue`)\n sch_tree_lock(sch);\n\n for (i = nbands; i \u003c oldbands; i++) {\n if (i \u003e= q-\u003enstrict \u0026\u0026 q-\u003eclasses[i].qdisc-\u003eq.qlen)\n list_del_init(\u0026q-\u003eclasses[i].alist);\n qdisc_purge_queue(q-\u003eclasses[i].qdisc);\n }\n\n WRITE_ONCE(q-\u003enbands, nbands);\n for (i = nstrict; i \u003c q-\u003enstrict; i++) {\n if (q-\u003eclasses[i].qdisc-\u003eq.qlen) {\n\t\t // (2) the class is added to the q-\u003eactive\n list_add_tail(\u0026q-\u003eclasses[i].alist, \u0026q-\u003eactive);\n q-\u003eclasses[i].deficit = quanta[i];\n }\n }\n WRITE_ONCE(q-\u003enstrict, nstrict);\n memcpy(q-\u003eprio2band, priomap, sizeof(priomap));\n\n for (i = 0; i \u003c q-\u003enbands; i++)\n WRITE_ONCE(q-\u003eclasses[i].quantum, quanta[i]);\n\n for (i = oldbands; i \u003c q-\u003enbands; i++) {\n q-\u003eclasses[i].qdisc = queues[i];\n if (q-\u003eclasses[i].qdisc != \u0026noop_qdisc)\n qdisc_hash_add(q-\u003eclasses[i].qdisc, true);\n }\n\n // (3) the qdisc is unlocked, now dequeue can be called in parallel\n // to the rest of .change handler\n sch_tree_unlock(sch);\n\n ets_offload_change(sch);\n for (i = q-\u003enbands; i \u003c oldbands; i++) {\n\t // (4) we\u0027re reducing the refcount for our class\u0027s qdisc and\n\t // freeing it\n qdisc_put(q-\u003eclasses[i].qdisc);\n\t // (5) If we call .dequeue between (4) and (5), we will have\n\t // a strong UAF and we can control RIP\n q-\u003eclasses[i].qdisc = NULL;\n WRITE_ONCE(q-\u003eclasses[i].quantum, 0);\n q-\u003eclasses[i].deficit = 0;\n gnet_stats_basic_sync_init(\u0026q-\u003eclasses[i].bstats);\n memset(\u0026q-\u003eclasses[i].qstats, 0, sizeof(q-\u003eclasses[i].qstats));\n }\n return 0;\n}\n\nComment:\nThis happens because some of the classes have their qdiscs assigned to\nNULL, but remain in the active list. This commit fixes this issue by always\nremoving the class from the active list before deleting and freeing its\nassociated qdisc\n\nReproducer Steps\n(trimmed version of what was sent by zdi-disclosures@trendmicro.com)\n\n```\nDEV=\"${DEV:-lo}\"\nROOT_HANDLE=\"${ROOT_HANDLE:-1:}\"\nBAND2_HANDLE=\"${BAND2_HANDLE:-20:}\" # child under 1:2\nPING_BYTES=\"${PING_BYTES:-48}\"\nPING_COUNT=\"${PING_COUNT:-200000}\"\nPING_DST=\"${PING_DST:-127.0.0.1}\"\n\nSLOW_TBF_RATE=\"${SLOW_TBF_RATE:-8bit}\"\nSLOW_TBF_BURST=\"${SLOW_TBF_BURST:-100b}\"\nSLOW_TBF_LAT=\"${SLOW_TBF_LAT:-1s}\"\n\ncleanup() {\n tc qdisc del dev \"$DEV\" root 2\u003e/dev/null\n}\ntrap cleanup EXIT\n\nip link set \"$DEV\" up\n\ntc qdisc del dev \"$DEV\" root 2\u003e/dev/null || true\n\ntc qdisc add dev \"$DEV\" root handle \"$ROOT_HANDLE\" ets bands 2 strict 2\n\ntc qdisc add dev \"$DEV\" parent 1:2 handle \"$BAND2_HANDLE\" \\\n tbf rate \"$SLOW_TBF_RATE\" burst \"$SLOW_TBF_BURST\" latency \"$SLOW_TBF_LAT\"\n\ntc filter add dev \"$DEV\" parent 1: protocol all prio 1 u32 match u32 0 0 flowid 1:2\ntc -s qdisc ls dev $DEV\n\nping -I \"$DEV\" -f -c \"$PING_COUNT\" -s \"$PING_BYTES\" -W 0.001 \"$PING_DST\" \\\n \u003e/dev/null 2\u003e\u00261 \u0026\ntc qdisc change dev \"$DEV\" root handle \"$ROOT_HANDLE\" ets bands 2 strict 0\ntc qdisc change dev \"$DEV\" root handle \"$ROOT_HANDLE\" ets bands 2 strict 2\ntc -s qdisc ls dev $DEV\ntc qdisc del dev \"$DEV\" parent \n---truncated---",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_34-default-1-150700.15.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_34-default-1-150700.15.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_34-default-1-150700.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-devel-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.34.1.150700.17.23.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.34.1.150700.17.23.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.34.1.150700.17.23.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-devel-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-macros-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-zfcpdump-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-docs-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-source-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP7:kernel-default-extra-6.4.0-150700.53.34.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-71066",
"url": "https://www.suse.com/security/cve/CVE-2025-71066"
},
{
"category": "external",
"summary": "SUSE Bug 1256645 for CVE-2025-71066",
"url": "https://bugzilla.suse.com/1256645"
},
{
"category": "external",
"summary": "SUSE Bug 1258005 for CVE-2025-71066",
"url": "https://bugzilla.suse.com/1258005"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_34-default-1-150700.15.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_34-default-1-150700.15.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_34-default-1-150700.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-devel-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.34.1.150700.17.23.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.34.1.150700.17.23.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.34.1.150700.17.23.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-devel-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-macros-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-zfcpdump-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-docs-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-source-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP7:kernel-default-extra-6.4.0-150700.53.34.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_34-default-1-150700.15.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_34-default-1-150700.15.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_34-default-1-150700.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-devel-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.34.1.150700.17.23.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.34.1.150700.17.23.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.34.1.150700.17.23.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-devel-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-macros-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-zfcpdump-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-docs-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-source-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP7:kernel-default-extra-6.4.0-150700.53.34.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-03-26T13:23:51Z",
"details": "important"
}
],
"title": "CVE-2025-71066"
},
{
"cve": "CVE-2025-71071",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-71071"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\niommu/mediatek: fix use-after-free on probe deferral\n\nThe driver is dropping the references taken to the larb devices during\nprobe after successful lookup as well as on errors. This can\npotentially lead to a use-after-free in case a larb device has not yet\nbeen bound to its driver so that the iommu driver probe defers.\n\nFix this by keeping the references as expected while the iommu driver is\nbound.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_34-default-1-150700.15.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_34-default-1-150700.15.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_34-default-1-150700.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-devel-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.34.1.150700.17.23.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.34.1.150700.17.23.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.34.1.150700.17.23.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-devel-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-macros-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-zfcpdump-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-docs-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-source-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP7:kernel-default-extra-6.4.0-150700.53.34.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-71071",
"url": "https://www.suse.com/security/cve/CVE-2025-71071"
},
{
"category": "external",
"summary": "SUSE Bug 1256802 for CVE-2025-71071",
"url": "https://bugzilla.suse.com/1256802"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_34-default-1-150700.15.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_34-default-1-150700.15.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_34-default-1-150700.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-devel-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.34.1.150700.17.23.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.34.1.150700.17.23.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.34.1.150700.17.23.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-devel-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-macros-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-zfcpdump-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-docs-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-source-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP7:kernel-default-extra-6.4.0-150700.53.34.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.7,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:L/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_34-default-1-150700.15.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_34-default-1-150700.15.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_34-default-1-150700.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-devel-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.34.1.150700.17.23.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.34.1.150700.17.23.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.34.1.150700.17.23.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-devel-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-macros-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-zfcpdump-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-docs-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-source-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP7:kernel-default-extra-6.4.0-150700.53.34.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-03-26T13:23:51Z",
"details": "moderate"
}
],
"title": "CVE-2025-71071"
},
{
"cve": "CVE-2025-71104",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-71104"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nKVM: x86: Fix VM hard lockup after prolonged inactivity with periodic HV timer\n\nWhen advancing the target expiration for the guest\u0027s APIC timer in periodic\nmode, set the expiration to \"now\" if the target expiration is in the past\n(similar to what is done in update_target_expiration()). Blindly adding\nthe period to the previous target expiration can result in KVM generating\na practically unbounded number of hrtimer IRQs due to programming an\nexpired timer over and over. In extreme scenarios, e.g. if userspace\npauses/suspends a VM for an extended duration, this can even cause hard\nlockups in the host.\n\nCurrently, the bug only affects Intel CPUs when using the hypervisor timer\n(HV timer), a.k.a. the VMX preemption timer. Unlike the software timer,\na.k.a. hrtimer, which KVM keeps running even on exits to userspace, the\nHV timer only runs while the guest is active. As a result, if the vCPU\ndoes not run for an extended duration, there will be a huge gap between\nthe target expiration and the current time the vCPU resumes running.\nBecause the target expiration is incremented by only one period on each\ntimer expiration, this leads to a series of timer expirations occurring\nrapidly after the vCPU/VM resumes.\n\nMore critically, when the vCPU first triggers a periodic HV timer\nexpiration after resuming, advancing the expiration by only one period\nwill result in a target expiration in the past. As a result, the delta\nmay be calculated as a negative value. When the delta is converted into\nan absolute value (tscdeadline is an unsigned u64), the resulting value\ncan overflow what the HV timer is capable of programming. I.e. the large\nvalue will exceed the VMX Preemption Timer\u0027s maximum bit width of\ncpu_preemption_timer_multi + 32, and thus cause KVM to switch from the\nHV timer to the software timer (hrtimers).\n\nAfter switching to the software timer, periodic timer expiration callbacks\nmay be executed consecutively within a single clock interrupt handler,\nbecause hrtimers honors KVM\u0027s request for an expiration in the past and\nimmediately re-invokes KVM\u0027s callback after reprogramming. And because\nthe interrupt handler runs with IRQs disabled, restarting KVM\u0027s hrtimer\nover and over until the target expiration is advanced to \"now\" can result\nin a hard lockup.\n\nE.g. the following hard lockup was triggered in the host when running a\nWindows VM (only relevant because it used the APIC timer in periodic mode)\nafter resuming the VM from a long suspend (in the host).\n\n NMI watchdog: Watchdog detected hard LOCKUP on cpu 45\n ...\n RIP: 0010:advance_periodic_target_expiration+0x4d/0x80 [kvm]\n ...\n RSP: 0018:ff4f88f5d98d8ef0 EFLAGS: 00000046\n RAX: fff0103f91be678e RBX: fff0103f91be678e RCX: 00843a7d9e127bcc\n RDX: 0000000000000002 RSI: 0052ca4003697505 RDI: ff440d5bfbdbd500\n RBP: ff440d5956f99200 R08: ff2ff2a42deb6a84 R09: 000000000002a6c0\n R10: 0122d794016332b3 R11: 0000000000000000 R12: ff440db1af39cfc0\n R13: ff440db1af39cfc0 R14: ffffffffc0d4a560 R15: ff440db1af39d0f8\n FS: 00007f04a6ffd700(0000) GS:ff440db1af380000(0000) knlGS:000000e38a3b8000\n CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033\n CR2: 000000d5651feff8 CR3: 000000684e038002 CR4: 0000000000773ee0\n PKRU: 55555554\n Call Trace:\n \u003cIRQ\u003e\n apic_timer_fn+0x31/0x50 [kvm]\n __hrtimer_run_queues+0x100/0x280\n hrtimer_interrupt+0x100/0x210\n ? ttwu_do_wakeup+0x19/0x160\n smp_apic_timer_interrupt+0x6a/0x130\n apic_timer_interrupt+0xf/0x20\n \u003c/IRQ\u003e\n\nMoreover, if the suspend duration of the virtual machine is not long enough\nto trigger a hard lockup in this scenario, since commit 98c25ead5eda\n(\"KVM: VMX: Move preemption timer \u003c=\u003e hrtimer dance to common x86\"), KVM\nwill continue using the software timer until the guest reprograms the APIC\ntimer in some way. Since the periodic timer does not require frequent APIC\ntimer register programming, the guest may continue to use the software\ntimer in \n---truncated---",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_34-default-1-150700.15.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_34-default-1-150700.15.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_34-default-1-150700.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-devel-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.34.1.150700.17.23.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.34.1.150700.17.23.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.34.1.150700.17.23.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-devel-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-macros-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-zfcpdump-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-docs-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-source-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP7:kernel-default-extra-6.4.0-150700.53.34.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-71104",
"url": "https://www.suse.com/security/cve/CVE-2025-71104"
},
{
"category": "external",
"summary": "SUSE Bug 1256708 for CVE-2025-71104",
"url": "https://bugzilla.suse.com/1256708"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_34-default-1-150700.15.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_34-default-1-150700.15.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_34-default-1-150700.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-devel-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.34.1.150700.17.23.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.34.1.150700.17.23.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.34.1.150700.17.23.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-devel-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-macros-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-zfcpdump-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-docs-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-source-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP7:kernel-default-extra-6.4.0-150700.53.34.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_34-default-1-150700.15.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_34-default-1-150700.15.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_34-default-1-150700.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-devel-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.34.1.150700.17.23.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.34.1.150700.17.23.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.34.1.150700.17.23.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-devel-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-macros-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-zfcpdump-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-docs-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-source-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP7:kernel-default-extra-6.4.0-150700.53.34.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-03-26T13:23:51Z",
"details": "moderate"
}
],
"title": "CVE-2025-71104"
},
{
"cve": "CVE-2025-71113",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-71113"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\ncrypto: af_alg - zero initialize memory allocated via sock_kmalloc\n\nSeveral crypto user API contexts and requests allocated with\nsock_kmalloc() were left uninitialized, relying on callers to\nset fields explicitly. This resulted in the use of uninitialized\ndata in certain error paths or when new fields are added in the\nfuture.\n\nThe ACVP patches also contain two user-space interface files:\nalgif_kpp.c and algif_akcipher.c. These too rely on proper\ninitialization of their context structures.\n\nA particular issue has been observed with the newly added\n\u0027inflight\u0027 variable introduced in af_alg_ctx by commit:\n\n 67b164a871af (\"crypto: af_alg - Disallow multiple in-flight AIO requests\")\n\nBecause the context is not memset to zero after allocation,\nthe inflight variable has contained garbage values. As a result,\naf_alg_alloc_areq() has incorrectly returned -EBUSY randomly when\nthe garbage value was interpreted as true:\n\n https://github.com/gregkh/linux/blame/master/crypto/af_alg.c#L1209\n\nThe check directly tests ctx-\u003einflight without explicitly\ncomparing against true/false. Since inflight is only ever set to\ntrue or false later, an uninitialized value has triggered\n-EBUSY failures. Zero-initializing memory allocated with\nsock_kmalloc() ensures inflight and other fields start in a known\nstate, removing random issues caused by uninitialized data.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_34-default-1-150700.15.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_34-default-1-150700.15.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_34-default-1-150700.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-devel-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.34.1.150700.17.23.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.34.1.150700.17.23.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.34.1.150700.17.23.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-devel-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-macros-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-zfcpdump-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-docs-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-source-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP7:kernel-default-extra-6.4.0-150700.53.34.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-71113",
"url": "https://www.suse.com/security/cve/CVE-2025-71113"
},
{
"category": "external",
"summary": "SUSE Bug 1256716 for CVE-2025-71113",
"url": "https://bugzilla.suse.com/1256716"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_34-default-1-150700.15.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_34-default-1-150700.15.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_34-default-1-150700.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-devel-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.34.1.150700.17.23.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.34.1.150700.17.23.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.34.1.150700.17.23.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-devel-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-macros-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-zfcpdump-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-docs-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-source-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP7:kernel-default-extra-6.4.0-150700.53.34.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.6,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_34-default-1-150700.15.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_34-default-1-150700.15.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_34-default-1-150700.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-devel-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.34.1.150700.17.23.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.34.1.150700.17.23.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.34.1.150700.17.23.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-devel-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-macros-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-zfcpdump-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-docs-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-source-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP7:kernel-default-extra-6.4.0-150700.53.34.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-03-26T13:23:51Z",
"details": "moderate"
}
],
"title": "CVE-2025-71113"
},
{
"cve": "CVE-2025-71125",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-71125"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\ntracing: Do not register unsupported perf events\n\nSynthetic events currently do not have a function to register perf events.\nThis leads to calling the tracepoint register functions with a NULL\nfunction pointer which triggers:\n\n ------------[ cut here ]------------\n WARNING: kernel/tracepoint.c:175 at tracepoint_add_func+0x357/0x370, CPU#2: perf/2272\n Modules linked in: kvm_intel kvm irqbypass\n CPU: 2 UID: 0 PID: 2272 Comm: perf Not tainted 6.18.0-ftest-11964-ge022764176fc-dirty #323 PREEMPTLAZY\n Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.17.0-debian-1.17.0-1 04/01/2014\n RIP: 0010:tracepoint_add_func+0x357/0x370\n Code: 28 9c e8 4c 0b f5 ff eb 0f 4c 89 f7 48 c7 c6 80 4d 28 9c e8 ab 89 f4 ff 31 c0 5b 41 5c 41 5d 41 5e 41 5f 5d c3 cc cc cc cc cc \u003c0f\u003e 0b 49 c7 c6 ea ff ff ff e9 ee fe ff ff 0f 0b e9 f9 fe ff ff 0f\n RSP: 0018:ffffabc0c44d3c40 EFLAGS: 00010246\n RAX: 0000000000000001 RBX: ffff9380aa9e4060 RCX: 0000000000000000\n RDX: 000000000000000a RSI: ffffffff9e1d4a98 RDI: ffff937fcf5fd6c8\n RBP: 0000000000000001 R08: 0000000000000007 R09: ffff937fcf5fc780\n R10: 0000000000000003 R11: ffffffff9c193910 R12: 000000000000000a\n R13: ffffffff9e1e5888 R14: 0000000000000000 R15: ffffabc0c44d3c78\n FS: 00007f6202f5f340(0000) GS:ffff93819f00f000(0000) knlGS:0000000000000000\n CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033\n CR2: 000055d3162281a8 CR3: 0000000106a56003 CR4: 0000000000172ef0\n Call Trace:\n \u003cTASK\u003e\n tracepoint_probe_register+0x5d/0x90\n synth_event_reg+0x3c/0x60\n perf_trace_event_init+0x204/0x340\n perf_trace_init+0x85/0xd0\n perf_tp_event_init+0x2e/0x50\n perf_try_init_event+0x6f/0x230\n ? perf_event_alloc+0x4bb/0xdc0\n perf_event_alloc+0x65a/0xdc0\n __se_sys_perf_event_open+0x290/0x9f0\n do_syscall_64+0x93/0x7b0\n ? entry_SYSCALL_64_after_hwframe+0x76/0x7e\n ? trace_hardirqs_off+0x53/0xc0\n entry_SYSCALL_64_after_hwframe+0x76/0x7e\n\nInstead, have the code return -ENODEV, which doesn\u0027t warn and has perf\nerror out with:\n\n # perf record -e synthetic:futex_wait\nError:\nThe sys_perf_event_open() syscall returned with 19 (No such device) for event (synthetic:futex_wait).\n\"dmesg | grep -i perf\" may provide additional information.\n\nIdeally perf should support synthetic events, but for now just fix the\nwarning. The support can come later.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_34-default-1-150700.15.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_34-default-1-150700.15.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_34-default-1-150700.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-devel-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.34.1.150700.17.23.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.34.1.150700.17.23.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.34.1.150700.17.23.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-devel-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-macros-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-zfcpdump-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-docs-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-source-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP7:kernel-default-extra-6.4.0-150700.53.34.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-71125",
"url": "https://www.suse.com/security/cve/CVE-2025-71125"
},
{
"category": "external",
"summary": "SUSE Bug 1256784 for CVE-2025-71125",
"url": "https://bugzilla.suse.com/1256784"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_34-default-1-150700.15.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_34-default-1-150700.15.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_34-default-1-150700.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-devel-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.34.1.150700.17.23.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.34.1.150700.17.23.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.34.1.150700.17.23.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-devel-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-macros-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-zfcpdump-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-docs-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-source-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP7:kernel-default-extra-6.4.0-150700.53.34.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 3.3,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_34-default-1-150700.15.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_34-default-1-150700.15.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_34-default-1-150700.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-devel-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.34.1.150700.17.23.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.34.1.150700.17.23.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.34.1.150700.17.23.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-devel-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-macros-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-zfcpdump-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-docs-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-source-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP7:kernel-default-extra-6.4.0-150700.53.34.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-03-26T13:23:51Z",
"details": "low"
}
],
"title": "CVE-2025-71125"
},
{
"cve": "CVE-2025-71126",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-71126"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nmptcp: avoid deadlock on fallback while reinjecting\n\nJakub reported an MPTCP deadlock at fallback time:\n\n WARNING: possible recursive locking detected\n 6.18.0-rc7-virtme #1 Not tainted\n --------------------------------------------\n mptcp_connect/20858 is trying to acquire lock:\n ff1100001da18b60 (\u0026msk-\u003efallback_lock){+.-.}-{3:3}, at: __mptcp_try_fallback+0xd8/0x280\n\n but task is already holding lock:\n ff1100001da18b60 (\u0026msk-\u003efallback_lock){+.-.}-{3:3}, at: __mptcp_retrans+0x352/0xaa0\n\n other info that might help us debug this:\n Possible unsafe locking scenario:\n\n CPU0\n ----\n lock(\u0026msk-\u003efallback_lock);\n lock(\u0026msk-\u003efallback_lock);\n\n *** DEADLOCK ***\n\n May be due to missing lock nesting notation\n\n 3 locks held by mptcp_connect/20858:\n #0: ff1100001da18290 (sk_lock-AF_INET){+.+.}-{0:0}, at: mptcp_sendmsg+0x114/0x1bc0\n #1: ff1100001db40fd0 (k-sk_lock-AF_INET#2){+.+.}-{0:0}, at: __mptcp_retrans+0x2cb/0xaa0\n #2: ff1100001da18b60 (\u0026msk-\u003efallback_lock){+.-.}-{3:3}, at: __mptcp_retrans+0x352/0xaa0\n\n stack backtrace:\n CPU: 0 UID: 0 PID: 20858 Comm: mptcp_connect Not tainted 6.18.0-rc7-virtme #1 PREEMPT(full)\n Hardware name: Bochs, BIOS Bochs 01/01/2011\n Call Trace:\n \u003cTASK\u003e\n dump_stack_lvl+0x6f/0xa0\n print_deadlock_bug.cold+0xc0/0xcd\n validate_chain+0x2ff/0x5f0\n __lock_acquire+0x34c/0x740\n lock_acquire.part.0+0xbc/0x260\n _raw_spin_lock_bh+0x38/0x50\n __mptcp_try_fallback+0xd8/0x280\n mptcp_sendmsg_frag+0x16c2/0x3050\n __mptcp_retrans+0x421/0xaa0\n mptcp_release_cb+0x5aa/0xa70\n release_sock+0xab/0x1d0\n mptcp_sendmsg+0xd5b/0x1bc0\n sock_write_iter+0x281/0x4d0\n new_sync_write+0x3c5/0x6f0\n vfs_write+0x65e/0xbb0\n ksys_write+0x17e/0x200\n do_syscall_64+0xbb/0xfd0\n entry_SYSCALL_64_after_hwframe+0x4b/0x53\n RIP: 0033:0x7fa5627cbc5e\n Code: 4d 89 d8 e8 14 bd 00 00 4c 8b 5d f8 41 8b 93 08 03 00 00 59 5e 48 83 f8 fc 74 11 c9 c3 0f 1f 80 00 00 00 00 48 8b 45 10 0f 05 \u003cc9\u003e c3 83 e2 39 83 fa 08 75 e7 e8 13 ff ff ff 0f 1f 00 f3 0f 1e fa\n RSP: 002b:00007fff1fe14700 EFLAGS: 00000202 ORIG_RAX: 0000000000000001\n RAX: ffffffffffffffda RBX: 0000000000000005 RCX: 00007fa5627cbc5e\n RDX: 0000000000001f9c RSI: 00007fff1fe16984 RDI: 0000000000000005\n RBP: 00007fff1fe14710 R08: 0000000000000000 R09: 0000000000000000\n R10: 0000000000000000 R11: 0000000000000202 R12: 00007fff1fe16920\n R13: 0000000000002000 R14: 0000000000001f9c R15: 0000000000001f9c\n\nThe packet scheduler could attempt a reinjection after receiving an\nMP_FAIL and before the infinite map has been transmitted, causing a\ndeadlock since MPTCP needs to do the reinjection atomically from WRT\nfallback.\n\nAddress the issue explicitly avoiding the reinjection in the critical\nscenario. Note that this is the only fallback critical section that\ncould potentially send packets and hit the double-lock.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_34-default-1-150700.15.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_34-default-1-150700.15.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_34-default-1-150700.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-devel-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.34.1.150700.17.23.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.34.1.150700.17.23.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.34.1.150700.17.23.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-devel-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-macros-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-zfcpdump-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-docs-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-source-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP7:kernel-default-extra-6.4.0-150700.53.34.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-71126",
"url": "https://www.suse.com/security/cve/CVE-2025-71126"
},
{
"category": "external",
"summary": "SUSE Bug 1256755 for CVE-2025-71126",
"url": "https://bugzilla.suse.com/1256755"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_34-default-1-150700.15.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_34-default-1-150700.15.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_34-default-1-150700.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-devel-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.34.1.150700.17.23.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.34.1.150700.17.23.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.34.1.150700.17.23.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-devel-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-macros-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-zfcpdump-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-docs-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-source-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP7:kernel-default-extra-6.4.0-150700.53.34.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_34-default-1-150700.15.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_34-default-1-150700.15.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_34-default-1-150700.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-devel-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.34.1.150700.17.23.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.34.1.150700.17.23.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.34.1.150700.17.23.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-devel-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-macros-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-zfcpdump-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-docs-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-source-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP7:kernel-default-extra-6.4.0-150700.53.34.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-03-26T13:23:51Z",
"details": "moderate"
}
],
"title": "CVE-2025-71126"
},
{
"cve": "CVE-2025-71148",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-71148"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nnet/handshake: restore destructor on submit failure\n\nhandshake_req_submit() replaces sk-\u003esk_destruct but never restores it when\nsubmission fails before the request is hashed. handshake_sk_destruct() then\nreturns early and the original destructor never runs, leaking the socket.\nRestore sk_destruct on the error path.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_34-default-1-150700.15.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_34-default-1-150700.15.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_34-default-1-150700.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-devel-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.34.1.150700.17.23.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.34.1.150700.17.23.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.34.1.150700.17.23.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-devel-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-macros-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-zfcpdump-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-docs-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-source-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP7:kernel-default-extra-6.4.0-150700.53.34.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-71148",
"url": "https://www.suse.com/security/cve/CVE-2025-71148"
},
{
"category": "external",
"summary": "SUSE Bug 1257159 for CVE-2025-71148",
"url": "https://bugzilla.suse.com/1257159"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_34-default-1-150700.15.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_34-default-1-150700.15.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_34-default-1-150700.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-devel-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.34.1.150700.17.23.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.34.1.150700.17.23.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.34.1.150700.17.23.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-devel-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-macros-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-zfcpdump-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-docs-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-source-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP7:kernel-default-extra-6.4.0-150700.53.34.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.7,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_34-default-1-150700.15.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_34-default-1-150700.15.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_34-default-1-150700.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-devel-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.34.1.150700.17.23.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.34.1.150700.17.23.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.34.1.150700.17.23.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-devel-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-macros-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-zfcpdump-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-docs-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-source-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP7:kernel-default-extra-6.4.0-150700.53.34.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-03-26T13:23:51Z",
"details": "moderate"
}
],
"title": "CVE-2025-71148"
},
{
"cve": "CVE-2025-71182",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-71182"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\ncan: j1939: make j1939_session_activate() fail if device is no longer registered\n\nsyzbot is still reporting\n\n unregister_netdevice: waiting for vcan0 to become free. Usage count = 2\n\neven after commit 93a27b5891b8 (\"can: j1939: add missing calls in\nNETDEV_UNREGISTER notification handler\") was added. A debug printk() patch\nfound that j1939_session_activate() can succeed even after\nj1939_cancel_active_session() from j1939_netdev_notify(NETDEV_UNREGISTER)\nhas completed.\n\nSince j1939_cancel_active_session() is processed with the session list lock\nheld, checking ndev-\u003ereg_state in j1939_session_activate() with the session\nlist lock held can reliably close the race window.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_34-default-1-150700.15.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_34-default-1-150700.15.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_34-default-1-150700.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-devel-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.34.1.150700.17.23.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.34.1.150700.17.23.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.34.1.150700.17.23.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-devel-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-macros-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-zfcpdump-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-docs-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-source-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP7:kernel-default-extra-6.4.0-150700.53.34.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-71182",
"url": "https://www.suse.com/security/cve/CVE-2025-71182"
},
{
"category": "external",
"summary": "SUSE Bug 1257586 for CVE-2025-71182",
"url": "https://bugzilla.suse.com/1257586"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_34-default-1-150700.15.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_34-default-1-150700.15.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_34-default-1-150700.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-devel-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.34.1.150700.17.23.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.34.1.150700.17.23.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.34.1.150700.17.23.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-devel-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-macros-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-zfcpdump-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-docs-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-source-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP7:kernel-default-extra-6.4.0-150700.53.34.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_34-default-1-150700.15.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_34-default-1-150700.15.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_34-default-1-150700.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-devel-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.34.1.150700.17.23.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.34.1.150700.17.23.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.34.1.150700.17.23.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-devel-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-macros-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-zfcpdump-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-docs-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-source-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP7:kernel-default-extra-6.4.0-150700.53.34.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-03-26T13:23:51Z",
"details": "moderate"
}
],
"title": "CVE-2025-71182"
},
{
"cve": "CVE-2025-71184",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-71184"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nbtrfs: fix NULL dereference on root when tracing inode eviction\n\nWhen evicting an inode the first thing we do is to setup tracing for it,\nwhich implies fetching the root\u0027s id. But in btrfs_evict_inode() the\nroot might be NULL, as implied in the next check that we do in\nbtrfs_evict_inode().\n\nHence, we either should set the -\u003eroot_objectid to 0 in case the root is\nNULL, or we move tracing setup after checking that the root is not\nNULL. Setting the rootid to 0 at least gives us the possibility to trace\nthis call even in the case when the root is NULL, so that\u0027s the solution\ntaken here.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_34-default-1-150700.15.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_34-default-1-150700.15.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_34-default-1-150700.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-devel-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.34.1.150700.17.23.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.34.1.150700.17.23.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.34.1.150700.17.23.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-devel-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-macros-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-zfcpdump-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-docs-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-source-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP7:kernel-default-extra-6.4.0-150700.53.34.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-71184",
"url": "https://www.suse.com/security/cve/CVE-2025-71184"
},
{
"category": "external",
"summary": "SUSE Bug 1257635 for CVE-2025-71184",
"url": "https://bugzilla.suse.com/1257635"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_34-default-1-150700.15.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_34-default-1-150700.15.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_34-default-1-150700.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-devel-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.34.1.150700.17.23.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.34.1.150700.17.23.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.34.1.150700.17.23.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-devel-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-macros-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-zfcpdump-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-docs-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-source-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP7:kernel-default-extra-6.4.0-150700.53.34.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_34-default-1-150700.15.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_34-default-1-150700.15.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_34-default-1-150700.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-devel-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.34.1.150700.17.23.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.34.1.150700.17.23.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.34.1.150700.17.23.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-devel-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-macros-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-zfcpdump-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-docs-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-source-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP7:kernel-default-extra-6.4.0-150700.53.34.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-03-26T13:23:51Z",
"details": "moderate"
}
],
"title": "CVE-2025-71184"
},
{
"cve": "CVE-2025-71185",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-71185"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\ndmaengine: ti: dma-crossbar: fix device leak on am335x route allocation\n\nMake sure to drop the reference taken when looking up the crossbar\nplatform device during am335x route allocation.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_34-default-1-150700.15.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_34-default-1-150700.15.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_34-default-1-150700.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-devel-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.34.1.150700.17.23.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.34.1.150700.17.23.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.34.1.150700.17.23.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-devel-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-macros-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-zfcpdump-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-docs-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-source-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP7:kernel-default-extra-6.4.0-150700.53.34.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-71185",
"url": "https://www.suse.com/security/cve/CVE-2025-71185"
},
{
"category": "external",
"summary": "SUSE Bug 1257560 for CVE-2025-71185",
"url": "https://bugzilla.suse.com/1257560"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_34-default-1-150700.15.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_34-default-1-150700.15.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_34-default-1-150700.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-devel-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.34.1.150700.17.23.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.34.1.150700.17.23.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.34.1.150700.17.23.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-devel-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-macros-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-zfcpdump-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-docs-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-source-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP7:kernel-default-extra-6.4.0-150700.53.34.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_34-default-1-150700.15.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_34-default-1-150700.15.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_34-default-1-150700.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-devel-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.34.1.150700.17.23.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.34.1.150700.17.23.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.34.1.150700.17.23.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-devel-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-macros-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-zfcpdump-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-docs-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-source-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP7:kernel-default-extra-6.4.0-150700.53.34.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-03-26T13:23:51Z",
"details": "moderate"
}
],
"title": "CVE-2025-71185"
},
{
"cve": "CVE-2025-71188",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-71188"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\ndmaengine: lpc18xx-dmamux: fix device leak on route allocation\n\nMake sure to drop the reference taken when looking up the DMA mux\nplatform device during route allocation.\n\nNote that holding a reference to a device does not prevent its driver\ndata from going away so there is no point in keeping the reference.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_34-default-1-150700.15.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_34-default-1-150700.15.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_34-default-1-150700.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-devel-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.34.1.150700.17.23.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.34.1.150700.17.23.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.34.1.150700.17.23.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-devel-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-macros-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-zfcpdump-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-docs-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-source-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP7:kernel-default-extra-6.4.0-150700.53.34.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-71188",
"url": "https://www.suse.com/security/cve/CVE-2025-71188"
},
{
"category": "external",
"summary": "SUSE Bug 1257576 for CVE-2025-71188",
"url": "https://bugzilla.suse.com/1257576"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_34-default-1-150700.15.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_34-default-1-150700.15.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_34-default-1-150700.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-devel-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.34.1.150700.17.23.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.34.1.150700.17.23.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.34.1.150700.17.23.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-devel-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-macros-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-zfcpdump-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-docs-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-source-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP7:kernel-default-extra-6.4.0-150700.53.34.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_34-default-1-150700.15.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_34-default-1-150700.15.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_34-default-1-150700.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-devel-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.34.1.150700.17.23.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.34.1.150700.17.23.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.34.1.150700.17.23.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-devel-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-macros-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-zfcpdump-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-docs-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-source-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP7:kernel-default-extra-6.4.0-150700.53.34.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-03-26T13:23:51Z",
"details": "moderate"
}
],
"title": "CVE-2025-71188"
},
{
"cve": "CVE-2025-71189",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-71189"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\ndmaengine: dw: dmamux: fix OF node leak on route allocation failure\n\nMake sure to drop the reference taken to the DMA master OF node also on\nlate route allocation failures.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_34-default-1-150700.15.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_34-default-1-150700.15.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_34-default-1-150700.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-devel-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.34.1.150700.17.23.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.34.1.150700.17.23.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.34.1.150700.17.23.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-devel-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-macros-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-zfcpdump-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-docs-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-source-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP7:kernel-default-extra-6.4.0-150700.53.34.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-71189",
"url": "https://www.suse.com/security/cve/CVE-2025-71189"
},
{
"category": "external",
"summary": "SUSE Bug 1257573 for CVE-2025-71189",
"url": "https://bugzilla.suse.com/1257573"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_34-default-1-150700.15.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_34-default-1-150700.15.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_34-default-1-150700.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-devel-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.34.1.150700.17.23.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.34.1.150700.17.23.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.34.1.150700.17.23.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-devel-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-macros-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-zfcpdump-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-docs-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-source-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP7:kernel-default-extra-6.4.0-150700.53.34.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 3.3,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_34-default-1-150700.15.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_34-default-1-150700.15.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_34-default-1-150700.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-devel-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.34.1.150700.17.23.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.34.1.150700.17.23.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.34.1.150700.17.23.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-devel-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-macros-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-zfcpdump-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-docs-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-source-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP7:kernel-default-extra-6.4.0-150700.53.34.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-03-26T13:23:51Z",
"details": "low"
}
],
"title": "CVE-2025-71189"
},
{
"cve": "CVE-2025-71190",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-71190"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\ndmaengine: bcm-sba-raid: fix device leak on probe\n\nMake sure to drop the reference taken when looking up the mailbox device\nduring probe on probe failures and on driver unbind.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_34-default-1-150700.15.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_34-default-1-150700.15.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_34-default-1-150700.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-devel-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.34.1.150700.17.23.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.34.1.150700.17.23.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.34.1.150700.17.23.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-devel-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-macros-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-zfcpdump-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-docs-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-source-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP7:kernel-default-extra-6.4.0-150700.53.34.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-71190",
"url": "https://www.suse.com/security/cve/CVE-2025-71190"
},
{
"category": "external",
"summary": "SUSE Bug 1257580 for CVE-2025-71190",
"url": "https://bugzilla.suse.com/1257580"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_34-default-1-150700.15.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_34-default-1-150700.15.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_34-default-1-150700.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-devel-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.34.1.150700.17.23.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.34.1.150700.17.23.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.34.1.150700.17.23.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-devel-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-macros-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-zfcpdump-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-docs-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-source-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP7:kernel-default-extra-6.4.0-150700.53.34.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 3.3,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_34-default-1-150700.15.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_34-default-1-150700.15.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_34-default-1-150700.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-devel-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.34.1.150700.17.23.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.34.1.150700.17.23.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.34.1.150700.17.23.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-devel-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-macros-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-zfcpdump-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-docs-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-source-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP7:kernel-default-extra-6.4.0-150700.53.34.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-03-26T13:23:51Z",
"details": "low"
}
],
"title": "CVE-2025-71190"
},
{
"cve": "CVE-2025-71191",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-71191"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\ndmaengine: at_hdmac: fix device leak on of_dma_xlate()\n\nMake sure to drop the reference taken when looking up the DMA platform\ndevice during of_dma_xlate() when releasing channel resources.\n\nNote that commit 3832b78b3ec2 (\"dmaengine: at_hdmac: add missing\nput_device() call in at_dma_xlate()\") fixed the leak in a couple of\nerror paths but the reference is still leaking on successful allocation.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_34-default-1-150700.15.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_34-default-1-150700.15.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_34-default-1-150700.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-devel-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.34.1.150700.17.23.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.34.1.150700.17.23.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.34.1.150700.17.23.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-devel-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-macros-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-zfcpdump-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-docs-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-source-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP7:kernel-default-extra-6.4.0-150700.53.34.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-71191",
"url": "https://www.suse.com/security/cve/CVE-2025-71191"
},
{
"category": "external",
"summary": "SUSE Bug 1257579 for CVE-2025-71191",
"url": "https://bugzilla.suse.com/1257579"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_34-default-1-150700.15.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_34-default-1-150700.15.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_34-default-1-150700.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-devel-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.34.1.150700.17.23.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.34.1.150700.17.23.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.34.1.150700.17.23.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-devel-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-macros-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-zfcpdump-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-docs-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-source-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP7:kernel-default-extra-6.4.0-150700.53.34.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 3.3,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_34-default-1-150700.15.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_34-default-1-150700.15.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_34-default-1-150700.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-devel-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.34.1.150700.17.23.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.34.1.150700.17.23.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.34.1.150700.17.23.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-devel-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-macros-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-zfcpdump-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-docs-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-source-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP7:kernel-default-extra-6.4.0-150700.53.34.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-03-26T13:23:51Z",
"details": "low"
}
],
"title": "CVE-2025-71191"
},
{
"cve": "CVE-2025-71192",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-71192"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nALSA: ac97: fix a double free in snd_ac97_controller_register()\n\nIf ac97_add_adapter() fails, put_device() is the correct way to drop\nthe device reference. kfree() is not required.\nAdd kfree() if idr_alloc() fails and in ac97_adapter_release() to do\nthe cleanup.\n\nFound by code review.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_34-default-1-150700.15.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_34-default-1-150700.15.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_34-default-1-150700.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-devel-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.34.1.150700.17.23.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.34.1.150700.17.23.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.34.1.150700.17.23.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-devel-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-macros-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-zfcpdump-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-docs-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-source-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP7:kernel-default-extra-6.4.0-150700.53.34.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-71192",
"url": "https://www.suse.com/security/cve/CVE-2025-71192"
},
{
"category": "external",
"summary": "SUSE Bug 1257679 for CVE-2025-71192",
"url": "https://bugzilla.suse.com/1257679"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_34-default-1-150700.15.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_34-default-1-150700.15.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_34-default-1-150700.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-devel-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.34.1.150700.17.23.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.34.1.150700.17.23.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.34.1.150700.17.23.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-devel-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-macros-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-zfcpdump-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-docs-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-source-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP7:kernel-default-extra-6.4.0-150700.53.34.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_34-default-1-150700.15.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_34-default-1-150700.15.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_34-default-1-150700.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-devel-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.34.1.150700.17.23.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.34.1.150700.17.23.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.34.1.150700.17.23.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-devel-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-macros-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-zfcpdump-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-docs-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-source-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP7:kernel-default-extra-6.4.0-150700.53.34.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-03-26T13:23:51Z",
"details": "moderate"
}
],
"title": "CVE-2025-71192"
},
{
"cve": "CVE-2025-71194",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-71194"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nbtrfs: fix deadlock in wait_current_trans() due to ignored transaction type\n\nWhen wait_current_trans() is called during start_transaction(), it\ncurrently waits for a blocked transaction without considering whether\nthe given transaction type actually needs to wait for that particular\ntransaction state. The btrfs_blocked_trans_types[] array already defines\nwhich transaction types should wait for which transaction states, but\nthis check was missing in wait_current_trans().\n\nThis can lead to a deadlock scenario involving two transactions and\npending ordered extents:\n\n 1. Transaction A is in TRANS_STATE_COMMIT_DOING state\n\n 2. A worker processing an ordered extent calls start_transaction()\n with TRANS_JOIN\n\n 3. join_transaction() returns -EBUSY because Transaction A is in\n TRANS_STATE_COMMIT_DOING\n\n 4. Transaction A moves to TRANS_STATE_UNBLOCKED and completes\n\n 5. A new Transaction B is created (TRANS_STATE_RUNNING)\n\n 6. The ordered extent from step 2 is added to Transaction B\u0027s\n pending ordered extents\n\n 7. Transaction B immediately starts commit by another task and\n enters TRANS_STATE_COMMIT_START\n\n 8. The worker finally reaches wait_current_trans(), sees Transaction B\n in TRANS_STATE_COMMIT_START (a blocked state), and waits\n unconditionally\n\n 9. However, TRANS_JOIN should NOT wait for TRANS_STATE_COMMIT_START\n according to btrfs_blocked_trans_types[]\n\n 10. Transaction B is waiting for pending ordered extents to complete\n\n 11. Deadlock: Transaction B waits for ordered extent, ordered extent\n waits for Transaction B\n\nThis can be illustrated by the following call stacks:\n CPU0 CPU1\n btrfs_finish_ordered_io()\n start_transaction(TRANS_JOIN)\n join_transaction()\n # -EBUSY (Transaction A is\n # TRANS_STATE_COMMIT_DOING)\n # Transaction A completes\n # Transaction B created\n # ordered extent added to\n # Transaction B\u0027s pending list\n btrfs_commit_transaction()\n # Transaction B enters\n # TRANS_STATE_COMMIT_START\n # waiting for pending ordered\n # extents\n wait_current_trans()\n # waits for Transaction B\n # (should not wait!)\n\nTask bstore_kv_sync in btrfs_commit_transaction waiting for ordered\nextents:\n\n __schedule+0x2e7/0x8a0\n schedule+0x64/0xe0\n btrfs_commit_transaction+0xbf7/0xda0 [btrfs]\n btrfs_sync_file+0x342/0x4d0 [btrfs]\n __x64_sys_fdatasync+0x4b/0x80\n do_syscall_64+0x33/0x40\n entry_SYSCALL_64_after_hwframe+0x44/0xa9\n\nTask kworker in wait_current_trans waiting for transaction commit:\n\n Workqueue: btrfs-syno_nocow btrfs_work_helper [btrfs]\n __schedule+0x2e7/0x8a0\n schedule+0x64/0xe0\n wait_current_trans+0xb0/0x110 [btrfs]\n start_transaction+0x346/0x5b0 [btrfs]\n btrfs_finish_ordered_io.isra.0+0x49b/0x9c0 [btrfs]\n btrfs_work_helper+0xe8/0x350 [btrfs]\n process_one_work+0x1d3/0x3c0\n worker_thread+0x4d/0x3e0\n kthread+0x12d/0x150\n ret_from_fork+0x1f/0x30\n\nFix this by passing the transaction type to wait_current_trans() and\nchecking btrfs_blocked_trans_types[cur_trans-\u003estate] against the given\ntype before deciding to wait. This ensures that transaction types which\nare allowed to join during certain blocked states will not unnecessarily\nwait and cause deadlocks.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_34-default-1-150700.15.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_34-default-1-150700.15.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_34-default-1-150700.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-devel-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.34.1.150700.17.23.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.34.1.150700.17.23.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.34.1.150700.17.23.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-devel-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-macros-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-zfcpdump-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-docs-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-source-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP7:kernel-default-extra-6.4.0-150700.53.34.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-71194",
"url": "https://www.suse.com/security/cve/CVE-2025-71194"
},
{
"category": "external",
"summary": "SUSE Bug 1257687 for CVE-2025-71194",
"url": "https://bugzilla.suse.com/1257687"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_34-default-1-150700.15.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_34-default-1-150700.15.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_34-default-1-150700.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-devel-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.34.1.150700.17.23.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.34.1.150700.17.23.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.34.1.150700.17.23.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-devel-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-macros-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-zfcpdump-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-docs-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-source-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP7:kernel-default-extra-6.4.0-150700.53.34.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.7,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_34-default-1-150700.15.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_34-default-1-150700.15.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_34-default-1-150700.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-devel-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.34.1.150700.17.23.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.34.1.150700.17.23.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.34.1.150700.17.23.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-devel-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-macros-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-zfcpdump-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-docs-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-source-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP7:kernel-default-extra-6.4.0-150700.53.34.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-03-26T13:23:51Z",
"details": "moderate"
}
],
"title": "CVE-2025-71194"
},
{
"cve": "CVE-2025-71195",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-71195"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\ndmaengine: xilinx: xdma: Fix regmap max_register\n\nThe max_register field is assigned the size of the register memory\nregion instead of the offset of the last register.\nThe result is that reading from the regmap via debugfs can cause\na segmentation fault:\n\ntail /sys/kernel/debug/regmap/xdma.1.auto/registers\nUnable to handle kernel paging request at virtual address ffff800082f70000\nMem abort info:\n ESR = 0x0000000096000007\n EC = 0x25: DABT (current EL), IL = 32 bits\n SET = 0, FnV = 0\n EA = 0, S1PTW = 0\n FSC = 0x07: level 3 translation fault\n[...]\nCall trace:\n regmap_mmio_read32le+0x10/0x30\n _regmap_bus_reg_read+0x74/0xc0\n _regmap_read+0x68/0x198\n regmap_read+0x54/0x88\n regmap_read_debugfs+0x140/0x380\n regmap_map_read_file+0x30/0x48\n full_proxy_read+0x68/0xc8\n vfs_read+0xcc/0x310\n ksys_read+0x7c/0x120\n __arm64_sys_read+0x24/0x40\n invoke_syscall.constprop.0+0x64/0x108\n do_el0_svc+0xb0/0xd8\n el0_svc+0x38/0x130\n el0t_64_sync_handler+0x120/0x138\n el0t_64_sync+0x194/0x198\nCode: aa1e03e9 d503201f f9400000 8b214000 (b9400000)\n---[ end trace 0000000000000000 ]---\nnote: tail[1217] exited with irqs disabled\nnote: tail[1217] exited with preempt_count 1\nSegmentation fault",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_34-default-1-150700.15.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_34-default-1-150700.15.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_34-default-1-150700.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-devel-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.34.1.150700.17.23.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.34.1.150700.17.23.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.34.1.150700.17.23.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-devel-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-macros-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-zfcpdump-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-docs-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-source-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP7:kernel-default-extra-6.4.0-150700.53.34.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-71195",
"url": "https://www.suse.com/security/cve/CVE-2025-71195"
},
{
"category": "external",
"summary": "SUSE Bug 1257704 for CVE-2025-71195",
"url": "https://bugzilla.suse.com/1257704"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_34-default-1-150700.15.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_34-default-1-150700.15.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_34-default-1-150700.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-devel-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.34.1.150700.17.23.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.34.1.150700.17.23.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.34.1.150700.17.23.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-devel-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-macros-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-zfcpdump-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-docs-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-source-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP7:kernel-default-extra-6.4.0-150700.53.34.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_34-default-1-150700.15.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_34-default-1-150700.15.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_34-default-1-150700.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-devel-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.34.1.150700.17.23.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.34.1.150700.17.23.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.34.1.150700.17.23.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-devel-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-macros-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-zfcpdump-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-docs-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-source-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP7:kernel-default-extra-6.4.0-150700.53.34.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-03-26T13:23:51Z",
"details": "moderate"
}
],
"title": "CVE-2025-71195"
},
{
"cve": "CVE-2025-71196",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-71196"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nphy: stm32-usphyc: Fix off by one in probe()\n\nThe \"index\" variable is used as an index into the usbphyc-\u003ephys[] array\nwhich has usbphyc-\u003enphys elements. So if it is equal to usbphyc-\u003enphys\nthen it is one element out of bounds. The \"index\" comes from the\ndevice tree so it\u0027s data that we trust and it\u0027s unlikely to be wrong,\nhowever it\u0027s obviously still worth fixing the bug. Change the \u003e to \u003e=.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_34-default-1-150700.15.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_34-default-1-150700.15.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_34-default-1-150700.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-devel-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.34.1.150700.17.23.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.34.1.150700.17.23.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.34.1.150700.17.23.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-devel-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-macros-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-zfcpdump-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-docs-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-source-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP7:kernel-default-extra-6.4.0-150700.53.34.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-71196",
"url": "https://www.suse.com/security/cve/CVE-2025-71196"
},
{
"category": "external",
"summary": "SUSE Bug 1257716 for CVE-2025-71196",
"url": "https://bugzilla.suse.com/1257716"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_34-default-1-150700.15.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_34-default-1-150700.15.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_34-default-1-150700.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-devel-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.34.1.150700.17.23.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.34.1.150700.17.23.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.34.1.150700.17.23.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-devel-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-macros-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-zfcpdump-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-docs-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-source-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP7:kernel-default-extra-6.4.0-150700.53.34.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_34-default-1-150700.15.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_34-default-1-150700.15.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_34-default-1-150700.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-devel-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.34.1.150700.17.23.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.34.1.150700.17.23.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.34.1.150700.17.23.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-devel-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-macros-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-zfcpdump-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-docs-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-source-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP7:kernel-default-extra-6.4.0-150700.53.34.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-03-26T13:23:51Z",
"details": "moderate"
}
],
"title": "CVE-2025-71196"
},
{
"cve": "CVE-2025-71197",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-71197"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nw1: therm: Fix off-by-one buffer overflow in alarms_store\n\nThe sysfs buffer passed to alarms_store() is allocated with \u0027size + 1\u0027\nbytes and a NUL terminator is appended. However, the \u0027size\u0027 argument\ndoes not account for this extra byte. The original code then allocated\n\u0027size\u0027 bytes and used strcpy() to copy \u0027buf\u0027, which always writes one\nbyte past the allocated buffer since strcpy() copies until the NUL\nterminator at index \u0027size\u0027.\n\nFix this by parsing the \u0027buf\u0027 parameter directly using simple_strtoll()\nwithout allocating any intermediate memory or string copying. This\nremoves the overflow while simplifying the code.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_34-default-1-150700.15.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_34-default-1-150700.15.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_34-default-1-150700.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-devel-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.34.1.150700.17.23.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.34.1.150700.17.23.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.34.1.150700.17.23.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-devel-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-macros-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-zfcpdump-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-docs-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-source-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP7:kernel-default-extra-6.4.0-150700.53.34.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-71197",
"url": "https://www.suse.com/security/cve/CVE-2025-71197"
},
{
"category": "external",
"summary": "SUSE Bug 1257743 for CVE-2025-71197",
"url": "https://bugzilla.suse.com/1257743"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_34-default-1-150700.15.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_34-default-1-150700.15.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_34-default-1-150700.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-devel-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.34.1.150700.17.23.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.34.1.150700.17.23.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.34.1.150700.17.23.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-devel-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-macros-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-zfcpdump-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-docs-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-source-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP7:kernel-default-extra-6.4.0-150700.53.34.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.1,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_34-default-1-150700.15.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_34-default-1-150700.15.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_34-default-1-150700.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-devel-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.34.1.150700.17.23.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.34.1.150700.17.23.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.34.1.150700.17.23.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-devel-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-macros-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-zfcpdump-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-docs-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-source-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP7:kernel-default-extra-6.4.0-150700.53.34.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-03-26T13:23:51Z",
"details": "moderate"
}
],
"title": "CVE-2025-71197"
},
{
"cve": "CVE-2025-71198",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-71198"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\niio: imu: st_lsm6dsx: fix iio_chan_spec for sensors without event detection\n\nThe st_lsm6dsx_acc_channels array of struct iio_chan_spec has a non-NULL\nevent_spec field, indicating support for IIO events. However, event\ndetection is not supported for all sensors, and if userspace tries to\nconfigure accelerometer wakeup events on a sensor device that does not\nsupport them (e.g. LSM6DS0), st_lsm6dsx_write_event() dereferences a NULL\npointer when trying to write to the wakeup register.\nDefine an additional struct iio_chan_spec array whose members have a NULL\nevent_spec field, and use this array instead of st_lsm6dsx_acc_channels for\nsensors without event detection capability.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_34-default-1-150700.15.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_34-default-1-150700.15.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_34-default-1-150700.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-devel-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.34.1.150700.17.23.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.34.1.150700.17.23.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.34.1.150700.17.23.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-devel-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-macros-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-zfcpdump-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-docs-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-source-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP7:kernel-default-extra-6.4.0-150700.53.34.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-71198",
"url": "https://www.suse.com/security/cve/CVE-2025-71198"
},
{
"category": "external",
"summary": "SUSE Bug 1257741 for CVE-2025-71198",
"url": "https://bugzilla.suse.com/1257741"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_34-default-1-150700.15.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_34-default-1-150700.15.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_34-default-1-150700.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-devel-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.34.1.150700.17.23.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.34.1.150700.17.23.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.34.1.150700.17.23.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-devel-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-macros-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-zfcpdump-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-docs-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-source-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP7:kernel-default-extra-6.4.0-150700.53.34.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_34-default-1-150700.15.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_34-default-1-150700.15.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_34-default-1-150700.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-devel-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.34.1.150700.17.23.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.34.1.150700.17.23.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.34.1.150700.17.23.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-devel-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-macros-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-zfcpdump-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-docs-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-source-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP7:kernel-default-extra-6.4.0-150700.53.34.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-03-26T13:23:51Z",
"details": "moderate"
}
],
"title": "CVE-2025-71198"
},
{
"cve": "CVE-2025-71199",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-71199"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\niio: adc: at91-sama5d2_adc: Fix potential use-after-free in sama5d2_adc driver\n\nat91_adc_interrupt can call at91_adc_touch_data_handler function\nto start the work by schedule_work(\u0026st-\u003etouch_st.workq).\n\nIf we remove the module which will call at91_adc_remove to\nmake cleanup, it will free indio_dev through iio_device_unregister but\nquite a bit later. While the work mentioned above will be used. The\nsequence of operations that may lead to a UAF bug is as follows:\n\nCPU0 CPU1\n\n | at91_adc_workq_handler\nat91_adc_remove |\niio_device_unregister(indio_dev) |\n//free indio_dev a bit later |\n | iio_push_to_buffers(indio_dev)\n | //use indio_dev\n\nFix it by ensuring that the work is canceled before proceeding with\nthe cleanup in at91_adc_remove.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_34-default-1-150700.15.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_34-default-1-150700.15.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_34-default-1-150700.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-devel-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.34.1.150700.17.23.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.34.1.150700.17.23.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.34.1.150700.17.23.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-devel-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-macros-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-zfcpdump-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-docs-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-source-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP7:kernel-default-extra-6.4.0-150700.53.34.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-71199",
"url": "https://www.suse.com/security/cve/CVE-2025-71199"
},
{
"category": "external",
"summary": "SUSE Bug 1257750 for CVE-2025-71199",
"url": "https://bugzilla.suse.com/1257750"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_34-default-1-150700.15.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_34-default-1-150700.15.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_34-default-1-150700.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-devel-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.34.1.150700.17.23.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.34.1.150700.17.23.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.34.1.150700.17.23.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-devel-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-macros-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-zfcpdump-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-docs-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-source-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP7:kernel-default-extra-6.4.0-150700.53.34.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_34-default-1-150700.15.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_34-default-1-150700.15.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_34-default-1-150700.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-devel-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.34.1.150700.17.23.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.34.1.150700.17.23.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.34.1.150700.17.23.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-devel-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-macros-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-zfcpdump-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-docs-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-source-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP7:kernel-default-extra-6.4.0-150700.53.34.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-03-26T13:23:51Z",
"details": "moderate"
}
],
"title": "CVE-2025-71199"
},
{
"cve": "CVE-2025-71200",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-71200"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nmmc: sdhci-of-dwcmshc: Prevent illegal clock reduction in HS200/HS400 mode\n\nWhen operating in HS200 or HS400 timing modes, reducing the clock frequency\nbelow 52MHz will lead to link broken as the Rockchip DWC MSHC controller\nrequires maintaining a minimum clock of 52MHz in these modes.\n\nAdd a check to prevent illegal clock reduction through debugfs:\n\nroot@debian:/# echo 50000000 \u003e /sys/kernel/debug/mmc0/clock\nroot@debian:/# [ 30.090146] mmc0: running CQE recovery\nmmc0: cqhci: Failed to halt\nmmc0: cqhci: spurious TCN for tag 0\nWARNING: drivers/mmc/host/cqhci-core.c:797 at cqhci_irq+0x254/0x818, CPU#1: kworker/1:0H/24\nModules linked in:\nCPU: 1 UID: 0 PID: 24 Comm: kworker/1:0H Not tainted 6.19.0-rc1-00001-g09db0998649d-dirty #204 PREEMPT\nHardware name: Rockchip RK3588 EVB1 V10 Board (DT)\nWorkqueue: kblockd blk_mq_run_work_fn\npstate: 604000c9 (nZCv daIF +PAN -UAO -TCO -DIT -SSBS BTYPE=--)\npc : cqhci_irq+0x254/0x818\nlr : cqhci_irq+0x254/0x818\n...",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_34-default-1-150700.15.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_34-default-1-150700.15.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_34-default-1-150700.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-devel-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.34.1.150700.17.23.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.34.1.150700.17.23.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.34.1.150700.17.23.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-devel-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-macros-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-zfcpdump-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-docs-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-source-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP7:kernel-default-extra-6.4.0-150700.53.34.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-71200",
"url": "https://www.suse.com/security/cve/CVE-2025-71200"
},
{
"category": "external",
"summary": "SUSE Bug 1258222 for CVE-2025-71200",
"url": "https://bugzilla.suse.com/1258222"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_34-default-1-150700.15.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_34-default-1-150700.15.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_34-default-1-150700.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-devel-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.34.1.150700.17.23.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.34.1.150700.17.23.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.34.1.150700.17.23.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-devel-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-macros-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-zfcpdump-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-docs-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-source-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP7:kernel-default-extra-6.4.0-150700.53.34.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_34-default-1-150700.15.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_34-default-1-150700.15.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_34-default-1-150700.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-devel-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.34.1.150700.17.23.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.34.1.150700.17.23.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.34.1.150700.17.23.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-devel-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-macros-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-zfcpdump-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-docs-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-source-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP7:kernel-default-extra-6.4.0-150700.53.34.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-03-26T13:23:51Z",
"details": "moderate"
}
],
"title": "CVE-2025-71200"
},
{
"cve": "CVE-2025-71222",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-71222"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nwifi: wlcore: ensure skb headroom before skb_push\n\nThis avoids occasional skb_under_panic Oops from wl1271_tx_work. In this case, headroom is\nless than needed (typically 110 - 94 = 16 bytes).",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_34-default-1-150700.15.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_34-default-1-150700.15.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_34-default-1-150700.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-devel-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.34.1.150700.17.23.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.34.1.150700.17.23.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.34.1.150700.17.23.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-devel-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-macros-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-zfcpdump-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-docs-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-source-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP7:kernel-default-extra-6.4.0-150700.53.34.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-71222",
"url": "https://www.suse.com/security/cve/CVE-2025-71222"
},
{
"category": "external",
"summary": "SUSE Bug 1258279 for CVE-2025-71222",
"url": "https://bugzilla.suse.com/1258279"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_34-default-1-150700.15.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_34-default-1-150700.15.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_34-default-1-150700.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-devel-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.34.1.150700.17.23.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.34.1.150700.17.23.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.34.1.150700.17.23.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-devel-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-macros-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-zfcpdump-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-docs-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-source-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP7:kernel-default-extra-6.4.0-150700.53.34.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_34-default-1-150700.15.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_34-default-1-150700.15.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_34-default-1-150700.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-devel-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.34.1.150700.17.23.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.34.1.150700.17.23.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.34.1.150700.17.23.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-devel-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-macros-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-zfcpdump-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-docs-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-source-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP7:kernel-default-extra-6.4.0-150700.53.34.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-03-26T13:23:51Z",
"details": "moderate"
}
],
"title": "CVE-2025-71222"
},
{
"cve": "CVE-2025-71224",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-71224"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nwifi: mac80211: ocb: skip rx_no_sta when interface is not joined\n\nieee80211_ocb_rx_no_sta() assumes a valid channel context, which is only\npresent after JOIN_OCB.\n\nRX may run before JOIN_OCB is executed, in which case the OCB interface\nis not operational. Skip RX peer handling when the interface is not\njoined to avoid warnings in the RX path.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_34-default-1-150700.15.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_34-default-1-150700.15.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_34-default-1-150700.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-devel-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.34.1.150700.17.23.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.34.1.150700.17.23.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.34.1.150700.17.23.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-devel-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-macros-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-zfcpdump-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-docs-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-source-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP7:kernel-default-extra-6.4.0-150700.53.34.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-71224",
"url": "https://www.suse.com/security/cve/CVE-2025-71224"
},
{
"category": "external",
"summary": "SUSE Bug 1258824 for CVE-2025-71224",
"url": "https://bugzilla.suse.com/1258824"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_34-default-1-150700.15.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_34-default-1-150700.15.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_34-default-1-150700.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-devel-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.34.1.150700.17.23.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.34.1.150700.17.23.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.34.1.150700.17.23.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-devel-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-macros-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-zfcpdump-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-docs-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-source-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP7:kernel-default-extra-6.4.0-150700.53.34.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_34-default-1-150700.15.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_34-default-1-150700.15.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_34-default-1-150700.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-devel-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.34.1.150700.17.23.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.34.1.150700.17.23.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.34.1.150700.17.23.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-devel-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-macros-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-zfcpdump-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-docs-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-source-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP7:kernel-default-extra-6.4.0-150700.53.34.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-03-26T13:23:51Z",
"details": "moderate"
}
],
"title": "CVE-2025-71224"
},
{
"cve": "CVE-2025-71225",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-71225"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nmd: suspend array while updating raid_disks via sysfs\n\nIn raid1_reshape(), freeze_array() is called before modifying the r1bio\nmemory pool (conf-\u003er1bio_pool) and conf-\u003eraid_disks, and\nunfreeze_array() is called after the update is completed.\n\nHowever, freeze_array() only waits until nr_sync_pending and\n(nr_pending - nr_queued) of all buckets reaches zero. When an I/O error\noccurs, nr_queued is increased and the corresponding r1bio is queued to\neither retry_list or bio_end_io_list. As a result, freeze_array() may\nunblock before these r1bios are released.\n\nThis can lead to a situation where conf-\u003eraid_disks and the mempool have\nalready been updated while queued r1bios, allocated with the old\nraid_disks value, are later released. Consequently, free_r1bio() may\naccess memory out of bounds in put_all_bios() and release r1bios of the\nwrong size to the new mempool, potentially causing issues with the\nmempool as well.\n\nSince only normal I/O might increase nr_queued while an I/O error occurs,\nsuspending the array avoids this issue.\n\nNote: Updating raid_disks via ioctl SET_ARRAY_INFO already suspends\nthe array. Therefore, we suspend the array when updating raid_disks\nvia sysfs to avoid this issue too.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_34-default-1-150700.15.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_34-default-1-150700.15.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_34-default-1-150700.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-devel-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.34.1.150700.17.23.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.34.1.150700.17.23.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.34.1.150700.17.23.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-devel-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-macros-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-zfcpdump-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-docs-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-source-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP7:kernel-default-extra-6.4.0-150700.53.34.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-71225",
"url": "https://www.suse.com/security/cve/CVE-2025-71225"
},
{
"category": "external",
"summary": "SUSE Bug 1258411 for CVE-2025-71225",
"url": "https://bugzilla.suse.com/1258411"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_34-default-1-150700.15.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_34-default-1-150700.15.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_34-default-1-150700.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-devel-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.34.1.150700.17.23.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.34.1.150700.17.23.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.34.1.150700.17.23.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-devel-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-macros-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-zfcpdump-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-docs-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-source-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP7:kernel-default-extra-6.4.0-150700.53.34.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_34-default-1-150700.15.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_34-default-1-150700.15.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_34-default-1-150700.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-devel-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.34.1.150700.17.23.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.34.1.150700.17.23.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.34.1.150700.17.23.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-devel-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-macros-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-zfcpdump-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-docs-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-source-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP7:kernel-default-extra-6.4.0-150700.53.34.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-03-26T13:23:51Z",
"details": "moderate"
}
],
"title": "CVE-2025-71225"
},
{
"cve": "CVE-2025-71229",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-71229"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nwifi: rtw88: Fix alignment fault in rtw_core_enable_beacon()\n\nrtw_core_enable_beacon() reads 4 bytes from an address that is not a\nmultiple of 4. This results in a crash on some systems.\n\nDo 1 byte reads/writes instead.\n\nUnable to handle kernel paging request at virtual address ffff8000827e0522\nMem abort info:\n ESR = 0x0000000096000021\n EC = 0x25: DABT (current EL), IL = 32 bits\n SET = 0, FnV = 0\n EA = 0, S1PTW = 0\n FSC = 0x21: alignment fault\nData abort info:\n ISV = 0, ISS = 0x00000021, ISS2 = 0x00000000\n CM = 0, WnR = 0, TnD = 0, TagAccess = 0\n GCS = 0, Overlay = 0, DirtyBit = 0, Xs = 0\nswapper pgtable: 4k pages, 48-bit VAs, pgdp=0000000005492000\n[ffff8000827e0522] pgd=0000000000000000, p4d=10000001021d9403, pud=10000001021da403, pmd=100000011061c403, pte=00780000f3200f13\nInternal error: Oops: 0000000096000021 [#1] SMP\nModules linked in: [...] rtw88_8822ce rtw88_8822c rtw88_pci rtw88_core [...]\nCPU: 0 UID: 0 PID: 73 Comm: kworker/u32:2 Tainted: G W 6.17.9 #1-NixOS VOLUNTARY\nTainted: [W]=WARN\nHardware name: FriendlyElec NanoPC-T6 LTS (DT)\nWorkqueue: phy0 rtw_c2h_work [rtw88_core]\npstate: 60400009 (nZCv daif +PAN -UAO -TCO -DIT -SSBS BTYPE=--)\npc : rtw_pci_read32+0x18/0x40 [rtw88_pci]\nlr : rtw_core_enable_beacon+0xe0/0x148 [rtw88_core]\nsp : ffff800080cc3ca0\nx29: ffff800080cc3ca0 x28: ffff0001031fc240 x27: ffff000102100828\nx26: ffffd2cb7c9b4088 x25: ffff0001031fc2c0 x24: ffff000112fdef00\nx23: ffff000112fdef18 x22: ffff000111c29970 x21: 0000000000000001\nx20: 0000000000000001 x19: ffff000111c22040 x18: 0000000000000000\nx17: 0000000000000000 x16: 0000000000000000 x15: 0000000000000000\nx14: 0000000000000000 x13: 0000000000000000 x12: 0000000000000000\nx11: 0000000000000000 x10: 0000000000000000 x9 : ffffd2cb6507c090\nx8 : 0000000000000000 x7 : 0000000000000000 x6 : 0000000000000000\nx5 : 0000000000000000 x4 : 0000000000000000 x3 : 0000000000000000\nx2 : 0000000000007f10 x1 : 0000000000000522 x0 : ffff8000827e0522\nCall trace:\n rtw_pci_read32+0x18/0x40 [rtw88_pci] (P)\n rtw_hw_scan_chan_switch+0x124/0x1a8 [rtw88_core]\n rtw_fw_c2h_cmd_handle+0x254/0x290 [rtw88_core]\n rtw_c2h_work+0x50/0x98 [rtw88_core]\n process_one_work+0x178/0x3f8\n worker_thread+0x208/0x418\n kthread+0x120/0x220\n ret_from_fork+0x10/0x20\nCode: d28fe202 8b020000 f9524400 8b214000 (b9400000)\n---[ end trace 0000000000000000 ]---",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_34-default-1-150700.15.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_34-default-1-150700.15.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_34-default-1-150700.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-devel-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.34.1.150700.17.23.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.34.1.150700.17.23.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.34.1.150700.17.23.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-devel-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-macros-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-zfcpdump-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-docs-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-source-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP7:kernel-default-extra-6.4.0-150700.53.34.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-71229",
"url": "https://www.suse.com/security/cve/CVE-2025-71229"
},
{
"category": "external",
"summary": "SUSE Bug 1258415 for CVE-2025-71229",
"url": "https://bugzilla.suse.com/1258415"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_34-default-1-150700.15.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_34-default-1-150700.15.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_34-default-1-150700.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-devel-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.34.1.150700.17.23.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.34.1.150700.17.23.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.34.1.150700.17.23.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-devel-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-macros-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-zfcpdump-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-docs-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-source-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP7:kernel-default-extra-6.4.0-150700.53.34.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_34-default-1-150700.15.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_34-default-1-150700.15.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_34-default-1-150700.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-devel-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.34.1.150700.17.23.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.34.1.150700.17.23.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.34.1.150700.17.23.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-devel-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-macros-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-zfcpdump-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-docs-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-source-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP7:kernel-default-extra-6.4.0-150700.53.34.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-03-26T13:23:51Z",
"details": "moderate"
}
],
"title": "CVE-2025-71229"
},
{
"cve": "CVE-2025-71231",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-71231"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\ncrypto: iaa - Fix out-of-bounds index in find_empty_iaa_compression_mode\n\nThe local variable \u0027i\u0027 is initialized with -EINVAL, but the for loop\nimmediately overwrites it and -EINVAL is never returned.\n\nIf no empty compression mode can be found, the function would return the\nout-of-bounds index IAA_COMP_MODES_MAX, which would cause an invalid\narray access in add_iaa_compression_mode().\n\nFix both issues by returning either a valid index or -EINVAL.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_34-default-1-150700.15.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_34-default-1-150700.15.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_34-default-1-150700.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-devel-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.34.1.150700.17.23.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.34.1.150700.17.23.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.34.1.150700.17.23.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-devel-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-macros-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-zfcpdump-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-docs-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-source-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP7:kernel-default-extra-6.4.0-150700.53.34.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-71231",
"url": "https://www.suse.com/security/cve/CVE-2025-71231"
},
{
"category": "external",
"summary": "SUSE Bug 1258424 for CVE-2025-71231",
"url": "https://bugzilla.suse.com/1258424"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_34-default-1-150700.15.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_34-default-1-150700.15.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_34-default-1-150700.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-devel-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.34.1.150700.17.23.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.34.1.150700.17.23.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.34.1.150700.17.23.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-devel-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-macros-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-zfcpdump-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-docs-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-source-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP7:kernel-default-extra-6.4.0-150700.53.34.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_34-default-1-150700.15.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_34-default-1-150700.15.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_34-default-1-150700.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-devel-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.34.1.150700.17.23.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.34.1.150700.17.23.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.34.1.150700.17.23.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-devel-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-macros-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-zfcpdump-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-docs-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-source-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP7:kernel-default-extra-6.4.0-150700.53.34.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-03-26T13:23:51Z",
"details": "important"
}
],
"title": "CVE-2025-71231"
},
{
"cve": "CVE-2025-71232",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-71232"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nscsi: qla2xxx: Free sp in error path to fix system crash\n\nSystem crash seen during load/unload test in a loop,\n\n[61110.449331] qla2xxx [0000:27:00.0]-0042:0: Disabled MSI-X.\n[61110.467494] =============================================================================\n[61110.467498] BUG qla2xxx_srbs (Tainted: G OE -------- --- ): Objects remaining in qla2xxx_srbs on __kmem_cache_shutdown()\n[61110.467501] -----------------------------------------------------------------------------\n\n[61110.467502] Slab 0x000000000ffc8162 objects=51 used=1 fp=0x00000000e25d3d85 flags=0x57ffffc0010200(slab|head|node=1|zone=2|lastcpupid=0x1fffff)\n[61110.467509] CPU: 53 PID: 455206 Comm: rmmod Kdump: loaded Tainted: G OE -------- --- 5.14.0-284.11.1.el9_2.x86_64 #1\n[61110.467513] Hardware name: HPE ProLiant DL385 Gen10 Plus v2/ProLiant DL385 Gen10 Plus v2, BIOS A42 08/17/2023\n[61110.467515] Call Trace:\n[61110.467516] \u003cTASK\u003e\n[61110.467519] dump_stack_lvl+0x34/0x48\n[61110.467526] slab_err.cold+0x53/0x67\n[61110.467534] __kmem_cache_shutdown+0x16e/0x320\n[61110.467540] kmem_cache_destroy+0x51/0x160\n[61110.467544] qla2x00_module_exit+0x93/0x99 [qla2xxx]\n[61110.467607] ? __do_sys_delete_module.constprop.0+0x178/0x280\n[61110.467613] ? syscall_trace_enter.constprop.0+0x145/0x1d0\n[61110.467616] ? do_syscall_64+0x5c/0x90\n[61110.467619] ? exc_page_fault+0x62/0x150\n[61110.467622] ? entry_SYSCALL_64_after_hwframe+0x63/0xcd\n[61110.467626] \u003c/TASK\u003e\n[61110.467627] Disabling lock debugging due to kernel taint\n[61110.467635] Object 0x0000000026f7e6e6 @offset=16000\n[61110.467639] ------------[ cut here ]------------\n[61110.467639] kmem_cache_destroy qla2xxx_srbs: Slab cache still has objects when called from qla2x00_module_exit+0x93/0x99 [qla2xxx]\n[61110.467659] WARNING: CPU: 53 PID: 455206 at mm/slab_common.c:520 kmem_cache_destroy+0x14d/0x160\n[61110.467718] CPU: 53 PID: 455206 Comm: rmmod Kdump: loaded Tainted: G B OE -------- --- 5.14.0-284.11.1.el9_2.x86_64 #1\n[61110.467720] Hardware name: HPE ProLiant DL385 Gen10 Plus v2/ProLiant DL385 Gen10 Plus v2, BIOS A42 08/17/2023\n[61110.467721] RIP: 0010:kmem_cache_destroy+0x14d/0x160\n[61110.467724] Code: 99 7d 07 00 48 89 ef e8 e1 6a 07 00 eb b3 48 8b 55 60 48 8b 4c 24 20 48 c7 c6 70 fc 66 90 48 c7 c7 f8 ef a1 90 e8 e1 ed 7c 00 \u003c0f\u003e 0b eb 93 c3 cc cc cc cc 66 2e 0f 1f 84 00 00 00 00 00 55 48 89\n[61110.467725] RSP: 0018:ffffa304e489fe80 EFLAGS: 00010282\n[61110.467727] RAX: 0000000000000000 RBX: ffffffffc0d9a860 RCX: 0000000000000027\n[61110.467729] RDX: ffff8fd5ff9598a8 RSI: 0000000000000001 RDI: ffff8fd5ff9598a0\n[61110.467730] RBP: ffff8fb6aaf78700 R08: 0000000000000000 R09: 0000000100d863b7\n[61110.467731] R10: ffffa304e489fd20 R11: ffffffff913bef48 R12: 0000000040002000\n[61110.467731] R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000000\n[61110.467733] FS: 00007f64c89fb740(0000) GS:ffff8fd5ff940000(0000) knlGS:0000000000000000\n[61110.467734] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033\n[61110.467735] CR2: 00007f0f02bfe000 CR3: 00000020ad6dc005 CR4: 0000000000770ee0\n[61110.467736] PKRU: 55555554\n[61110.467737] Call Trace:\n[61110.467738] \u003cTASK\u003e\n[61110.467739] qla2x00_module_exit+0x93/0x99 [qla2xxx]\n[61110.467755] ? __do_sys_delete_module.constprop.0+0x178/0x280\n\nFree sp in the error path to fix the crash.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_34-default-1-150700.15.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_34-default-1-150700.15.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_34-default-1-150700.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-devel-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.34.1.150700.17.23.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.34.1.150700.17.23.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.34.1.150700.17.23.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-devel-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-macros-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-zfcpdump-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-docs-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-source-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP7:kernel-default-extra-6.4.0-150700.53.34.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-71232",
"url": "https://www.suse.com/security/cve/CVE-2025-71232"
},
{
"category": "external",
"summary": "SUSE Bug 1258422 for CVE-2025-71232",
"url": "https://bugzilla.suse.com/1258422"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_34-default-1-150700.15.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_34-default-1-150700.15.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_34-default-1-150700.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-devel-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.34.1.150700.17.23.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.34.1.150700.17.23.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.34.1.150700.17.23.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-devel-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-macros-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-zfcpdump-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-docs-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-source-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP7:kernel-default-extra-6.4.0-150700.53.34.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_34-default-1-150700.15.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_34-default-1-150700.15.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_34-default-1-150700.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-devel-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.34.1.150700.17.23.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.34.1.150700.17.23.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.34.1.150700.17.23.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-devel-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-macros-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-zfcpdump-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-docs-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-source-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP7:kernel-default-extra-6.4.0-150700.53.34.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-03-26T13:23:51Z",
"details": "moderate"
}
],
"title": "CVE-2025-71232"
},
{
"cve": "CVE-2025-71234",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-71234"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nwifi: rtl8xxxu: fix slab-out-of-bounds in rtl8xxxu_sta_add\n\nThe driver does not set hw-\u003esta_data_size, which causes mac80211 to\nallocate insufficient space for driver private station data in\n__sta_info_alloc(). When rtl8xxxu_sta_add() accesses members of\nstruct rtl8xxxu_sta_info through sta-\u003edrv_priv, this results in a\nslab-out-of-bounds write.\n\nKASAN report on RISC-V (VisionFive 2) with RTL8192EU adapter:\n\n BUG: KASAN: slab-out-of-bounds in rtl8xxxu_sta_add+0x31c/0x346\n Write of size 8 at addr ffffffd6d3e9ae88 by task kworker/u16:0/12\n\nSet hw-\u003esta_data_size to sizeof(struct rtl8xxxu_sta_info) during\nprobe, similar to how hw-\u003evif_data_size is configured. This ensures\nmac80211 allocates sufficient space for the driver\u0027s per-station\nprivate data.\n\nTested on StarFive VisionFive 2 v1.2A board.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_34-default-1-150700.15.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_34-default-1-150700.15.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_34-default-1-150700.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-devel-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.34.1.150700.17.23.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.34.1.150700.17.23.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.34.1.150700.17.23.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-devel-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-macros-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-zfcpdump-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-docs-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-source-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP7:kernel-default-extra-6.4.0-150700.53.34.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-71234",
"url": "https://www.suse.com/security/cve/CVE-2025-71234"
},
{
"category": "external",
"summary": "SUSE Bug 1258419 for CVE-2025-71234",
"url": "https://bugzilla.suse.com/1258419"
},
{
"category": "external",
"summary": "SUSE Bug 1258420 for CVE-2025-71234",
"url": "https://bugzilla.suse.com/1258420"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_34-default-1-150700.15.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_34-default-1-150700.15.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_34-default-1-150700.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-devel-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.34.1.150700.17.23.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.34.1.150700.17.23.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.34.1.150700.17.23.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-devel-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-macros-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-zfcpdump-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-docs-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-source-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP7:kernel-default-extra-6.4.0-150700.53.34.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_34-default-1-150700.15.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_34-default-1-150700.15.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_34-default-1-150700.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-devel-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.34.1.150700.17.23.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.34.1.150700.17.23.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.34.1.150700.17.23.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-devel-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-macros-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-zfcpdump-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-docs-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-source-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP7:kernel-default-extra-6.4.0-150700.53.34.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-03-26T13:23:51Z",
"details": "important"
}
],
"title": "CVE-2025-71234"
},
{
"cve": "CVE-2025-71235",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-71235"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nscsi: qla2xxx: Delay module unload while fabric scan in progress\n\nSystem crash seen during load/unload test in a loop.\n\n[105954.384919] RBP: ffff914589838dc0 R08: 0000000000000000 R09: 0000000000000086\n[105954.384920] R10: 000000000000000f R11: ffffa31240904be5 R12: ffff914605f868e0\n[105954.384921] R13: ffff914605f86910 R14: 0000000000008010 R15: 00000000ddb7c000\n[105954.384923] FS: 0000000000000000(0000) GS:ffff9163fec40000(0000) knlGS:0000000000000000\n[105954.384925] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033\n[105954.384926] CR2: 000055d31ce1d6a0 CR3: 0000000119f5e001 CR4: 0000000000770ee0\n[105954.384928] PKRU: 55555554\n[105954.384929] Call Trace:\n[105954.384931] \u003cIRQ\u003e\n[105954.384934] qla24xx_sp_unmap+0x1f3/0x2a0 [qla2xxx]\n[105954.384962] ? qla_async_scan_sp_done+0x114/0x1f0 [qla2xxx]\n[105954.384980] ? qla24xx_els_ct_entry+0x4de/0x760 [qla2xxx]\n[105954.384999] ? __wake_up_common+0x80/0x190\n[105954.385004] ? qla24xx_process_response_queue+0xc2/0xaa0 [qla2xxx]\n[105954.385023] ? qla24xx_msix_rsp_q+0x44/0xb0 [qla2xxx]\n[105954.385040] ? __handle_irq_event_percpu+0x3d/0x190\n[105954.385044] ? handle_irq_event+0x58/0xb0\n[105954.385046] ? handle_edge_irq+0x93/0x240\n[105954.385050] ? __common_interrupt+0x41/0xa0\n[105954.385055] ? common_interrupt+0x3e/0xa0\n[105954.385060] ? asm_common_interrupt+0x22/0x40\n\nThe root cause of this was that there was a free (dma_free_attrs) in the\ninterrupt context. There was a device discovery/fabric scan in\nprogress. A module unload was issued which set the UNLOADING flag. As\npart of the discovery, after receiving an interrupt a work queue was\nscheduled (which involved a work to be queued). Since the UNLOADING\nflag is set, the work item was not allocated and the mapped memory had\nto be freed. The free occurred in interrupt context leading to system\ncrash. Delay the driver unload until the fabric scan is complete to\navoid the crash.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_34-default-1-150700.15.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_34-default-1-150700.15.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_34-default-1-150700.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-devel-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.34.1.150700.17.23.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.34.1.150700.17.23.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.34.1.150700.17.23.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-devel-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-macros-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-zfcpdump-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-docs-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-source-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP7:kernel-default-extra-6.4.0-150700.53.34.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-71235",
"url": "https://www.suse.com/security/cve/CVE-2025-71235"
},
{
"category": "external",
"summary": "SUSE Bug 1258469 for CVE-2025-71235",
"url": "https://bugzilla.suse.com/1258469"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_34-default-1-150700.15.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_34-default-1-150700.15.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_34-default-1-150700.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-devel-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.34.1.150700.17.23.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.34.1.150700.17.23.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.34.1.150700.17.23.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-devel-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-macros-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-zfcpdump-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-docs-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-source-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP7:kernel-default-extra-6.4.0-150700.53.34.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_34-default-1-150700.15.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_34-default-1-150700.15.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_34-default-1-150700.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-devel-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.34.1.150700.17.23.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.34.1.150700.17.23.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.34.1.150700.17.23.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-devel-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-macros-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-zfcpdump-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-docs-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-source-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP7:kernel-default-extra-6.4.0-150700.53.34.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-03-26T13:23:51Z",
"details": "moderate"
}
],
"title": "CVE-2025-71235"
},
{
"cve": "CVE-2025-71236",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-71236"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nscsi: qla2xxx: Validate sp before freeing associated memory\n\nSystem crash with the following signature\n[154563.214890] nvme nvme2: NVME-FC{1}: controller connect complete\n[154564.169363] qla2xxx [0000:b0:00.1]-3002:2: nvme: Sched: Set ZIO exchange threshold to 3.\n[154564.169405] qla2xxx [0000:b0:00.1]-ffffff:2: SET ZIO Activity exchange threshold to 5.\n[154565.539974] qla2xxx [0000:b0:00.1]-5013:2: RSCN database changed - 0078 0080 0000.\n[154565.545744] qla2xxx [0000:b0:00.1]-5013:2: RSCN database changed - 0078 00a0 0000.\n[154565.545857] qla2xxx [0000:b0:00.1]-11a2:2: FEC=enabled (data rate).\n[154565.552760] qla2xxx [0000:b0:00.1]-11a2:2: FEC=enabled (data rate).\n[154565.553079] BUG: kernel NULL pointer dereference, address: 00000000000000f8\n[154565.553080] #PF: supervisor read access in kernel mode\n[154565.553082] #PF: error_code(0x0000) - not-present page\n[154565.553084] PGD 80000010488ab067 P4D 80000010488ab067 PUD 104978a067 PMD 0\n[154565.553089] Oops: 0000 1 PREEMPT SMP PTI\n[154565.553092] CPU: 10 PID: 858 Comm: qla2xxx_2_dpc Kdump: loaded Tainted: G OE ------- --- 5.14.0-503.11.1.el9_5.x86_64 #1\n[154565.553096] Hardware name: HPE Synergy 660 Gen10/Synergy 660 Gen10 Compute Module, BIOS I43 09/30/2024\n[154565.553097] RIP: 0010:qla_fab_async_scan.part.0+0x40b/0x870 [qla2xxx]\n[154565.553141] Code: 00 00 e8 58 a3 ec d4 49 89 e9 ba 12 20 00 00 4c 89 e6 49 c7 c0 00 ee a8 c0 48 c7 c1 66 c0 a9 c0 bf 00 80 00 10 e8 15 69 00 00 \u003c4c\u003e 8b 8d f8 00 00 00 4d 85 c9 74 35 49 8b 84 24 00 19 00 00 48 8b\n[154565.553143] RSP: 0018:ffffb4dbc8aebdd0 EFLAGS: 00010286\n[154565.553145] RAX: 0000000000000000 RBX: ffff8ec2cf0908d0 RCX: 0000000000000002\n[154565.553147] RDX: 0000000000000000 RSI: ffffffffc0a9c896 RDI: ffffb4dbc8aebd47\n[154565.553148] RBP: 0000000000000000 R08: ffffb4dbc8aebd45 R09: 0000000000ffff0a\n[154565.553150] R10: 0000000000000000 R11: 000000000000000f R12: ffff8ec2cf0908d0\n[154565.553151] R13: ffff8ec2cf090900 R14: 0000000000000102 R15: ffff8ec2cf084000\n[154565.553152] FS: 0000000000000000(0000) GS:ffff8ed27f800000(0000) knlGS:0000000000000000\n[154565.553154] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033\n[154565.553155] CR2: 00000000000000f8 CR3: 000000113ae0a005 CR4: 00000000007706f0\n[154565.553157] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000\n[154565.553158] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400\n[154565.553159] PKRU: 55555554\n[154565.553160] Call Trace:\n[154565.553162] \u003cTASK\u003e\n[154565.553165] ? show_trace_log_lvl+0x1c4/0x2df\n[154565.553172] ? show_trace_log_lvl+0x1c4/0x2df\n[154565.553177] ? qla_fab_async_scan.part.0+0x40b/0x870 [qla2xxx]\n[154565.553215] ? __die_body.cold+0x8/0xd\n[154565.553218] ? page_fault_oops+0x134/0x170\n[154565.553223] ? snprintf+0x49/0x70\n[154565.553229] ? exc_page_fault+0x62/0x150\n[154565.553238] ? asm_exc_page_fault+0x22/0x30\n\nCheck for sp being non NULL before freeing any associated memory",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_34-default-1-150700.15.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_34-default-1-150700.15.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_34-default-1-150700.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-devel-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.34.1.150700.17.23.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.34.1.150700.17.23.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.34.1.150700.17.23.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-devel-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-macros-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-zfcpdump-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-docs-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-source-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP7:kernel-default-extra-6.4.0-150700.53.34.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-71236",
"url": "https://www.suse.com/security/cve/CVE-2025-71236"
},
{
"category": "external",
"summary": "SUSE Bug 1258442 for CVE-2025-71236",
"url": "https://bugzilla.suse.com/1258442"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_34-default-1-150700.15.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_34-default-1-150700.15.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_34-default-1-150700.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-devel-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.34.1.150700.17.23.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.34.1.150700.17.23.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.34.1.150700.17.23.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-devel-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-macros-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-zfcpdump-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-docs-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-source-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP7:kernel-default-extra-6.4.0-150700.53.34.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_34-default-1-150700.15.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_34-default-1-150700.15.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_34-default-1-150700.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-devel-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.34.1.150700.17.23.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.34.1.150700.17.23.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.34.1.150700.17.23.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-devel-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-macros-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-zfcpdump-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-docs-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-source-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP7:kernel-default-extra-6.4.0-150700.53.34.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-03-26T13:23:51Z",
"details": "moderate"
}
],
"title": "CVE-2025-71236"
},
{
"cve": "CVE-2026-22979",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2026-22979"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nnet: fix memory leak in skb_segment_list for GRO packets\n\nWhen skb_segment_list() is called during packet forwarding, it handles\npackets that were aggregated by the GRO engine.\n\nHistorically, the segmentation logic in skb_segment_list assumes that\nindividual segments are split from a parent SKB and may need to carry\ntheir own socket memory accounting. Accordingly, the code transfers\ntruesize from the parent to the newly created segments.\n\nPrior to commit ed4cccef64c1 (\"gro: fix ownership transfer\"), this\ntruesize subtraction in skb_segment_list() was valid because fragments\nstill carry a reference to the original socket.\n\nHowever, commit ed4cccef64c1 (\"gro: fix ownership transfer\") changed\nthis behavior by ensuring that fraglist entries are explicitly\norphaned (skb-\u003esk = NULL) to prevent illegal orphaning later in the\nstack. This change meant that the entire socket memory charge remained\nwith the head SKB, but the corresponding accounting logic in\nskb_segment_list() was never updated.\n\nAs a result, the current code unconditionally adds each fragment\u0027s\ntruesize to delta_truesize and subtracts it from the parent SKB. Since\nthe fragments are no longer charged to the socket, this subtraction\nresults in an effective under-count of memory when the head is freed.\nThis causes sk_wmem_alloc to remain non-zero, preventing socket\ndestruction and leading to a persistent memory leak.\n\nThe leak can be observed via KMEMLEAK when tearing down the networking\nenvironment:\n\nunreferenced object 0xffff8881e6eb9100 (size 2048):\n comm \"ping\", pid 6720, jiffies 4295492526\n backtrace:\n kmem_cache_alloc_noprof+0x5c6/0x800\n sk_prot_alloc+0x5b/0x220\n sk_alloc+0x35/0xa00\n inet6_create.part.0+0x303/0x10d0\n __sock_create+0x248/0x640\n __sys_socket+0x11b/0x1d0\n\nSince skb_segment_list() is exclusively used for SKB_GSO_FRAGLIST\npackets constructed by GRO, the truesize adjustment is removed.\n\nThe call to skb_release_head_state() must be preserved. As documented in\ncommit cf673ed0e057 (\"net: fix fraglist segmentation reference count\nleak\"), it is still required to correctly drop references to SKB\nextensions that may be overwritten during __copy_skb_header().",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_34-default-1-150700.15.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_34-default-1-150700.15.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_34-default-1-150700.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-devel-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.34.1.150700.17.23.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.34.1.150700.17.23.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.34.1.150700.17.23.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-devel-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-macros-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-zfcpdump-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-docs-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-source-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP7:kernel-default-extra-6.4.0-150700.53.34.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2026-22979",
"url": "https://www.suse.com/security/cve/CVE-2026-22979"
},
{
"category": "external",
"summary": "SUSE Bug 1257228 for CVE-2026-22979",
"url": "https://bugzilla.suse.com/1257228"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_34-default-1-150700.15.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_34-default-1-150700.15.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_34-default-1-150700.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-devel-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.34.1.150700.17.23.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.34.1.150700.17.23.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.34.1.150700.17.23.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-devel-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-macros-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-zfcpdump-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-docs-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-source-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP7:kernel-default-extra-6.4.0-150700.53.34.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_34-default-1-150700.15.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_34-default-1-150700.15.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_34-default-1-150700.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-devel-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.34.1.150700.17.23.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.34.1.150700.17.23.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.34.1.150700.17.23.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-devel-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-macros-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-zfcpdump-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-docs-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-source-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP7:kernel-default-extra-6.4.0-150700.53.34.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-03-26T13:23:51Z",
"details": "moderate"
}
],
"title": "CVE-2026-22979"
},
{
"cve": "CVE-2026-22982",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2026-22982"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nnet: mscc: ocelot: Fix crash when adding interface under a lag\n\nCommit 15faa1f67ab4 (\"lan966x: Fix crash when adding interface under a lag\")\nfixed a similar issue in the lan966x driver caused by a NULL pointer dereference.\nThe ocelot_set_aggr_pgids() function in the ocelot driver has similar logic\nand is susceptible to the same crash.\n\nThis issue specifically affects the ocelot_vsc7514.c frontend, which leaves\nunused ports as NULL pointers. The felix_vsc9959.c frontend is unaffected as\nit uses the DSA framework which registers all ports.\n\nFix this by checking if the port pointer is valid before accessing it.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_34-default-1-150700.15.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_34-default-1-150700.15.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_34-default-1-150700.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-devel-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.34.1.150700.17.23.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.34.1.150700.17.23.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.34.1.150700.17.23.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-devel-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-macros-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-zfcpdump-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-docs-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-source-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP7:kernel-default-extra-6.4.0-150700.53.34.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2026-22982",
"url": "https://www.suse.com/security/cve/CVE-2026-22982"
},
{
"category": "external",
"summary": "SUSE Bug 1257179 for CVE-2026-22982",
"url": "https://bugzilla.suse.com/1257179"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_34-default-1-150700.15.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_34-default-1-150700.15.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_34-default-1-150700.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-devel-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.34.1.150700.17.23.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.34.1.150700.17.23.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.34.1.150700.17.23.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-devel-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-macros-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-zfcpdump-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-docs-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-source-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP7:kernel-default-extra-6.4.0-150700.53.34.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_34-default-1-150700.15.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_34-default-1-150700.15.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_34-default-1-150700.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-devel-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.34.1.150700.17.23.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.34.1.150700.17.23.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.34.1.150700.17.23.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-devel-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-macros-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-zfcpdump-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-docs-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-source-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP7:kernel-default-extra-6.4.0-150700.53.34.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-03-26T13:23:51Z",
"details": "moderate"
}
],
"title": "CVE-2026-22982"
},
{
"cve": "CVE-2026-22989",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2026-22989"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nnfsd: check that server is running in unlock_filesystem\n\nIf we are trying to unlock the filesystem via an administrative\ninterface and nfsd isn\u0027t running, it crashes the server. This\nhappens currently because nfsd4_revoke_states() access state\nstructures (eg., conf_id_hashtbl) that has been freed as a part\nof the server shutdown.\n\n[ 59.465072] Call trace:\n[ 59.465308] nfsd4_revoke_states+0x1b4/0x898 [nfsd] (P)\n[ 59.465830] write_unlock_fs+0x258/0x440 [nfsd]\n[ 59.466278] nfsctl_transaction_write+0xb0/0x120 [nfsd]\n[ 59.466780] vfs_write+0x1f0/0x938\n[ 59.467088] ksys_write+0xfc/0x1f8\n[ 59.467395] __arm64_sys_write+0x74/0xb8\n[ 59.467746] invoke_syscall.constprop.0+0xdc/0x1e8\n[ 59.468177] do_el0_svc+0x154/0x1d8\n[ 59.468489] el0_svc+0x40/0xe0\n[ 59.468767] el0t_64_sync_handler+0xa0/0xe8\n[ 59.469138] el0t_64_sync+0x1ac/0x1b0\n\nEnsure this can\u0027t happen by taking the nfsd_mutex and checking that\nthe server is still up, and then holding the mutex across the call to\nnfsd4_revoke_states().",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_34-default-1-150700.15.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_34-default-1-150700.15.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_34-default-1-150700.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-devel-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.34.1.150700.17.23.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.34.1.150700.17.23.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.34.1.150700.17.23.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-devel-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-macros-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-zfcpdump-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-docs-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-source-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP7:kernel-default-extra-6.4.0-150700.53.34.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2026-22989",
"url": "https://www.suse.com/security/cve/CVE-2026-22989"
},
{
"category": "external",
"summary": "SUSE Bug 1257279 for CVE-2026-22989",
"url": "https://bugzilla.suse.com/1257279"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_34-default-1-150700.15.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_34-default-1-150700.15.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_34-default-1-150700.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-devel-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.34.1.150700.17.23.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.34.1.150700.17.23.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.34.1.150700.17.23.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-devel-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-macros-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-zfcpdump-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-docs-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-source-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP7:kernel-default-extra-6.4.0-150700.53.34.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_34-default-1-150700.15.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_34-default-1-150700.15.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_34-default-1-150700.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-devel-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.34.1.150700.17.23.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.34.1.150700.17.23.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.34.1.150700.17.23.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-devel-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-macros-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-zfcpdump-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-docs-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-source-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP7:kernel-default-extra-6.4.0-150700.53.34.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-03-26T13:23:51Z",
"details": "moderate"
}
],
"title": "CVE-2026-22989"
},
{
"cve": "CVE-2026-22998",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2026-22998"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nnvme-tcp: fix NULL pointer dereferences in nvmet_tcp_build_pdu_iovec\n\nCommit efa56305908b (\"nvmet-tcp: Fix a kernel panic when host sends an invalid H2C PDU length\")\nadded ttag bounds checking and data_offset\nvalidation in nvmet_tcp_handle_h2c_data_pdu(), but it did not validate\nwhether the command\u0027s data structures (cmd-\u003ereq.sg and cmd-\u003eiov) have\nbeen properly initialized before processing H2C_DATA PDUs.\n\nThe nvmet_tcp_build_pdu_iovec() function dereferences these pointers\nwithout NULL checks. This can be triggered by sending H2C_DATA PDU\nimmediately after the ICREQ/ICRESP handshake, before\nsending a CONNECT command or NVMe write command.\n\nAttack vectors that trigger NULL pointer dereferences:\n1. H2C_DATA PDU sent before CONNECT -\u003e both pointers NULL\n2. H2C_DATA PDU for READ command -\u003e cmd-\u003ereq.sg allocated, cmd-\u003eiov NULL\n3. H2C_DATA PDU for uninitialized command slot -\u003e both pointers NULL\n\nThe fix validates both cmd-\u003ereq.sg and cmd-\u003eiov before calling\nnvmet_tcp_build_pdu_iovec(). Both checks are required because:\n- Uninitialized commands: both NULL\n- READ commands: cmd-\u003ereq.sg allocated, cmd-\u003eiov NULL\n- WRITE commands: both allocated",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_34-default-1-150700.15.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_34-default-1-150700.15.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_34-default-1-150700.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-devel-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.34.1.150700.17.23.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.34.1.150700.17.23.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.34.1.150700.17.23.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-devel-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-macros-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-zfcpdump-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-docs-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-source-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP7:kernel-default-extra-6.4.0-150700.53.34.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2026-22998",
"url": "https://www.suse.com/security/cve/CVE-2026-22998"
},
{
"category": "external",
"summary": "SUSE Bug 1257209 for CVE-2026-22998",
"url": "https://bugzilla.suse.com/1257209"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_34-default-1-150700.15.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_34-default-1-150700.15.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_34-default-1-150700.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-devel-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.34.1.150700.17.23.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.34.1.150700.17.23.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.34.1.150700.17.23.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-devel-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-macros-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-zfcpdump-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-docs-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-source-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP7:kernel-default-extra-6.4.0-150700.53.34.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_34-default-1-150700.15.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_34-default-1-150700.15.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_34-default-1-150700.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-devel-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.34.1.150700.17.23.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.34.1.150700.17.23.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.34.1.150700.17.23.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-devel-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-macros-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-zfcpdump-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-docs-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-source-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP7:kernel-default-extra-6.4.0-150700.53.34.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-03-26T13:23:51Z",
"details": "moderate"
}
],
"title": "CVE-2026-22998"
},
{
"cve": "CVE-2026-23003",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2026-23003"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nip6_tunnel: use skb_vlan_inet_prepare() in __ip6_tnl_rcv()\n\nBlamed commit did not take care of VLAN encapsulations\nas spotted by syzbot [1].\n\nUse skb_vlan_inet_prepare() instead of pskb_inet_may_pull().\n\n[1]\n BUG: KMSAN: uninit-value in __INET_ECN_decapsulate include/net/inet_ecn.h:253 [inline]\n BUG: KMSAN: uninit-value in INET_ECN_decapsulate include/net/inet_ecn.h:275 [inline]\n BUG: KMSAN: uninit-value in IP6_ECN_decapsulate+0x7a8/0x1fa0 include/net/inet_ecn.h:321\n __INET_ECN_decapsulate include/net/inet_ecn.h:253 [inline]\n INET_ECN_decapsulate include/net/inet_ecn.h:275 [inline]\n IP6_ECN_decapsulate+0x7a8/0x1fa0 include/net/inet_ecn.h:321\n ip6ip6_dscp_ecn_decapsulate+0x16f/0x1b0 net/ipv6/ip6_tunnel.c:729\n __ip6_tnl_rcv+0xed9/0x1b50 net/ipv6/ip6_tunnel.c:860\n ip6_tnl_rcv+0xc3/0x100 net/ipv6/ip6_tunnel.c:903\n gre_rcv+0x1529/0x1b90 net/ipv6/ip6_gre.c:-1\n ip6_protocol_deliver_rcu+0x1c89/0x2c60 net/ipv6/ip6_input.c:438\n ip6_input_finish+0x1f4/0x4a0 net/ipv6/ip6_input.c:489\n NF_HOOK include/linux/netfilter.h:318 [inline]\n ip6_input+0x9c/0x330 net/ipv6/ip6_input.c:500\n ip6_mc_input+0x7ca/0xc10 net/ipv6/ip6_input.c:590\n dst_input include/net/dst.h:474 [inline]\n ip6_rcv_finish+0x958/0x990 net/ipv6/ip6_input.c:79\n NF_HOOK include/linux/netfilter.h:318 [inline]\n ipv6_rcv+0xf1/0x3c0 net/ipv6/ip6_input.c:311\n __netif_receive_skb_one_core net/core/dev.c:6139 [inline]\n __netif_receive_skb+0x1df/0xac0 net/core/dev.c:6252\n netif_receive_skb_internal net/core/dev.c:6338 [inline]\n netif_receive_skb+0x57/0x630 net/core/dev.c:6397\n tun_rx_batched+0x1df/0x980 drivers/net/tun.c:1485\n tun_get_user+0x5c0e/0x6c60 drivers/net/tun.c:1953\n tun_chr_write_iter+0x3e9/0x5c0 drivers/net/tun.c:1999\n new_sync_write fs/read_write.c:593 [inline]\n vfs_write+0xbe2/0x15d0 fs/read_write.c:686\n ksys_write fs/read_write.c:738 [inline]\n __do_sys_write fs/read_write.c:749 [inline]\n __se_sys_write fs/read_write.c:746 [inline]\n __x64_sys_write+0x1fb/0x4d0 fs/read_write.c:746\n x64_sys_call+0x30ab/0x3e70 arch/x86/include/generated/asm/syscalls_64.h:2\n do_syscall_x64 arch/x86/entry/syscall_64.c:63 [inline]\n do_syscall_64+0xd3/0xf80 arch/x86/entry/syscall_64.c:94\n entry_SYSCALL_64_after_hwframe+0x77/0x7f\n\nUninit was created at:\n slab_post_alloc_hook mm/slub.c:4960 [inline]\n slab_alloc_node mm/slub.c:5263 [inline]\n kmem_cache_alloc_node_noprof+0x9e7/0x17a0 mm/slub.c:5315\n kmalloc_reserve+0x13c/0x4b0 net/core/skbuff.c:586\n __alloc_skb+0x805/0x1040 net/core/skbuff.c:690\n alloc_skb include/linux/skbuff.h:1383 [inline]\n alloc_skb_with_frags+0xc5/0xa60 net/core/skbuff.c:6712\n sock_alloc_send_pskb+0xacc/0xc60 net/core/sock.c:2995\n tun_alloc_skb drivers/net/tun.c:1461 [inline]\n tun_get_user+0x1142/0x6c60 drivers/net/tun.c:1794\n tun_chr_write_iter+0x3e9/0x5c0 drivers/net/tun.c:1999\n new_sync_write fs/read_write.c:593 [inline]\n vfs_write+0xbe2/0x15d0 fs/read_write.c:686\n ksys_write fs/read_write.c:738 [inline]\n __do_sys_write fs/read_write.c:749 [inline]\n __se_sys_write fs/read_write.c:746 [inline]\n __x64_sys_write+0x1fb/0x4d0 fs/read_write.c:746\n x64_sys_call+0x30ab/0x3e70 arch/x86/include/generated/asm/syscalls_64.h:2\n do_syscall_x64 arch/x86/entry/syscall_64.c:63 [inline]\n do_syscall_64+0xd3/0xf80 arch/x86/entry/syscall_64.c:94\n entry_SYSCALL_64_after_hwframe+0x77/0x7f\n\nCPU: 0 UID: 0 PID: 6465 Comm: syz.0.17 Not tainted syzkaller #0 PREEMPT(none)\nHardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/25/2025",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_34-default-1-150700.15.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_34-default-1-150700.15.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_34-default-1-150700.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-devel-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.34.1.150700.17.23.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.34.1.150700.17.23.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.34.1.150700.17.23.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-devel-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-macros-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-zfcpdump-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-docs-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-source-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP7:kernel-default-extra-6.4.0-150700.53.34.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2026-23003",
"url": "https://www.suse.com/security/cve/CVE-2026-23003"
},
{
"category": "external",
"summary": "SUSE Bug 1257246 for CVE-2026-23003",
"url": "https://bugzilla.suse.com/1257246"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_34-default-1-150700.15.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_34-default-1-150700.15.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_34-default-1-150700.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-devel-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.34.1.150700.17.23.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.34.1.150700.17.23.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.34.1.150700.17.23.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-devel-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-macros-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-zfcpdump-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-docs-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-source-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP7:kernel-default-extra-6.4.0-150700.53.34.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.6,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_34-default-1-150700.15.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_34-default-1-150700.15.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_34-default-1-150700.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-devel-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.34.1.150700.17.23.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.34.1.150700.17.23.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.34.1.150700.17.23.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-devel-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-macros-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-zfcpdump-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-docs-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-source-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP7:kernel-default-extra-6.4.0-150700.53.34.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-03-26T13:23:51Z",
"details": "moderate"
}
],
"title": "CVE-2026-23003"
},
{
"cve": "CVE-2026-23004",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2026-23004"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\ndst: fix races in rt6_uncached_list_del() and rt_del_uncached_list()\n\nsyzbot was able to crash the kernel in rt6_uncached_list_flush_dev()\nin an interesting way [1]\n\nCrash happens in list_del_init()/INIT_LIST_HEAD() while writing\nlist-\u003eprev, while the prior write on list-\u003enext went well.\n\nstatic inline void INIT_LIST_HEAD(struct list_head *list)\n{\n\tWRITE_ONCE(list-\u003enext, list); // This went well\n\tWRITE_ONCE(list-\u003eprev, list); // Crash, @list has been freed.\n}\n\nIssue here is that rt6_uncached_list_del() did not attempt to lock\nul-\u003elock, as list_empty(\u0026rt-\u003edst.rt_uncached) returned\ntrue because the WRITE_ONCE(list-\u003enext, list) happened on the other CPU.\n\nWe might use list_del_init_careful() and list_empty_careful(),\nor make sure rt6_uncached_list_del() always grabs the spinlock\nwhenever rt-\u003edst.rt_uncached_list has been set.\n\nA similar fix is neeed for IPv4.\n\n[1]\n\n BUG: KASAN: slab-use-after-free in INIT_LIST_HEAD include/linux/list.h:46 [inline]\n BUG: KASAN: slab-use-after-free in list_del_init include/linux/list.h:296 [inline]\n BUG: KASAN: slab-use-after-free in rt6_uncached_list_flush_dev net/ipv6/route.c:191 [inline]\n BUG: KASAN: slab-use-after-free in rt6_disable_ip+0x633/0x730 net/ipv6/route.c:5020\nWrite of size 8 at addr ffff8880294cfa78 by task kworker/u8:14/3450\n\nCPU: 0 UID: 0 PID: 3450 Comm: kworker/u8:14 Tainted: G L syzkaller #0 PREEMPT_{RT,(full)}\nTainted: [L]=SOFTLOCKUP\nHardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/25/2025\nWorkqueue: netns cleanup_net\nCall Trace:\n \u003cTASK\u003e\n dump_stack_lvl+0xe8/0x150 lib/dump_stack.c:120\n print_address_description mm/kasan/report.c:378 [inline]\n print_report+0xca/0x240 mm/kasan/report.c:482\n kasan_report+0x118/0x150 mm/kasan/report.c:595\n INIT_LIST_HEAD include/linux/list.h:46 [inline]\n list_del_init include/linux/list.h:296 [inline]\n rt6_uncached_list_flush_dev net/ipv6/route.c:191 [inline]\n rt6_disable_ip+0x633/0x730 net/ipv6/route.c:5020\n addrconf_ifdown+0x143/0x18a0 net/ipv6/addrconf.c:3853\n addrconf_notify+0x1bc/0x1050 net/ipv6/addrconf.c:-1\n notifier_call_chain+0x19d/0x3a0 kernel/notifier.c:85\n call_netdevice_notifiers_extack net/core/dev.c:2268 [inline]\n call_netdevice_notifiers net/core/dev.c:2282 [inline]\n netif_close_many+0x29c/0x410 net/core/dev.c:1785\n unregister_netdevice_many_notify+0xb50/0x2330 net/core/dev.c:12353\n ops_exit_rtnl_list net/core/net_namespace.c:187 [inline]\n ops_undo_list+0x3dc/0x990 net/core/net_namespace.c:248\n cleanup_net+0x4de/0x7b0 net/core/net_namespace.c:696\n process_one_work kernel/workqueue.c:3257 [inline]\n process_scheduled_works+0xad1/0x1770 kernel/workqueue.c:3340\n worker_thread+0x8a0/0xda0 kernel/workqueue.c:3421\n kthread+0x711/0x8a0 kernel/kthread.c:463\n ret_from_fork+0x510/0xa50 arch/x86/kernel/process.c:158\n ret_from_fork_asm+0x1a/0x30 arch/x86/entry/entry_64.S:246\n \u003c/TASK\u003e\n\nAllocated by task 803:\n kasan_save_stack mm/kasan/common.c:57 [inline]\n kasan_save_track+0x3e/0x80 mm/kasan/common.c:78\n unpoison_slab_object mm/kasan/common.c:340 [inline]\n __kasan_slab_alloc+0x6c/0x80 mm/kasan/common.c:366\n kasan_slab_alloc include/linux/kasan.h:253 [inline]\n slab_post_alloc_hook mm/slub.c:4953 [inline]\n slab_alloc_node mm/slub.c:5263 [inline]\n kmem_cache_alloc_noprof+0x18d/0x6c0 mm/slub.c:5270\n dst_alloc+0x105/0x170 net/core/dst.c:89\n ip6_dst_alloc net/ipv6/route.c:342 [inline]\n icmp6_dst_alloc+0x75/0x460 net/ipv6/route.c:3333\n mld_sendpack+0x683/0xe60 net/ipv6/mcast.c:1844\n mld_send_cr net/ipv6/mcast.c:2154 [inline]\n mld_ifc_work+0x83e/0xd60 net/ipv6/mcast.c:2693\n process_one_work kernel/workqueue.c:3257 [inline]\n process_scheduled_works+0xad1/0x1770 kernel/workqueue.c:3340\n worker_thread+0x8a0/0xda0 kernel/workqueue.c:3421\n kthread+0x711/0x8a0 kernel/kthread.c:463\n ret_from_fork+0x510/0xa50 arch/x86/kernel/process.c:158\n ret_from_fork_asm+0x1a/0x30 arch/x86/entry/entr\n---truncated---",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_34-default-1-150700.15.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_34-default-1-150700.15.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_34-default-1-150700.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-devel-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.34.1.150700.17.23.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.34.1.150700.17.23.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.34.1.150700.17.23.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-devel-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-macros-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-zfcpdump-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-docs-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-source-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP7:kernel-default-extra-6.4.0-150700.53.34.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2026-23004",
"url": "https://www.suse.com/security/cve/CVE-2026-23004"
},
{
"category": "external",
"summary": "SUSE Bug 1257231 for CVE-2026-23004",
"url": "https://bugzilla.suse.com/1257231"
},
{
"category": "external",
"summary": "SUSE Bug 1258655 for CVE-2026-23004",
"url": "https://bugzilla.suse.com/1258655"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_34-default-1-150700.15.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_34-default-1-150700.15.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_34-default-1-150700.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-devel-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.34.1.150700.17.23.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.34.1.150700.17.23.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.34.1.150700.17.23.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-devel-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-macros-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-zfcpdump-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-docs-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-source-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP7:kernel-default-extra-6.4.0-150700.53.34.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_34-default-1-150700.15.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_34-default-1-150700.15.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_34-default-1-150700.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-devel-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.34.1.150700.17.23.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.34.1.150700.17.23.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.34.1.150700.17.23.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-devel-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-macros-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-zfcpdump-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-docs-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-source-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP7:kernel-default-extra-6.4.0-150700.53.34.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-03-26T13:23:51Z",
"details": "important"
}
],
"title": "CVE-2026-23004"
},
{
"cve": "CVE-2026-23010",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2026-23010"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nipv6: Fix use-after-free in inet6_addr_del().\n\nsyzbot reported use-after-free of inet6_ifaddr in\ninet6_addr_del(). [0]\n\nThe cited commit accidentally moved ipv6_del_addr() for\nmngtmpaddr before reading its ifp-\u003eflags for temporary\naddresses in inet6_addr_del().\n\nLet\u0027s move ipv6_del_addr() down to fix the UAF.\n\n[0]:\nBUG: KASAN: slab-use-after-free in inet6_addr_del.constprop.0+0x67a/0x6b0 net/ipv6/addrconf.c:3117\nRead of size 4 at addr ffff88807b89c86c by task syz.3.1618/9593\n\nCPU: 0 UID: 0 PID: 9593 Comm: syz.3.1618 Not tainted syzkaller #0 PREEMPT(full)\nHardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/25/2025\nCall Trace:\n \u003cTASK\u003e\n __dump_stack lib/dump_stack.c:94 [inline]\n dump_stack_lvl+0x116/0x1f0 lib/dump_stack.c:120\n print_address_description mm/kasan/report.c:378 [inline]\n print_report+0xcd/0x630 mm/kasan/report.c:482\n kasan_report+0xe0/0x110 mm/kasan/report.c:595\n inet6_addr_del.constprop.0+0x67a/0x6b0 net/ipv6/addrconf.c:3117\n addrconf_del_ifaddr+0x11e/0x190 net/ipv6/addrconf.c:3181\n inet6_ioctl+0x1e5/0x2b0 net/ipv6/af_inet6.c:582\n sock_do_ioctl+0x118/0x280 net/socket.c:1254\n sock_ioctl+0x227/0x6b0 net/socket.c:1375\n vfs_ioctl fs/ioctl.c:51 [inline]\n __do_sys_ioctl fs/ioctl.c:597 [inline]\n __se_sys_ioctl fs/ioctl.c:583 [inline]\n __x64_sys_ioctl+0x18e/0x210 fs/ioctl.c:583\n do_syscall_x64 arch/x86/entry/syscall_64.c:63 [inline]\n do_syscall_64+0xcd/0xf80 arch/x86/entry/syscall_64.c:94\n entry_SYSCALL_64_after_hwframe+0x77/0x7f\nRIP: 0033:0x7f164cf8f749\nCode: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 \u003c48\u003e 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48\nRSP: 002b:00007f164de64038 EFLAGS: 00000246 ORIG_RAX: 0000000000000010\nRAX: ffffffffffffffda RBX: 00007f164d1e5fa0 RCX: 00007f164cf8f749\nRDX: 0000200000000000 RSI: 0000000000008936 RDI: 0000000000000003\nRBP: 00007f164d013f91 R08: 0000000000000000 R09: 0000000000000000\nR10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000\nR13: 00007f164d1e6038 R14: 00007f164d1e5fa0 R15: 00007ffde15c8288\n \u003c/TASK\u003e\n\nAllocated by task 9593:\n kasan_save_stack+0x33/0x60 mm/kasan/common.c:56\n kasan_save_track+0x14/0x30 mm/kasan/common.c:77\n poison_kmalloc_redzone mm/kasan/common.c:397 [inline]\n __kasan_kmalloc+0xaa/0xb0 mm/kasan/common.c:414\n kmalloc_noprof include/linux/slab.h:957 [inline]\n kzalloc_noprof include/linux/slab.h:1094 [inline]\n ipv6_add_addr+0x4e3/0x2010 net/ipv6/addrconf.c:1120\n inet6_addr_add+0x256/0x9b0 net/ipv6/addrconf.c:3050\n addrconf_add_ifaddr+0x1fc/0x450 net/ipv6/addrconf.c:3160\n inet6_ioctl+0x103/0x2b0 net/ipv6/af_inet6.c:580\n sock_do_ioctl+0x118/0x280 net/socket.c:1254\n sock_ioctl+0x227/0x6b0 net/socket.c:1375\n vfs_ioctl fs/ioctl.c:51 [inline]\n __do_sys_ioctl fs/ioctl.c:597 [inline]\n __se_sys_ioctl fs/ioctl.c:583 [inline]\n __x64_sys_ioctl+0x18e/0x210 fs/ioctl.c:583\n do_syscall_x64 arch/x86/entry/syscall_64.c:63 [inline]\n do_syscall_64+0xcd/0xf80 arch/x86/entry/syscall_64.c:94\n entry_SYSCALL_64_after_hwframe+0x77/0x7f\n\nFreed by task 6099:\n kasan_save_stack+0x33/0x60 mm/kasan/common.c:56\n kasan_save_track+0x14/0x30 mm/kasan/common.c:77\n kasan_save_free_info+0x3b/0x60 mm/kasan/generic.c:584\n poison_slab_object mm/kasan/common.c:252 [inline]\n __kasan_slab_free+0x5f/0x80 mm/kasan/common.c:284\n kasan_slab_free include/linux/kasan.h:234 [inline]\n slab_free_hook mm/slub.c:2540 [inline]\n slab_free_freelist_hook mm/slub.c:2569 [inline]\n slab_free_bulk mm/slub.c:6696 [inline]\n kmem_cache_free_bulk mm/slub.c:7383 [inline]\n kmem_cache_free_bulk+0x2bf/0x680 mm/slub.c:7362\n kfree_bulk include/linux/slab.h:830 [inline]\n kvfree_rcu_bulk+0x1b7/0x1e0 mm/slab_common.c:1523\n kvfree_rcu_drain_ready mm/slab_common.c:1728 [inline]\n kfree_rcu_monitor+0x1d0/0x2f0 mm/slab_common.c:1801\n process_one_work+0x9ba/0x1b20 kernel/workqueue.c:3257\n process_scheduled_works kernel/workqu\n---truncated---",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_34-default-1-150700.15.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_34-default-1-150700.15.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_34-default-1-150700.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-devel-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.34.1.150700.17.23.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.34.1.150700.17.23.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.34.1.150700.17.23.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-devel-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-macros-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-zfcpdump-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-docs-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-source-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP7:kernel-default-extra-6.4.0-150700.53.34.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2026-23010",
"url": "https://www.suse.com/security/cve/CVE-2026-23010"
},
{
"category": "external",
"summary": "SUSE Bug 1257332 for CVE-2026-23010",
"url": "https://bugzilla.suse.com/1257332"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_34-default-1-150700.15.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_34-default-1-150700.15.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_34-default-1-150700.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-devel-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.34.1.150700.17.23.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.34.1.150700.17.23.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.34.1.150700.17.23.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-devel-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-macros-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-zfcpdump-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-docs-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-source-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP7:kernel-default-extra-6.4.0-150700.53.34.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.1,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_34-default-1-150700.15.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_34-default-1-150700.15.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_34-default-1-150700.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-devel-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.34.1.150700.17.23.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.34.1.150700.17.23.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.34.1.150700.17.23.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-devel-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-macros-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-zfcpdump-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-docs-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-source-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP7:kernel-default-extra-6.4.0-150700.53.34.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-03-26T13:23:51Z",
"details": "moderate"
}
],
"title": "CVE-2026-23010"
},
{
"cve": "CVE-2026-23017",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2026-23017"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nidpf: fix error handling in the init_task on load\n\nIf the init_task fails during a driver load, we end up without vports and\nnetdevs, effectively failing the entire process. In that state a\nsubsequent reset will result in a crash as the service task attempts to\naccess uninitialized resources. Following trace is from an error in the\ninit_task where the CREATE_VPORT (op 501) is rejected by the FW:\n\n[40922.763136] idpf 0000:83:00.0: Device HW Reset initiated\n[40924.449797] idpf 0000:83:00.0: Transaction failed (op 501)\n[40958.148190] idpf 0000:83:00.0: HW reset detected\n[40958.161202] BUG: kernel NULL pointer dereference, address: 00000000000000a8\n...\n[40958.168094] Workqueue: idpf-0000:83:00.0-vc_event idpf_vc_event_task [idpf]\n[40958.168865] RIP: 0010:idpf_vc_event_task+0x9b/0x350 [idpf]\n...\n[40958.177932] Call Trace:\n[40958.178491] \u003cTASK\u003e\n[40958.179040] process_one_work+0x226/0x6d0\n[40958.179609] worker_thread+0x19e/0x340\n[40958.180158] ? __pfx_worker_thread+0x10/0x10\n[40958.180702] kthread+0x10f/0x250\n[40958.181238] ? __pfx_kthread+0x10/0x10\n[40958.181774] ret_from_fork+0x251/0x2b0\n[40958.182307] ? __pfx_kthread+0x10/0x10\n[40958.182834] ret_from_fork_asm+0x1a/0x30\n[40958.183370] \u003c/TASK\u003e\n\nFix the error handling in the init_task to make sure the service and\nmailbox tasks are disabled if the error happens during load. These are\nstarted in idpf_vc_core_init(), which spawns the init_task and has no way\nof knowing if it failed. If the error happens on reset, following\nsuccessful driver load, the tasks can still run, as that will allow the\nnetdevs to attempt recovery through another reset. Stop the PTP callbacks\neither way as those will be restarted by the call to idpf_vc_core_init()\nduring a successful reset.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_34-default-1-150700.15.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_34-default-1-150700.15.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_34-default-1-150700.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-devel-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.34.1.150700.17.23.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.34.1.150700.17.23.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.34.1.150700.17.23.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-devel-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-macros-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-zfcpdump-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-docs-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-source-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP7:kernel-default-extra-6.4.0-150700.53.34.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2026-23017",
"url": "https://www.suse.com/security/cve/CVE-2026-23017"
},
{
"category": "external",
"summary": "SUSE Bug 1257552 for CVE-2026-23017",
"url": "https://bugzilla.suse.com/1257552"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_34-default-1-150700.15.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_34-default-1-150700.15.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_34-default-1-150700.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-devel-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.34.1.150700.17.23.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.34.1.150700.17.23.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.34.1.150700.17.23.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-devel-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-macros-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-zfcpdump-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-docs-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-source-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP7:kernel-default-extra-6.4.0-150700.53.34.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_34-default-1-150700.15.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_34-default-1-150700.15.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_34-default-1-150700.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-devel-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.34.1.150700.17.23.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.34.1.150700.17.23.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.34.1.150700.17.23.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-devel-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-macros-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-zfcpdump-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-docs-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-source-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP7:kernel-default-extra-6.4.0-150700.53.34.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-03-26T13:23:51Z",
"details": "moderate"
}
],
"title": "CVE-2026-23017"
},
{
"cve": "CVE-2026-23021",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2026-23021"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nnet: usb: pegasus: fix memory leak in update_eth_regs_async()\n\nWhen asynchronously writing to the device registers and if usb_submit_urb()\nfail, the code fail to release allocated to this point resources.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_34-default-1-150700.15.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_34-default-1-150700.15.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_34-default-1-150700.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-devel-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.34.1.150700.17.23.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.34.1.150700.17.23.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.34.1.150700.17.23.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-devel-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-macros-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-zfcpdump-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-docs-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-source-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP7:kernel-default-extra-6.4.0-150700.53.34.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2026-23021",
"url": "https://www.suse.com/security/cve/CVE-2026-23021"
},
{
"category": "external",
"summary": "SUSE Bug 1257557 for CVE-2026-23021",
"url": "https://bugzilla.suse.com/1257557"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_34-default-1-150700.15.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_34-default-1-150700.15.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_34-default-1-150700.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-devel-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.34.1.150700.17.23.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.34.1.150700.17.23.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.34.1.150700.17.23.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-devel-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-macros-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-zfcpdump-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-docs-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-source-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP7:kernel-default-extra-6.4.0-150700.53.34.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 3.3,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_34-default-1-150700.15.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_34-default-1-150700.15.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_34-default-1-150700.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-devel-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.34.1.150700.17.23.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.34.1.150700.17.23.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.34.1.150700.17.23.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-devel-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-macros-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-zfcpdump-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-docs-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-source-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP7:kernel-default-extra-6.4.0-150700.53.34.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-03-26T13:23:51Z",
"details": "moderate"
}
],
"title": "CVE-2026-23021"
},
{
"cve": "CVE-2026-23023",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2026-23023"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nidpf: fix memory leak in idpf_vport_rel()\n\nFree vport-\u003erx_ptype_lkup in idpf_vport_rel() to avoid leaking memory\nduring a reset. Reported by kmemleak:\n\nunreferenced object 0xff450acac838a000 (size 4096):\n comm \"kworker/u258:5\", pid 7732, jiffies 4296830044\n hex dump (first 32 bytes):\n 00 00 00 00 00 10 00 00 00 10 00 00 00 00 00 00 ................\n 00 00 00 00 00 00 00 00 00 10 00 00 00 00 00 00 ................\n backtrace (crc 3da81902):\n __kmalloc_cache_noprof+0x469/0x7a0\n idpf_send_get_rx_ptype_msg+0x90/0x570 [idpf]\n idpf_init_task+0x1ec/0x8d0 [idpf]\n process_one_work+0x226/0x6d0\n worker_thread+0x19e/0x340\n kthread+0x10f/0x250\n ret_from_fork+0x251/0x2b0\n ret_from_fork_asm+0x1a/0x30",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_34-default-1-150700.15.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_34-default-1-150700.15.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_34-default-1-150700.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-devel-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.34.1.150700.17.23.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.34.1.150700.17.23.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.34.1.150700.17.23.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-devel-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-macros-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-zfcpdump-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-docs-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-source-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP7:kernel-default-extra-6.4.0-150700.53.34.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2026-23023",
"url": "https://www.suse.com/security/cve/CVE-2026-23023"
},
{
"category": "external",
"summary": "SUSE Bug 1257556 for CVE-2026-23023",
"url": "https://bugzilla.suse.com/1257556"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_34-default-1-150700.15.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_34-default-1-150700.15.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_34-default-1-150700.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-devel-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.34.1.150700.17.23.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.34.1.150700.17.23.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.34.1.150700.17.23.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-devel-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-macros-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-zfcpdump-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-docs-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-source-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP7:kernel-default-extra-6.4.0-150700.53.34.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 3.3,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_34-default-1-150700.15.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_34-default-1-150700.15.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_34-default-1-150700.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-devel-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.34.1.150700.17.23.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.34.1.150700.17.23.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.34.1.150700.17.23.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-devel-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-macros-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-zfcpdump-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-docs-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-source-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP7:kernel-default-extra-6.4.0-150700.53.34.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-03-26T13:23:51Z",
"details": "low"
}
],
"title": "CVE-2026-23023"
},
{
"cve": "CVE-2026-23026",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2026-23026"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\ndmaengine: qcom: gpi: Fix memory leak in gpi_peripheral_config()\n\nFix a memory leak in gpi_peripheral_config() where the original memory\npointed to by gchan-\u003econfig could be lost if krealloc() fails.\n\nThe issue occurs when:\n1. gchan-\u003econfig points to previously allocated memory\n2. krealloc() fails and returns NULL\n3. The function directly assigns NULL to gchan-\u003econfig, losing the\n reference to the original memory\n4. The original memory becomes unreachable and cannot be freed\n\nFix this by using a temporary variable to hold the krealloc() result\nand only updating gchan-\u003econfig when the allocation succeeds.\n\nFound via static analysis and code review.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_34-default-1-150700.15.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_34-default-1-150700.15.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_34-default-1-150700.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-devel-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.34.1.150700.17.23.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.34.1.150700.17.23.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.34.1.150700.17.23.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-devel-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-macros-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-zfcpdump-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-docs-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-source-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP7:kernel-default-extra-6.4.0-150700.53.34.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2026-23026",
"url": "https://www.suse.com/security/cve/CVE-2026-23026"
},
{
"category": "external",
"summary": "SUSE Bug 1257562 for CVE-2026-23026",
"url": "https://bugzilla.suse.com/1257562"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_34-default-1-150700.15.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_34-default-1-150700.15.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_34-default-1-150700.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-devel-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.34.1.150700.17.23.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.34.1.150700.17.23.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.34.1.150700.17.23.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-devel-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-macros-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-zfcpdump-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-docs-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-source-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP7:kernel-default-extra-6.4.0-150700.53.34.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 2.5,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_34-default-1-150700.15.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_34-default-1-150700.15.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_34-default-1-150700.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-devel-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.34.1.150700.17.23.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.34.1.150700.17.23.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.34.1.150700.17.23.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-devel-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-macros-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-zfcpdump-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-docs-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-source-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP7:kernel-default-extra-6.4.0-150700.53.34.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-03-26T13:23:51Z",
"details": "moderate"
}
],
"title": "CVE-2026-23026"
},
{
"cve": "CVE-2026-23033",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2026-23033"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\ndmaengine: omap-dma: fix dma_pool resource leak in error paths\n\nThe dma_pool created by dma_pool_create() is not destroyed when\ndma_async_device_register() or of_dma_controller_register() fails,\ncausing a resource leak in the probe error paths.\n\nAdd dma_pool_destroy() in both error paths to properly release the\nallocated dma_pool resource.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_34-default-1-150700.15.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_34-default-1-150700.15.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_34-default-1-150700.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-devel-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.34.1.150700.17.23.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.34.1.150700.17.23.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.34.1.150700.17.23.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-devel-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-macros-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-zfcpdump-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-docs-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-source-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP7:kernel-default-extra-6.4.0-150700.53.34.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2026-23033",
"url": "https://www.suse.com/security/cve/CVE-2026-23033"
},
{
"category": "external",
"summary": "SUSE Bug 1257570 for CVE-2026-23033",
"url": "https://bugzilla.suse.com/1257570"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_34-default-1-150700.15.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_34-default-1-150700.15.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_34-default-1-150700.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-devel-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.34.1.150700.17.23.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.34.1.150700.17.23.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.34.1.150700.17.23.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-devel-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-macros-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-zfcpdump-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-docs-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-source-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP7:kernel-default-extra-6.4.0-150700.53.34.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 3.3,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_34-default-1-150700.15.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_34-default-1-150700.15.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_34-default-1-150700.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-devel-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.34.1.150700.17.23.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.34.1.150700.17.23.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.34.1.150700.17.23.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-devel-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-macros-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-zfcpdump-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-docs-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-source-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP7:kernel-default-extra-6.4.0-150700.53.34.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-03-26T13:23:51Z",
"details": "low"
}
],
"title": "CVE-2026-23033"
},
{
"cve": "CVE-2026-23035",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2026-23035"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nnet/mlx5e: Pass netdev to mlx5e_destroy_netdev instead of priv\n\nmlx5e_priv is an unstable structure that can be memset(0) if profile\nattaching fails.\n\nPass netdev to mlx5e_destroy_netdev() to guarantee it will work on a\nvalid netdev.\n\nOn mlx5e_remove: Check validity of priv-\u003eprofile, before attempting\nto cleanup any resources that might be not there.\n\nThis fixes a kernel oops in mlx5e_remove when switchdev mode fails due\nto change profile failure.\n\n$ devlink dev eswitch set pci/0000:00:03.0 mode switchdev\nError: mlx5_core: Failed setting eswitch to offloads.\ndmesg:\nworkqueue: Failed to create a rescuer kthread for wq \"mlx5e\": -EINTR\nmlx5_core 0012:03:00.1: mlx5e_netdev_init_profile:6214:(pid 37199): mlx5e_priv_init failed, err=-12\nmlx5_core 0012:03:00.1 gpu3rdma1: mlx5e_netdev_change_profile: new profile init failed, -12\nworkqueue: Failed to create a rescuer kthread for wq \"mlx5e\": -EINTR\nmlx5_core 0012:03:00.1: mlx5e_netdev_init_profile:6214:(pid 37199): mlx5e_priv_init failed, err=-12\nmlx5_core 0012:03:00.1 gpu3rdma1: mlx5e_netdev_change_profile: failed to rollback to orig profile, -12\n\n$ devlink dev reload pci/0000:00:03.0 ==\u003e oops\n\nBUG: kernel NULL pointer dereference, address: 0000000000000370\nPGD 0 P4D 0\nOops: Oops: 0000 [#1] SMP NOPTI\nCPU: 15 UID: 0 PID: 520 Comm: devlink Not tainted 6.18.0-rc5+ #115 PREEMPT(voluntary)\nHardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-2.fc40 04/01/2014\nRIP: 0010:mlx5e_dcbnl_dscp_app+0x23/0x100\nRSP: 0018:ffffc9000083f8b8 EFLAGS: 00010286\nRAX: ffff8881126fc380 RBX: ffff8881015ac400 RCX: ffffffff826ffc45\nRDX: 0000000000000000 RSI: 0000000000000001 RDI: ffff8881035109c0\nRBP: ffff8881035109c0 R08: ffff888101e3e838 R09: ffff888100264e10\nR10: ffffc9000083f898 R11: ffffc9000083f8a0 R12: ffff888101b921a0\nR13: ffff888101b921a0 R14: ffff8881015ac9a0 R15: ffff8881015ac400\nFS: 00007f789a3c8740(0000) GS:ffff88856aa59000(0000) knlGS:0000000000000000\nCS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033\nCR2: 0000000000000370 CR3: 000000010b6c0001 CR4: 0000000000370ef0\nCall Trace:\n \u003cTASK\u003e\n mlx5e_remove+0x57/0x110\n device_release_driver_internal+0x19c/0x200\n bus_remove_device+0xc6/0x130\n device_del+0x160/0x3d0\n ? devl_param_driverinit_value_get+0x2d/0x90\n mlx5_detach_device+0x89/0xe0\n mlx5_unload_one_devl_locked+0x3a/0x70\n mlx5_devlink_reload_down+0xc8/0x220\n devlink_reload+0x7d/0x260\n devlink_nl_reload_doit+0x45b/0x5a0\n genl_family_rcv_msg_doit+0xe8/0x140",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_34-default-1-150700.15.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_34-default-1-150700.15.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_34-default-1-150700.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-devel-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.34.1.150700.17.23.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.34.1.150700.17.23.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.34.1.150700.17.23.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-devel-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-macros-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-zfcpdump-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-docs-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-source-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP7:kernel-default-extra-6.4.0-150700.53.34.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2026-23035",
"url": "https://www.suse.com/security/cve/CVE-2026-23035"
},
{
"category": "external",
"summary": "SUSE Bug 1257559 for CVE-2026-23035",
"url": "https://bugzilla.suse.com/1257559"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_34-default-1-150700.15.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_34-default-1-150700.15.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_34-default-1-150700.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-devel-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.34.1.150700.17.23.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.34.1.150700.17.23.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.34.1.150700.17.23.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-devel-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-macros-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-zfcpdump-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-docs-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-source-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP7:kernel-default-extra-6.4.0-150700.53.34.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_34-default-1-150700.15.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_34-default-1-150700.15.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_34-default-1-150700.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-devel-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.34.1.150700.17.23.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.34.1.150700.17.23.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.34.1.150700.17.23.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-devel-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-macros-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-zfcpdump-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-docs-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-source-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP7:kernel-default-extra-6.4.0-150700.53.34.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-03-26T13:23:51Z",
"details": "moderate"
}
],
"title": "CVE-2026-23035"
},
{
"cve": "CVE-2026-23037",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2026-23037"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\ncan: etas_es58x: allow partial RX URB allocation to succeed\n\nWhen es58x_alloc_rx_urbs() fails to allocate the requested number of\nURBs but succeeds in allocating some, it returns an error code.\nThis causes es58x_open() to return early, skipping the cleanup label\n\u0027free_urbs\u0027, which leads to the anchored URBs being leaked.\n\nAs pointed out by maintainer Vincent Mailhol, the driver is designed\nto handle partial URB allocation gracefully. Therefore, partial\nallocation should not be treated as a fatal error.\n\nModify es58x_alloc_rx_urbs() to return 0 if at least one URB has been\nallocated, restoring the intended behavior and preventing the leak\nin es58x_open().",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_34-default-1-150700.15.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_34-default-1-150700.15.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_34-default-1-150700.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-devel-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.34.1.150700.17.23.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.34.1.150700.17.23.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.34.1.150700.17.23.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-devel-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-macros-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-zfcpdump-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-docs-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-source-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP7:kernel-default-extra-6.4.0-150700.53.34.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2026-23037",
"url": "https://www.suse.com/security/cve/CVE-2026-23037"
},
{
"category": "external",
"summary": "SUSE Bug 1257554 for CVE-2026-23037",
"url": "https://bugzilla.suse.com/1257554"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_34-default-1-150700.15.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_34-default-1-150700.15.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_34-default-1-150700.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-devel-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.34.1.150700.17.23.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.34.1.150700.17.23.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.34.1.150700.17.23.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-devel-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-macros-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-zfcpdump-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-docs-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-source-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP7:kernel-default-extra-6.4.0-150700.53.34.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 3.3,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_34-default-1-150700.15.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_34-default-1-150700.15.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_34-default-1-150700.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-devel-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.34.1.150700.17.23.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.34.1.150700.17.23.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.34.1.150700.17.23.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-devel-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-macros-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-zfcpdump-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-docs-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-source-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP7:kernel-default-extra-6.4.0-150700.53.34.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-03-26T13:23:51Z",
"details": "low"
}
],
"title": "CVE-2026-23037"
},
{
"cve": "CVE-2026-23038",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2026-23038"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\npnfs/flexfiles: Fix memory leak in nfs4_ff_alloc_deviceid_node()\n\nIn nfs4_ff_alloc_deviceid_node(), if the allocation for ds_versions fails,\nthe function jumps to the out_scratch label without freeing the already\nallocated dsaddrs list, leading to a memory leak.\n\nFix this by jumping to the out_err_drain_dsaddrs label, which properly\nfrees the dsaddrs list before cleaning up other resources.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_34-default-1-150700.15.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_34-default-1-150700.15.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_34-default-1-150700.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-devel-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.34.1.150700.17.23.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.34.1.150700.17.23.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.34.1.150700.17.23.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-devel-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-macros-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-zfcpdump-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-docs-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-source-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP7:kernel-default-extra-6.4.0-150700.53.34.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2026-23038",
"url": "https://www.suse.com/security/cve/CVE-2026-23038"
},
{
"category": "external",
"summary": "SUSE Bug 1257553 for CVE-2026-23038",
"url": "https://bugzilla.suse.com/1257553"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_34-default-1-150700.15.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_34-default-1-150700.15.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_34-default-1-150700.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-devel-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.34.1.150700.17.23.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.34.1.150700.17.23.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.34.1.150700.17.23.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-devel-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-macros-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-zfcpdump-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-docs-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-source-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP7:kernel-default-extra-6.4.0-150700.53.34.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 3.3,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_34-default-1-150700.15.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_34-default-1-150700.15.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_34-default-1-150700.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-devel-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.34.1.150700.17.23.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.34.1.150700.17.23.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.34.1.150700.17.23.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-devel-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-macros-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-zfcpdump-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-docs-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-source-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP7:kernel-default-extra-6.4.0-150700.53.34.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-03-26T13:23:51Z",
"details": "low"
}
],
"title": "CVE-2026-23038"
},
{
"cve": "CVE-2026-23049",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2026-23049"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\ndrm/panel-simple: fix connector type for DataImage SCF0700C48GGU18 panel\n\nThe connector type for the DataImage SCF0700C48GGU18 panel is missing and\ndevm_drm_panel_bridge_add() requires connector type to be set. This leads\nto a warning and a backtrace in the kernel log and panel does not work:\n\"\nWARNING: CPU: 3 PID: 38 at drivers/gpu/drm/bridge/panel.c:379 devm_drm_of_get_bridge+0xac/0xb8\n\"\nThe warning is triggered by a check for valid connector type in\ndevm_drm_panel_bridge_add(). If there is no valid connector type\nset for a panel, the warning is printed and panel is not added.\nFill in the missing connector type to fix the warning and make\nthe panel operational once again.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_34-default-1-150700.15.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_34-default-1-150700.15.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_34-default-1-150700.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-devel-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.34.1.150700.17.23.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.34.1.150700.17.23.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.34.1.150700.17.23.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-devel-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-macros-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-zfcpdump-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-docs-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-source-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP7:kernel-default-extra-6.4.0-150700.53.34.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2026-23049",
"url": "https://www.suse.com/security/cve/CVE-2026-23049"
},
{
"category": "external",
"summary": "SUSE Bug 1257723 for CVE-2026-23049",
"url": "https://bugzilla.suse.com/1257723"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_34-default-1-150700.15.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_34-default-1-150700.15.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_34-default-1-150700.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-devel-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.34.1.150700.17.23.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.34.1.150700.17.23.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.34.1.150700.17.23.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-devel-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-macros-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-zfcpdump-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-docs-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-source-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP7:kernel-default-extra-6.4.0-150700.53.34.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_34-default-1-150700.15.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_34-default-1-150700.15.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_34-default-1-150700.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-devel-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.34.1.150700.17.23.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.34.1.150700.17.23.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.34.1.150700.17.23.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-devel-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-macros-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-zfcpdump-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-docs-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-source-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP7:kernel-default-extra-6.4.0-150700.53.34.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-03-26T13:23:51Z",
"details": "moderate"
}
],
"title": "CVE-2026-23049"
},
{
"cve": "CVE-2026-23053",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2026-23053"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nNFS: Fix a deadlock involving nfs_release_folio()\n\nWang Zhaolong reports a deadlock involving NFSv4.1 state recovery\nwaiting on kthreadd, which is attempting to reclaim memory by calling\nnfs_release_folio(). The latter cannot make progress due to state\nrecovery being needed.\n\nIt seems that the only safe thing to do here is to kick off a writeback\nof the folio, without waiting for completion, or else kicking off an\nasynchronous commit.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_34-default-1-150700.15.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_34-default-1-150700.15.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_34-default-1-150700.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-devel-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.34.1.150700.17.23.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.34.1.150700.17.23.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.34.1.150700.17.23.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-devel-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-macros-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-zfcpdump-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-docs-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-source-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP7:kernel-default-extra-6.4.0-150700.53.34.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2026-23053",
"url": "https://www.suse.com/security/cve/CVE-2026-23053"
},
{
"category": "external",
"summary": "SUSE Bug 1257718 for CVE-2026-23053",
"url": "https://bugzilla.suse.com/1257718"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_34-default-1-150700.15.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_34-default-1-150700.15.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_34-default-1-150700.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-devel-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.34.1.150700.17.23.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.34.1.150700.17.23.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.34.1.150700.17.23.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-devel-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-macros-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-zfcpdump-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-docs-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-source-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP7:kernel-default-extra-6.4.0-150700.53.34.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.7,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_34-default-1-150700.15.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_34-default-1-150700.15.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_34-default-1-150700.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-devel-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.34.1.150700.17.23.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.34.1.150700.17.23.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.34.1.150700.17.23.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-devel-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-macros-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-zfcpdump-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-docs-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-source-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP7:kernel-default-extra-6.4.0-150700.53.34.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-03-26T13:23:51Z",
"details": "moderate"
}
],
"title": "CVE-2026-23053"
},
{
"cve": "CVE-2026-23054",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2026-23054"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nnet: hv_netvsc: reject RSS hash key programming without RX indirection table\n\nRSS configuration requires a valid RX indirection table. When the device\nreports a single receive queue, rndis_filter_device_add() does not\nallocate an indirection table, accepting RSS hash key updates in this\nstate leads to a hang.\n\nFix this by gating netvsc_set_rxfh() on ndc-\u003erx_table_sz and return\n-EOPNOTSUPP when the table is absent. This aligns set_rxfh with the device\ncapabilities and prevents incorrect behavior.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_34-default-1-150700.15.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_34-default-1-150700.15.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_34-default-1-150700.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-devel-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.34.1.150700.17.23.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.34.1.150700.17.23.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.34.1.150700.17.23.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-devel-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-macros-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-zfcpdump-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-docs-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-source-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP7:kernel-default-extra-6.4.0-150700.53.34.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2026-23054",
"url": "https://www.suse.com/security/cve/CVE-2026-23054"
},
{
"category": "external",
"summary": "SUSE Bug 1257732 for CVE-2026-23054",
"url": "https://bugzilla.suse.com/1257732"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_34-default-1-150700.15.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_34-default-1-150700.15.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_34-default-1-150700.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-devel-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.34.1.150700.17.23.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.34.1.150700.17.23.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.34.1.150700.17.23.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-devel-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-macros-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-zfcpdump-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-docs-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-source-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP7:kernel-default-extra-6.4.0-150700.53.34.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_34-default-1-150700.15.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_34-default-1-150700.15.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_34-default-1-150700.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-devel-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.34.1.150700.17.23.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.34.1.150700.17.23.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.34.1.150700.17.23.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-devel-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-macros-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-zfcpdump-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-docs-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-source-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP7:kernel-default-extra-6.4.0-150700.53.34.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-03-26T13:23:51Z",
"details": "moderate"
}
],
"title": "CVE-2026-23054"
},
{
"cve": "CVE-2026-23056",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2026-23056"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nuacce: implement mremap in uacce_vm_ops to return -EPERM\n\nThe current uacce_vm_ops does not support the mremap operation of\nvm_operations_struct. Implement .mremap to return -EPERM to remind\nusers.\n\nThe reason we need to explicitly disable mremap is that when the\ndriver does not implement .mremap, it uses the default mremap\nmethod. This could lead to a risk scenario:\n\nAn application might first mmap address p1, then mremap to p2,\nfollowed by munmap(p1), and finally munmap(p2). Since the default\nmremap copies the original vma\u0027s vm_private_data (i.e., q) to the\nnew vma, both munmap operations would trigger vma_close, causing\nq-\u003eqfr to be freed twice(qfr will be set to null here, so repeated\nrelease is ok).",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_34-default-1-150700.15.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_34-default-1-150700.15.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_34-default-1-150700.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-devel-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.34.1.150700.17.23.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.34.1.150700.17.23.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.34.1.150700.17.23.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-devel-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-macros-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-zfcpdump-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-docs-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-source-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP7:kernel-default-extra-6.4.0-150700.53.34.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2026-23056",
"url": "https://www.suse.com/security/cve/CVE-2026-23056"
},
{
"category": "external",
"summary": "SUSE Bug 1257729 for CVE-2026-23056",
"url": "https://bugzilla.suse.com/1257729"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_34-default-1-150700.15.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_34-default-1-150700.15.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_34-default-1-150700.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-devel-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.34.1.150700.17.23.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.34.1.150700.17.23.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.34.1.150700.17.23.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-devel-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-macros-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-zfcpdump-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-docs-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-source-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP7:kernel-default-extra-6.4.0-150700.53.34.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_34-default-1-150700.15.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_34-default-1-150700.15.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_34-default-1-150700.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-devel-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.34.1.150700.17.23.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.34.1.150700.17.23.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.34.1.150700.17.23.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-devel-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-macros-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-zfcpdump-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-docs-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-source-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP7:kernel-default-extra-6.4.0-150700.53.34.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-03-26T13:23:51Z",
"details": "moderate"
}
],
"title": "CVE-2026-23056"
},
{
"cve": "CVE-2026-23057",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2026-23057"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nvsock/virtio: Coalesce only linear skb\n\nvsock/virtio common tries to coalesce buffers in rx queue: if a linear skb\n(with a spare tail room) is followed by a small skb (length limited by\nGOOD_COPY_LEN = 128), an attempt is made to join them.\n\nSince the introduction of MSG_ZEROCOPY support, assumption that a small skb\nwill always be linear is incorrect. In the zerocopy case, data is lost and\nthe linear skb is appended with uninitialized kernel memory.\n\nOf all 3 supported virtio-based transports, only loopback-transport is\naffected. G2H virtio-transport rx queue operates on explicitly linear skbs;\nsee virtio_vsock_alloc_linear_skb() in virtio_vsock_rx_fill(). H2G\nvhost-transport may allocate non-linear skbs, but only for sizes that are\nnot considered for coalescence; see PAGE_ALLOC_COSTLY_ORDER in\nvirtio_vsock_alloc_skb().\n\nEnsure only linear skbs are coalesced. Note that skb_tailroom(last_skb) \u003e 0\nguarantees last_skb is linear.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_34-default-1-150700.15.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_34-default-1-150700.15.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_34-default-1-150700.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-devel-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.34.1.150700.17.23.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.34.1.150700.17.23.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.34.1.150700.17.23.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-devel-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-macros-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-zfcpdump-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-docs-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-source-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP7:kernel-default-extra-6.4.0-150700.53.34.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2026-23057",
"url": "https://www.suse.com/security/cve/CVE-2026-23057"
},
{
"category": "external",
"summary": "SUSE Bug 1257740 for CVE-2026-23057",
"url": "https://bugzilla.suse.com/1257740"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_34-default-1-150700.15.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_34-default-1-150700.15.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_34-default-1-150700.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-devel-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.34.1.150700.17.23.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.34.1.150700.17.23.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.34.1.150700.17.23.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-devel-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-macros-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-zfcpdump-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-docs-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-source-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP7:kernel-default-extra-6.4.0-150700.53.34.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.6,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_34-default-1-150700.15.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_34-default-1-150700.15.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_34-default-1-150700.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-devel-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.34.1.150700.17.23.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.34.1.150700.17.23.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.34.1.150700.17.23.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-devel-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-macros-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-zfcpdump-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-docs-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-source-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP7:kernel-default-extra-6.4.0-150700.53.34.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-03-26T13:23:51Z",
"details": "moderate"
}
],
"title": "CVE-2026-23057"
},
{
"cve": "CVE-2026-23058",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2026-23058"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\ncan: ems_usb: ems_usb_read_bulk_callback(): fix URB memory leak\n\nFix similar memory leak as in commit 7352e1d5932a (\"can: gs_usb:\ngs_usb_receive_bulk_callback(): fix URB memory leak\").\n\nIn ems_usb_open(), the URBs for USB-in transfers are allocated, added to\nthe dev-\u003erx_submitted anchor and submitted. In the complete callback\nems_usb_read_bulk_callback(), the URBs are processed and resubmitted. In\nems_usb_close() the URBs are freed by calling\nusb_kill_anchored_urbs(\u0026dev-\u003erx_submitted).\n\nHowever, this does not take into account that the USB framework unanchors\nthe URB before the complete function is called. This means that once an\nin-URB has been completed, it is no longer anchored and is ultimately not\nreleased in ems_usb_close().\n\nFix the memory leak by anchoring the URB in the\nems_usb_read_bulk_callback() to the dev-\u003erx_submitted anchor.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_34-default-1-150700.15.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_34-default-1-150700.15.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_34-default-1-150700.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-devel-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.34.1.150700.17.23.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.34.1.150700.17.23.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.34.1.150700.17.23.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-devel-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-macros-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-zfcpdump-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-docs-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-source-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP7:kernel-default-extra-6.4.0-150700.53.34.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2026-23058",
"url": "https://www.suse.com/security/cve/CVE-2026-23058"
},
{
"category": "external",
"summary": "SUSE Bug 1257739 for CVE-2026-23058",
"url": "https://bugzilla.suse.com/1257739"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_34-default-1-150700.15.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_34-default-1-150700.15.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_34-default-1-150700.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-devel-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.34.1.150700.17.23.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.34.1.150700.17.23.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.34.1.150700.17.23.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-devel-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-macros-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-zfcpdump-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-docs-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-source-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP7:kernel-default-extra-6.4.0-150700.53.34.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 3.3,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_34-default-1-150700.15.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_34-default-1-150700.15.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_34-default-1-150700.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-devel-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.34.1.150700.17.23.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.34.1.150700.17.23.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.34.1.150700.17.23.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-devel-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-macros-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-zfcpdump-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-docs-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-source-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP7:kernel-default-extra-6.4.0-150700.53.34.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-03-26T13:23:51Z",
"details": "low"
}
],
"title": "CVE-2026-23058"
},
{
"cve": "CVE-2026-23060",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2026-23060"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\ncrypto: authencesn - reject too-short AAD (assoclen\u003c8) to match ESP/ESN spec\n\nauthencesn assumes an ESP/ESN-formatted AAD. When assoclen is shorter than\nthe minimum expected length, crypto_authenc_esn_decrypt() can advance past\nthe end of the destination scatterlist and trigger a NULL pointer dereference\nin scatterwalk_map_and_copy(), leading to a kernel panic (DoS).\n\nAdd a minimum AAD length check to fail fast on invalid inputs.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_34-default-1-150700.15.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_34-default-1-150700.15.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_34-default-1-150700.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-devel-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.34.1.150700.17.23.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.34.1.150700.17.23.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.34.1.150700.17.23.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-devel-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-macros-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-zfcpdump-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-docs-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-source-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP7:kernel-default-extra-6.4.0-150700.53.34.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2026-23060",
"url": "https://www.suse.com/security/cve/CVE-2026-23060"
},
{
"category": "external",
"summary": "SUSE Bug 1257735 for CVE-2026-23060",
"url": "https://bugzilla.suse.com/1257735"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_34-default-1-150700.15.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_34-default-1-150700.15.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_34-default-1-150700.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-devel-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.34.1.150700.17.23.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.34.1.150700.17.23.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.34.1.150700.17.23.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-devel-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-macros-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-zfcpdump-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-docs-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-source-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP7:kernel-default-extra-6.4.0-150700.53.34.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_34-default-1-150700.15.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_34-default-1-150700.15.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_34-default-1-150700.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-devel-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.34.1.150700.17.23.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.34.1.150700.17.23.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.34.1.150700.17.23.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-devel-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-macros-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-zfcpdump-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-docs-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-source-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP7:kernel-default-extra-6.4.0-150700.53.34.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-03-26T13:23:51Z",
"details": "moderate"
}
],
"title": "CVE-2026-23060"
},
{
"cve": "CVE-2026-23061",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2026-23061"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\ncan: kvaser_usb: kvaser_usb_read_bulk_callback(): fix URB memory leak\n\nFix similar memory leak as in commit 7352e1d5932a (\"can: gs_usb:\ngs_usb_receive_bulk_callback(): fix URB memory leak\").\n\nIn kvaser_usb_set_{,data_}bittiming() -\u003e kvaser_usb_setup_rx_urbs(), the\nURBs for USB-in transfers are allocated, added to the dev-\u003erx_submitted\nanchor and submitted. In the complete callback\nkvaser_usb_read_bulk_callback(), the URBs are processed and resubmitted. In\nkvaser_usb_remove_interfaces() the URBs are freed by calling\nusb_kill_anchored_urbs(\u0026dev-\u003erx_submitted).\n\nHowever, this does not take into account that the USB framework unanchors\nthe URB before the complete function is called. This means that once an\nin-URB has been completed, it is no longer anchored and is ultimately not\nreleased in usb_kill_anchored_urbs().\n\nFix the memory leak by anchoring the URB in the\nkvaser_usb_read_bulk_callback() to the dev-\u003erx_submitted anchor.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_34-default-1-150700.15.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_34-default-1-150700.15.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_34-default-1-150700.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-devel-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.34.1.150700.17.23.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.34.1.150700.17.23.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.34.1.150700.17.23.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-devel-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-macros-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-zfcpdump-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-docs-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-source-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP7:kernel-default-extra-6.4.0-150700.53.34.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2026-23061",
"url": "https://www.suse.com/security/cve/CVE-2026-23061"
},
{
"category": "external",
"summary": "SUSE Bug 1257776 for CVE-2026-23061",
"url": "https://bugzilla.suse.com/1257776"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_34-default-1-150700.15.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_34-default-1-150700.15.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_34-default-1-150700.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-devel-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.34.1.150700.17.23.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.34.1.150700.17.23.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.34.1.150700.17.23.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-devel-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-macros-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-zfcpdump-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-docs-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-source-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP7:kernel-default-extra-6.4.0-150700.53.34.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.7,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_34-default-1-150700.15.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_34-default-1-150700.15.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_34-default-1-150700.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-devel-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.34.1.150700.17.23.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.34.1.150700.17.23.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.34.1.150700.17.23.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-devel-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-macros-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-zfcpdump-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-docs-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-source-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP7:kernel-default-extra-6.4.0-150700.53.34.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-03-26T13:23:51Z",
"details": "moderate"
}
],
"title": "CVE-2026-23061"
},
{
"cve": "CVE-2026-23062",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2026-23062"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nplatform/x86: hp-bioscfg: Fix kernel panic in GET_INSTANCE_ID macro\n\nThe GET_INSTANCE_ID macro that caused a kernel panic when accessing sysfs\nattributes:\n\n1. Off-by-one error: The loop condition used \u0027\u003c=\u0027 instead of \u0027\u003c\u0027,\n causing access beyond array bounds. Since array indices are 0-based\n and go from 0 to instances_count-1, the loop should use \u0027\u003c\u0027.\n\n2. Missing NULL check: The code dereferenced attr_name_kobj-\u003ename\n without checking if attr_name_kobj was NULL, causing a null pointer\n dereference in min_length_show() and other attribute show functions.\n\nThe panic occurred when fwupd tried to read BIOS configuration attributes:\n\n Oops: general protection fault [#1] SMP KASAN NOPTI\n KASAN: null-ptr-deref in range [0x0000000000000000-0x0000000000000007]\n RIP: 0010:min_length_show+0xcf/0x1d0 [hp_bioscfg]\n\nAdd a NULL check for attr_name_kobj before dereferencing and corrects\nthe loop boundary to match the pattern used elsewhere in the driver.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_34-default-1-150700.15.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_34-default-1-150700.15.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_34-default-1-150700.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-devel-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.34.1.150700.17.23.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.34.1.150700.17.23.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.34.1.150700.17.23.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-devel-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-macros-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-zfcpdump-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-docs-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-source-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP7:kernel-default-extra-6.4.0-150700.53.34.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2026-23062",
"url": "https://www.suse.com/security/cve/CVE-2026-23062"
},
{
"category": "external",
"summary": "SUSE Bug 1257734 for CVE-2026-23062",
"url": "https://bugzilla.suse.com/1257734"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_34-default-1-150700.15.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_34-default-1-150700.15.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_34-default-1-150700.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-devel-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.34.1.150700.17.23.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.34.1.150700.17.23.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.34.1.150700.17.23.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-devel-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-macros-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-zfcpdump-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-docs-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-source-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP7:kernel-default-extra-6.4.0-150700.53.34.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.1,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_34-default-1-150700.15.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_34-default-1-150700.15.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_34-default-1-150700.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-devel-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.34.1.150700.17.23.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.34.1.150700.17.23.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.34.1.150700.17.23.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-devel-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-macros-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-zfcpdump-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-docs-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-source-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP7:kernel-default-extra-6.4.0-150700.53.34.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-03-26T13:23:51Z",
"details": "moderate"
}
],
"title": "CVE-2026-23062"
},
{
"cve": "CVE-2026-23063",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2026-23063"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nuacce: ensure safe queue release with state management\n\nDirectly calling `put_queue` carries risks since it cannot\nguarantee that resources of `uacce_queue` have been fully released\nbeforehand. So adding a `stop_queue` operation for the\nUACCE_CMD_PUT_Q command and leaving the `put_queue` operation to\nthe final resource release ensures safety.\n\nQueue states are defined as follows:\n- UACCE_Q_ZOMBIE: Initial state\n- UACCE_Q_INIT: After opening `uacce`\n- UACCE_Q_STARTED: After `start` is issued via `ioctl`\n\nWhen executing `poweroff -f` in virt while accelerator are still\nworking, `uacce_fops_release` and `uacce_remove` may execute\nconcurrently. This can cause `uacce_put_queue` within\n`uacce_fops_release` to access a NULL `ops` pointer. Therefore, add\nstate checks to prevent accessing freed pointers.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_34-default-1-150700.15.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_34-default-1-150700.15.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_34-default-1-150700.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-devel-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.34.1.150700.17.23.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.34.1.150700.17.23.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.34.1.150700.17.23.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-devel-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-macros-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-zfcpdump-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-docs-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-source-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP7:kernel-default-extra-6.4.0-150700.53.34.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2026-23063",
"url": "https://www.suse.com/security/cve/CVE-2026-23063"
},
{
"category": "external",
"summary": "SUSE Bug 1257722 for CVE-2026-23063",
"url": "https://bugzilla.suse.com/1257722"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_34-default-1-150700.15.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_34-default-1-150700.15.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_34-default-1-150700.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-devel-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.34.1.150700.17.23.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.34.1.150700.17.23.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.34.1.150700.17.23.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-devel-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-macros-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-zfcpdump-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-docs-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-source-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP7:kernel-default-extra-6.4.0-150700.53.34.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_34-default-1-150700.15.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_34-default-1-150700.15.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_34-default-1-150700.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-devel-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.34.1.150700.17.23.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.34.1.150700.17.23.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.34.1.150700.17.23.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-devel-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-macros-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-zfcpdump-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-docs-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-source-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP7:kernel-default-extra-6.4.0-150700.53.34.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-03-26T13:23:51Z",
"details": "moderate"
}
],
"title": "CVE-2026-23063"
},
{
"cve": "CVE-2026-23064",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2026-23064"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nnet/sched: act_ife: avoid possible NULL deref\n\ntcf_ife_encode() must make sure ife_encode() does not return NULL.\n\nsyzbot reported:\n\nOops: general protection fault, probably for non-canonical address 0xdffffc0000000000: 0000 [#1] SMP KASAN NOPTI\nKASAN: null-ptr-deref in range [0x0000000000000000-0x0000000000000007]\n RIP: 0010:ife_tlv_meta_encode+0x41/0xa0 net/ife/ife.c:166\nCPU: 3 UID: 0 PID: 8990 Comm: syz.0.696 Not tainted syzkaller #0 PREEMPT(full)\nCall Trace:\n \u003cTASK\u003e\n ife_encode_meta_u32+0x153/0x180 net/sched/act_ife.c:101\n tcf_ife_encode net/sched/act_ife.c:841 [inline]\n tcf_ife_act+0x1022/0x1de0 net/sched/act_ife.c:877\n tc_act include/net/tc_wrapper.h:130 [inline]\n tcf_action_exec+0x1c0/0xa20 net/sched/act_api.c:1152\n tcf_exts_exec include/net/pkt_cls.h:349 [inline]\n mall_classify+0x1a0/0x2a0 net/sched/cls_matchall.c:42\n tc_classify include/net/tc_wrapper.h:197 [inline]\n __tcf_classify net/sched/cls_api.c:1764 [inline]\n tcf_classify+0x7f2/0x1380 net/sched/cls_api.c:1860\n multiq_classify net/sched/sch_multiq.c:39 [inline]\n multiq_enqueue+0xe0/0x510 net/sched/sch_multiq.c:66\n dev_qdisc_enqueue+0x45/0x250 net/core/dev.c:4147\n __dev_xmit_skb net/core/dev.c:4262 [inline]\n __dev_queue_xmit+0x2998/0x46c0 net/core/dev.c:4798",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_34-default-1-150700.15.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_34-default-1-150700.15.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_34-default-1-150700.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-devel-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.34.1.150700.17.23.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.34.1.150700.17.23.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.34.1.150700.17.23.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-devel-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-macros-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-zfcpdump-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-docs-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-source-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP7:kernel-default-extra-6.4.0-150700.53.34.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2026-23064",
"url": "https://www.suse.com/security/cve/CVE-2026-23064"
},
{
"category": "external",
"summary": "SUSE Bug 1257765 for CVE-2026-23064",
"url": "https://bugzilla.suse.com/1257765"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_34-default-1-150700.15.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_34-default-1-150700.15.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_34-default-1-150700.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-devel-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.34.1.150700.17.23.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.34.1.150700.17.23.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.34.1.150700.17.23.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-devel-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-macros-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-zfcpdump-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-docs-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-source-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP7:kernel-default-extra-6.4.0-150700.53.34.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_34-default-1-150700.15.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_34-default-1-150700.15.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_34-default-1-150700.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-devel-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.34.1.150700.17.23.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.34.1.150700.17.23.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.34.1.150700.17.23.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-devel-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-macros-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-zfcpdump-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-docs-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-source-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP7:kernel-default-extra-6.4.0-150700.53.34.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-03-26T13:23:51Z",
"details": "moderate"
}
],
"title": "CVE-2026-23064"
},
{
"cve": "CVE-2026-23065",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2026-23065"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nplatform/x86/amd: Fix memory leak in wbrf_record()\n\nThe tmp buffer is allocated using kcalloc() but is not freed if\nacpi_evaluate_dsm() fails. This causes a memory leak in the error path.\n\nFix this by explicitly freeing the tmp buffer in the error handling\npath of acpi_evaluate_dsm().",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_34-default-1-150700.15.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_34-default-1-150700.15.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_34-default-1-150700.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-devel-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.34.1.150700.17.23.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.34.1.150700.17.23.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.34.1.150700.17.23.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-devel-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-macros-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-zfcpdump-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-docs-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-source-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP7:kernel-default-extra-6.4.0-150700.53.34.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2026-23065",
"url": "https://www.suse.com/security/cve/CVE-2026-23065"
},
{
"category": "external",
"summary": "SUSE Bug 1257742 for CVE-2026-23065",
"url": "https://bugzilla.suse.com/1257742"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_34-default-1-150700.15.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_34-default-1-150700.15.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_34-default-1-150700.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-devel-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.34.1.150700.17.23.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.34.1.150700.17.23.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.34.1.150700.17.23.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-devel-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-macros-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-zfcpdump-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-docs-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-source-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP7:kernel-default-extra-6.4.0-150700.53.34.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_34-default-1-150700.15.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_34-default-1-150700.15.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_34-default-1-150700.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-devel-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.34.1.150700.17.23.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.34.1.150700.17.23.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.34.1.150700.17.23.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-devel-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-macros-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-zfcpdump-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-docs-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-source-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP7:kernel-default-extra-6.4.0-150700.53.34.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-03-26T13:23:51Z",
"details": "moderate"
}
],
"title": "CVE-2026-23065"
},
{
"cve": "CVE-2026-23068",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2026-23068"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nspi: spi-sprd-adi: Fix double free in probe error path\n\nThe driver currently uses spi_alloc_host() to allocate the controller\nbut registers it using devm_spi_register_controller().\n\nIf devm_register_restart_handler() fails, the code jumps to the\nput_ctlr label and calls spi_controller_put(). However, since the\ncontroller was registered via a devm function, the device core will\nautomatically call spi_controller_put() again when the probe fails.\nThis results in a double-free of the spi_controller structure.\n\nFix this by switching to devm_spi_alloc_host() and removing the\nmanual spi_controller_put() call.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_34-default-1-150700.15.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_34-default-1-150700.15.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_34-default-1-150700.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-devel-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.34.1.150700.17.23.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.34.1.150700.17.23.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.34.1.150700.17.23.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-devel-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-macros-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-zfcpdump-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-docs-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-source-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP7:kernel-default-extra-6.4.0-150700.53.34.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2026-23068",
"url": "https://www.suse.com/security/cve/CVE-2026-23068"
},
{
"category": "external",
"summary": "SUSE Bug 1257805 for CVE-2026-23068",
"url": "https://bugzilla.suse.com/1257805"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_34-default-1-150700.15.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_34-default-1-150700.15.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_34-default-1-150700.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-devel-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.34.1.150700.17.23.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.34.1.150700.17.23.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.34.1.150700.17.23.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-devel-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-macros-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-zfcpdump-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-docs-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-source-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP7:kernel-default-extra-6.4.0-150700.53.34.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_34-default-1-150700.15.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_34-default-1-150700.15.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_34-default-1-150700.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-devel-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.34.1.150700.17.23.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.34.1.150700.17.23.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.34.1.150700.17.23.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-devel-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-macros-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-zfcpdump-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-docs-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-source-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP7:kernel-default-extra-6.4.0-150700.53.34.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-03-26T13:23:51Z",
"details": "moderate"
}
],
"title": "CVE-2026-23068"
},
{
"cve": "CVE-2026-23069",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2026-23069"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nvsock/virtio: fix potential underflow in virtio_transport_get_credit()\n\nThe credit calculation in virtio_transport_get_credit() uses unsigned\narithmetic:\n\n ret = vvs-\u003epeer_buf_alloc - (vvs-\u003etx_cnt - vvs-\u003epeer_fwd_cnt);\n\nIf the peer shrinks its advertised buffer (peer_buf_alloc) while bytes\nare in flight, the subtraction can underflow and produce a large\npositive value, potentially allowing more data to be queued than the\npeer can handle.\n\nReuse virtio_transport_has_space() which already handles this case and\nadd a comment to make it clear why we are doing that.\n\n[Stefano: use virtio_transport_has_space() instead of duplicating the code]\n[Stefano: tweak the commit message]",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_34-default-1-150700.15.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_34-default-1-150700.15.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_34-default-1-150700.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-devel-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.34.1.150700.17.23.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.34.1.150700.17.23.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.34.1.150700.17.23.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-devel-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-macros-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-zfcpdump-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-docs-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-source-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP7:kernel-default-extra-6.4.0-150700.53.34.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2026-23069",
"url": "https://www.suse.com/security/cve/CVE-2026-23069"
},
{
"category": "external",
"summary": "SUSE Bug 1257755 for CVE-2026-23069",
"url": "https://bugzilla.suse.com/1257755"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_34-default-1-150700.15.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_34-default-1-150700.15.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_34-default-1-150700.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-devel-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.34.1.150700.17.23.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.34.1.150700.17.23.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.34.1.150700.17.23.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-devel-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-macros-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-zfcpdump-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-docs-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-source-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP7:kernel-default-extra-6.4.0-150700.53.34.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.7,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_34-default-1-150700.15.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_34-default-1-150700.15.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_34-default-1-150700.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-devel-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.34.1.150700.17.23.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.34.1.150700.17.23.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.34.1.150700.17.23.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-devel-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-macros-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-zfcpdump-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-docs-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-source-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP7:kernel-default-extra-6.4.0-150700.53.34.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-03-26T13:23:51Z",
"details": "moderate"
}
],
"title": "CVE-2026-23069"
},
{
"cve": "CVE-2026-23070",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2026-23070"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nOcteontx2-af: Add proper checks for fwdata\n\nfirmware populates MAC address, link modes (supported, advertised)\nand EEPROM data in shared firmware structure which kernel access\nvia MAC block(CGX/RPM).\n\nAccessing fwdata, on boards booted with out MAC block leading to\nkernel panics.\n\nInternal error: Oops: 0000000096000005 [#1] SMP\n[ 10.460721] Modules linked in:\n[ 10.463779] CPU: 0 UID: 0 PID: 174 Comm: kworker/0:3 Not tainted 6.19.0-rc5-00154-g76ec646abdf7-dirty #3 PREEMPT\n[ 10.474045] Hardware name: Marvell OcteonTX CN98XX board (DT)\n[ 10.479793] Workqueue: events work_for_cpu_fn\n[ 10.484159] pstate: 80400009 (Nzcv daif +PAN -UAO -TCO -DIT -SSBS BTYPE=--)\n[ 10.491124] pc : rvu_sdp_init+0x18/0x114\n[ 10.495051] lr : rvu_probe+0xe58/0x1d18",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_34-default-1-150700.15.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_34-default-1-150700.15.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_34-default-1-150700.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-devel-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.34.1.150700.17.23.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.34.1.150700.17.23.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.34.1.150700.17.23.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-devel-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-macros-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-zfcpdump-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-docs-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-source-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP7:kernel-default-extra-6.4.0-150700.53.34.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2026-23070",
"url": "https://www.suse.com/security/cve/CVE-2026-23070"
},
{
"category": "external",
"summary": "SUSE Bug 1257709 for CVE-2026-23070",
"url": "https://bugzilla.suse.com/1257709"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_34-default-1-150700.15.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_34-default-1-150700.15.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_34-default-1-150700.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-devel-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.34.1.150700.17.23.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.34.1.150700.17.23.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.34.1.150700.17.23.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-devel-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-macros-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-zfcpdump-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-docs-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-source-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP7:kernel-default-extra-6.4.0-150700.53.34.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_34-default-1-150700.15.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_34-default-1-150700.15.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_34-default-1-150700.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-devel-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.34.1.150700.17.23.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.34.1.150700.17.23.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.34.1.150700.17.23.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-devel-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-macros-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-zfcpdump-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-docs-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-source-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP7:kernel-default-extra-6.4.0-150700.53.34.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-03-26T13:23:51Z",
"details": "moderate"
}
],
"title": "CVE-2026-23070"
},
{
"cve": "CVE-2026-23071",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2026-23071"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nregmap: Fix race condition in hwspinlock irqsave routine\n\nPreviously, the address of the shared member \u0027\u0026map-\u003espinlock_flags\u0027 was\npassed directly to \u0027hwspin_lock_timeout_irqsave\u0027. This creates a race\ncondition where multiple contexts contending for the lock could overwrite\nthe shared flags variable, potentially corrupting the state for the\ncurrent lock owner.\n\nFix this by using a local stack variable \u0027flags\u0027 to store the IRQ state\ntemporarily.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_34-default-1-150700.15.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_34-default-1-150700.15.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_34-default-1-150700.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-devel-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.34.1.150700.17.23.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.34.1.150700.17.23.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.34.1.150700.17.23.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-devel-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-macros-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-zfcpdump-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-docs-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-source-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP7:kernel-default-extra-6.4.0-150700.53.34.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2026-23071",
"url": "https://www.suse.com/security/cve/CVE-2026-23071"
},
{
"category": "external",
"summary": "SUSE Bug 1257706 for CVE-2026-23071",
"url": "https://bugzilla.suse.com/1257706"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_34-default-1-150700.15.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_34-default-1-150700.15.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_34-default-1-150700.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-devel-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.34.1.150700.17.23.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.34.1.150700.17.23.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.34.1.150700.17.23.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-devel-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-macros-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-zfcpdump-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-docs-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-source-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP7:kernel-default-extra-6.4.0-150700.53.34.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_34-default-1-150700.15.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_34-default-1-150700.15.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_34-default-1-150700.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-devel-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.34.1.150700.17.23.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.34.1.150700.17.23.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.34.1.150700.17.23.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-devel-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-macros-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-zfcpdump-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-docs-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-source-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP7:kernel-default-extra-6.4.0-150700.53.34.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-03-26T13:23:51Z",
"details": "moderate"
}
],
"title": "CVE-2026-23071"
},
{
"cve": "CVE-2026-23073",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2026-23073"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nwifi: rsi: Fix memory corruption due to not set vif driver data size\n\nThe struct ieee80211_vif contains trailing space for vif driver data,\nwhen struct ieee80211_vif is allocated, the total memory size that is\nallocated is sizeof(struct ieee80211_vif) + size of vif driver data.\nThe size of vif driver data is set by each WiFi driver as needed.\n\nThe RSI911x driver does not set vif driver data size, no trailing space\nfor vif driver data is therefore allocated past struct ieee80211_vif .\nThe RSI911x driver does however use the vif driver data to store its\nvif driver data structure \"struct vif_priv\". An access to vif-\u003edrv_priv\nleads to access out of struct ieee80211_vif bounds and corruption of\nsome memory.\n\nIn case of the failure observed locally, rsi_mac80211_add_interface()\nwould write struct vif_priv *vif_info = (struct vif_priv *)vif-\u003edrv_priv;\nvif_info-\u003evap_id = vap_idx. This write corrupts struct fq_tin member\nstruct list_head new_flows . The flow = list_first_entry(head, struct\nfq_flow, flowchain); in fq_tin_reset() then reports non-NULL bogus\naddress, which when accessed causes a crash.\n\nThe trigger is very simple, boot the machine with init=/bin/sh , mount\ndevtmpfs, sysfs, procfs, and then do \"ip link set wlan0 up\", \"sleep 1\",\n\"ip link set wlan0 down\" and the crash occurs.\n\nFix this by setting the correct size of vif driver data, which is the\nsize of \"struct vif_priv\", so that memory is allocated and the driver\ncan store its driver data in it, instead of corrupting memory around\nit.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_34-default-1-150700.15.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_34-default-1-150700.15.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_34-default-1-150700.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-devel-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.34.1.150700.17.23.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.34.1.150700.17.23.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.34.1.150700.17.23.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-devel-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-macros-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-zfcpdump-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-docs-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-source-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP7:kernel-default-extra-6.4.0-150700.53.34.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2026-23073",
"url": "https://www.suse.com/security/cve/CVE-2026-23073"
},
{
"category": "external",
"summary": "SUSE Bug 1257707 for CVE-2026-23073",
"url": "https://bugzilla.suse.com/1257707"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_34-default-1-150700.15.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_34-default-1-150700.15.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_34-default-1-150700.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-devel-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.34.1.150700.17.23.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.34.1.150700.17.23.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.34.1.150700.17.23.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-devel-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-macros-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-zfcpdump-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-docs-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-source-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP7:kernel-default-extra-6.4.0-150700.53.34.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_34-default-1-150700.15.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_34-default-1-150700.15.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_34-default-1-150700.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-devel-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.34.1.150700.17.23.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.34.1.150700.17.23.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.34.1.150700.17.23.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-devel-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-macros-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-zfcpdump-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-docs-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-source-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP7:kernel-default-extra-6.4.0-150700.53.34.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-03-26T13:23:51Z",
"details": "moderate"
}
],
"title": "CVE-2026-23073"
},
{
"cve": "CVE-2026-23074",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2026-23074"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nnet/sched: Enforce that teql can only be used as root qdisc\n\nDesign intent of teql is that it is only supposed to be used as root qdisc.\nWe need to check for that constraint.\n\nAlthough not important, I will describe the scenario that unearthed this\nissue for the curious.\n\nGangMin Kim \u003ckm.kim1503@gmail.com\u003e managed to concot a scenario as follows:\n\nROOT qdisc 1:0 (QFQ)\n \u251c\u2500\u2500 class 1:1 (weight=15, lmax=16384) netem with delay 6.4s\n \u2500\u2500 class 1:2 (weight=1, lmax=1514) teql\n\nGangMin sends a packet which is enqueued to 1:1 (netem).\nAny invocation of dequeue by QFQ from this class will not return a packet\nuntil after 6.4s. In the meantime, a second packet is sent and it lands on\n1:2. teql\u0027s enqueue will return success and this will activate class 1:2.\nMain issue is that teql only updates the parent visible qlen (sch-\u003eq.qlen)\nat dequeue. Since QFQ will only call dequeue if peek succeeds (and teql\u0027s\npeek always returns NULL), dequeue will never be called and thus the qlen\nwill remain as 0. With that in mind, when GangMin updates 1:2\u0027s lmax value,\nthe qfq_change_class calls qfq_deact_rm_from_agg. Since the child qdisc\u0027s\nqlen was not incremented, qfq fails to deactivate the class, but still\nfrees its pointers from the aggregate. So when the first packet is\nrescheduled after 6.4 seconds (netem\u0027s delay), a dangling pointer is\naccessed causing GangMin\u0027s causing a UAF.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_34-default-1-150700.15.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_34-default-1-150700.15.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_34-default-1-150700.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-devel-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.34.1.150700.17.23.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.34.1.150700.17.23.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.34.1.150700.17.23.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-devel-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-macros-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-zfcpdump-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-docs-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-source-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP7:kernel-default-extra-6.4.0-150700.53.34.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2026-23074",
"url": "https://www.suse.com/security/cve/CVE-2026-23074"
},
{
"category": "external",
"summary": "SUSE Bug 1257749 for CVE-2026-23074",
"url": "https://bugzilla.suse.com/1257749"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_34-default-1-150700.15.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_34-default-1-150700.15.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_34-default-1-150700.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-devel-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.34.1.150700.17.23.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.34.1.150700.17.23.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.34.1.150700.17.23.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-devel-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-macros-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-zfcpdump-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-docs-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-source-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP7:kernel-default-extra-6.4.0-150700.53.34.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_34-default-1-150700.15.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_34-default-1-150700.15.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_34-default-1-150700.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-devel-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.34.1.150700.17.23.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.34.1.150700.17.23.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.34.1.150700.17.23.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-devel-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-macros-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-zfcpdump-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-docs-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-source-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP7:kernel-default-extra-6.4.0-150700.53.34.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-03-26T13:23:51Z",
"details": "important"
}
],
"title": "CVE-2026-23074"
},
{
"cve": "CVE-2026-23076",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2026-23076"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nALSA: ctxfi: Fix potential OOB access in audio mixer handling\n\nIn the audio mixer handling code of ctxfi driver, the conf field is\nused as a kind of loop index, and it\u0027s referred in the index callbacks\n(amixer_index() and sum_index()).\n\nAs spotted recently by fuzzers, the current code causes OOB access at\nthose functions.\n| UBSAN: array-index-out-of-bounds in /build/reproducible-path/linux-6.17.8/sound/pci/ctxfi/ctamixer.c:347:48\n| index 8 is out of range for type \u0027unsigned char [8]\u0027\n\nAfter the analysis, the cause was found to be the lack of the proper\n(re-)initialization of conj field.\n\nThis patch addresses those OOB accesses by adding the proper\ninitializations of the loop indices.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_34-default-1-150700.15.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_34-default-1-150700.15.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_34-default-1-150700.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-devel-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.34.1.150700.17.23.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.34.1.150700.17.23.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.34.1.150700.17.23.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-devel-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-macros-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-zfcpdump-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-docs-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-source-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP7:kernel-default-extra-6.4.0-150700.53.34.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2026-23076",
"url": "https://www.suse.com/security/cve/CVE-2026-23076"
},
{
"category": "external",
"summary": "SUSE Bug 1257788 for CVE-2026-23076",
"url": "https://bugzilla.suse.com/1257788"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_34-default-1-150700.15.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_34-default-1-150700.15.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_34-default-1-150700.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-devel-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.34.1.150700.17.23.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.34.1.150700.17.23.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.34.1.150700.17.23.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-devel-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-macros-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-zfcpdump-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-docs-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-source-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP7:kernel-default-extra-6.4.0-150700.53.34.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_34-default-1-150700.15.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_34-default-1-150700.15.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_34-default-1-150700.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-devel-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.34.1.150700.17.23.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.34.1.150700.17.23.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.34.1.150700.17.23.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-devel-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-macros-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-zfcpdump-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-docs-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-source-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP7:kernel-default-extra-6.4.0-150700.53.34.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-03-26T13:23:51Z",
"details": "moderate"
}
],
"title": "CVE-2026-23076"
},
{
"cve": "CVE-2026-23078",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2026-23078"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nALSA: scarlett2: Fix buffer overflow in config retrieval\n\nThe scarlett2_usb_get_config() function has a logic error in the\nendianness conversion code that can cause buffer overflows when\ncount \u003e 1.\n\nThe code checks `if (size == 2)` where `size` is the total buffer size in\nbytes, then loops `count` times treating each element as u16 (2 bytes).\nThis causes the loop to access `count * 2` bytes when the buffer only\nhas `size` bytes allocated.\n\nFix by checking the element size (config_item-\u003esize) instead of the\ntotal buffer size. This ensures the endianness conversion matches the\nactual element type.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_34-default-1-150700.15.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_34-default-1-150700.15.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_34-default-1-150700.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-devel-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.34.1.150700.17.23.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.34.1.150700.17.23.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.34.1.150700.17.23.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-devel-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-macros-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-zfcpdump-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-docs-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-source-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP7:kernel-default-extra-6.4.0-150700.53.34.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2026-23078",
"url": "https://www.suse.com/security/cve/CVE-2026-23078"
},
{
"category": "external",
"summary": "SUSE Bug 1257789 for CVE-2026-23078",
"url": "https://bugzilla.suse.com/1257789"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_34-default-1-150700.15.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_34-default-1-150700.15.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_34-default-1-150700.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-devel-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.34.1.150700.17.23.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.34.1.150700.17.23.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.34.1.150700.17.23.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-devel-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-macros-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-zfcpdump-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-docs-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-source-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP7:kernel-default-extra-6.4.0-150700.53.34.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:P/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_34-default-1-150700.15.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_34-default-1-150700.15.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_34-default-1-150700.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-devel-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.34.1.150700.17.23.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.34.1.150700.17.23.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.34.1.150700.17.23.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-devel-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-macros-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-zfcpdump-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-docs-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-source-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP7:kernel-default-extra-6.4.0-150700.53.34.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-03-26T13:23:51Z",
"details": "moderate"
}
],
"title": "CVE-2026-23078"
},
{
"cve": "CVE-2026-23080",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2026-23080"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\ncan: mcba_usb: mcba_usb_read_bulk_callback(): fix URB memory leak\n\nFix similar memory leak as in commit 7352e1d5932a (\"can: gs_usb:\ngs_usb_receive_bulk_callback(): fix URB memory leak\").\n\nIn mcba_usb_probe() -\u003e mcba_usb_start(), the URBs for USB-in transfers are\nallocated, added to the priv-\u003erx_submitted anchor and submitted. In the\ncomplete callback mcba_usb_read_bulk_callback(), the URBs are processed and\nresubmitted. In mcba_usb_close() -\u003e mcba_urb_unlink() the URBs are freed by\ncalling usb_kill_anchored_urbs(\u0026priv-\u003erx_submitted).\n\nHowever, this does not take into account that the USB framework unanchors\nthe URB before the complete function is called. This means that once an\nin-URB has been completed, it is no longer anchored and is ultimately not\nreleased in usb_kill_anchored_urbs().\n\nFix the memory leak by anchoring the URB in the\nmcba_usb_read_bulk_callback()to the priv-\u003erx_submitted anchor.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_34-default-1-150700.15.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_34-default-1-150700.15.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_34-default-1-150700.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-devel-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.34.1.150700.17.23.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.34.1.150700.17.23.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.34.1.150700.17.23.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-devel-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-macros-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-zfcpdump-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-docs-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-source-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP7:kernel-default-extra-6.4.0-150700.53.34.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2026-23080",
"url": "https://www.suse.com/security/cve/CVE-2026-23080"
},
{
"category": "external",
"summary": "SUSE Bug 1257714 for CVE-2026-23080",
"url": "https://bugzilla.suse.com/1257714"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_34-default-1-150700.15.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_34-default-1-150700.15.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_34-default-1-150700.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-devel-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.34.1.150700.17.23.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.34.1.150700.17.23.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.34.1.150700.17.23.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-devel-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-macros-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-zfcpdump-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-docs-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-source-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP7:kernel-default-extra-6.4.0-150700.53.34.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_34-default-1-150700.15.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_34-default-1-150700.15.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_34-default-1-150700.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-devel-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.34.1.150700.17.23.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.34.1.150700.17.23.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.34.1.150700.17.23.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-devel-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-macros-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-zfcpdump-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-docs-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-source-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP7:kernel-default-extra-6.4.0-150700.53.34.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-03-26T13:23:51Z",
"details": "moderate"
}
],
"title": "CVE-2026-23080"
},
{
"cve": "CVE-2026-23082",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2026-23082"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\ncan: gs_usb: gs_usb_receive_bulk_callback(): unanchor URL on usb_submit_urb() error\n\nIn commit 7352e1d5932a (\"can: gs_usb: gs_usb_receive_bulk_callback(): fix\nURB memory leak\"), the URB was re-anchored before usb_submit_urb() in\ngs_usb_receive_bulk_callback() to prevent a leak of this URB during\ncleanup.\n\nHowever, this patch did not take into account that usb_submit_urb() could\nfail. The URB remains anchored and\nusb_kill_anchored_urbs(\u0026parent-\u003erx_submitted) in gs_can_close() loops\ninfinitely since the anchor list never becomes empty.\n\nTo fix the bug, unanchor the URB when an usb_submit_urb() error occurs,\nalso print an info message.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_34-default-1-150700.15.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_34-default-1-150700.15.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_34-default-1-150700.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-devel-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.34.1.150700.17.23.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.34.1.150700.17.23.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.34.1.150700.17.23.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-devel-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-macros-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-zfcpdump-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-docs-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-source-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP7:kernel-default-extra-6.4.0-150700.53.34.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2026-23082",
"url": "https://www.suse.com/security/cve/CVE-2026-23082"
},
{
"category": "external",
"summary": "SUSE Bug 1257715 for CVE-2026-23082",
"url": "https://bugzilla.suse.com/1257715"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_34-default-1-150700.15.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_34-default-1-150700.15.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_34-default-1-150700.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-devel-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.34.1.150700.17.23.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.34.1.150700.17.23.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.34.1.150700.17.23.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-devel-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-macros-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-zfcpdump-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-docs-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-source-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP7:kernel-default-extra-6.4.0-150700.53.34.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_34-default-1-150700.15.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_34-default-1-150700.15.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_34-default-1-150700.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-devel-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.34.1.150700.17.23.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.34.1.150700.17.23.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.34.1.150700.17.23.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-devel-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-macros-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-zfcpdump-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-docs-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-source-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP7:kernel-default-extra-6.4.0-150700.53.34.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-03-26T13:23:51Z",
"details": "moderate"
}
],
"title": "CVE-2026-23082"
},
{
"cve": "CVE-2026-23083",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2026-23083"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nfou: Don\u0027t allow 0 for FOU_ATTR_IPPROTO.\n\nfou_udp_recv() has the same problem mentioned in the previous\npatch.\n\nIf FOU_ATTR_IPPROTO is set to 0, skb is not freed by\nfou_udp_recv() nor \"resubmit\"-ted in ip_protocol_deliver_rcu().\n\nLet\u0027s forbid 0 for FOU_ATTR_IPPROTO.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_34-default-1-150700.15.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_34-default-1-150700.15.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_34-default-1-150700.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-devel-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.34.1.150700.17.23.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.34.1.150700.17.23.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.34.1.150700.17.23.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-devel-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-macros-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-zfcpdump-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-docs-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-source-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP7:kernel-default-extra-6.4.0-150700.53.34.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2026-23083",
"url": "https://www.suse.com/security/cve/CVE-2026-23083"
},
{
"category": "external",
"summary": "SUSE Bug 1257745 for CVE-2026-23083",
"url": "https://bugzilla.suse.com/1257745"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_34-default-1-150700.15.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_34-default-1-150700.15.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_34-default-1-150700.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-devel-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.34.1.150700.17.23.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.34.1.150700.17.23.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.34.1.150700.17.23.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-devel-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-macros-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-zfcpdump-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-docs-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-source-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP7:kernel-default-extra-6.4.0-150700.53.34.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 3.3,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_34-default-1-150700.15.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_34-default-1-150700.15.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_34-default-1-150700.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-devel-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.34.1.150700.17.23.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.34.1.150700.17.23.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.34.1.150700.17.23.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-devel-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-macros-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-zfcpdump-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-docs-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-source-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP7:kernel-default-extra-6.4.0-150700.53.34.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-03-26T13:23:51Z",
"details": "low"
}
],
"title": "CVE-2026-23083"
},
{
"cve": "CVE-2026-23084",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2026-23084"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nbe2net: Fix NULL pointer dereference in be_cmd_get_mac_from_list\n\nWhen the parameter pmac_id_valid argument of be_cmd_get_mac_from_list() is\nset to false, the driver may request the PMAC_ID from the firmware of the\nnetwork card, and this function will store that PMAC_ID at the provided\naddress pmac_id. This is the contract of this function.\n\nHowever, there is a location within the driver where both\npmac_id_valid == false and pmac_id == NULL are being passed. This could\nresult in dereferencing a NULL pointer.\n\nTo resolve this issue, it is necessary to pass the address of a stub\nvariable to the function.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_34-default-1-150700.15.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_34-default-1-150700.15.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_34-default-1-150700.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-devel-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.34.1.150700.17.23.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.34.1.150700.17.23.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.34.1.150700.17.23.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-devel-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-macros-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-zfcpdump-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-docs-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-source-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP7:kernel-default-extra-6.4.0-150700.53.34.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2026-23084",
"url": "https://www.suse.com/security/cve/CVE-2026-23084"
},
{
"category": "external",
"summary": "SUSE Bug 1257830 for CVE-2026-23084",
"url": "https://bugzilla.suse.com/1257830"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_34-default-1-150700.15.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_34-default-1-150700.15.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_34-default-1-150700.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-devel-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.34.1.150700.17.23.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.34.1.150700.17.23.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.34.1.150700.17.23.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-devel-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-macros-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-zfcpdump-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-docs-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-source-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP7:kernel-default-extra-6.4.0-150700.53.34.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_34-default-1-150700.15.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_34-default-1-150700.15.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_34-default-1-150700.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-devel-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.34.1.150700.17.23.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.34.1.150700.17.23.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.34.1.150700.17.23.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-devel-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-macros-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-zfcpdump-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-docs-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-source-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP7:kernel-default-extra-6.4.0-150700.53.34.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-03-26T13:23:51Z",
"details": "moderate"
}
],
"title": "CVE-2026-23084"
},
{
"cve": "CVE-2026-23085",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2026-23085"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nirqchip/gic-v3-its: Avoid truncating memory addresses\n\nOn 32-bit machines with CONFIG_ARM_LPAE, it is possible for lowmem\nallocations to be backed by addresses physical memory above the 32-bit\naddress limit, as found while experimenting with larger VMSPLIT\nconfigurations.\n\nThis caused the qemu virt model to crash in the GICv3 driver, which\nallocates the \u0027itt\u0027 object using GFP_KERNEL. Since all memory below\nthe 4GB physical address limit is in ZONE_DMA in this configuration,\nkmalloc() defaults to higher addresses for ZONE_NORMAL, and the\nITS driver stores the physical address in a 32-bit \u0027unsigned long\u0027\nvariable.\n\nChange the itt_addr variable to the correct phys_addr_t type instead,\nalong with all other variables in this driver that hold a physical\naddress.\n\nThe gicv5 driver correctly uses u64 variables, while all other irqchip\ndrivers don\u0027t call virt_to_phys or similar interfaces. It\u0027s expected that\nother device drivers have similar issues, but fixing this one is\nsufficient for booting a virtio based guest.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_34-default-1-150700.15.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_34-default-1-150700.15.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_34-default-1-150700.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-devel-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.34.1.150700.17.23.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.34.1.150700.17.23.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.34.1.150700.17.23.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-devel-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-macros-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-zfcpdump-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-docs-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-source-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP7:kernel-default-extra-6.4.0-150700.53.34.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2026-23085",
"url": "https://www.suse.com/security/cve/CVE-2026-23085"
},
{
"category": "external",
"summary": "SUSE Bug 1257758 for CVE-2026-23085",
"url": "https://bugzilla.suse.com/1257758"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_34-default-1-150700.15.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_34-default-1-150700.15.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_34-default-1-150700.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-devel-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.34.1.150700.17.23.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.34.1.150700.17.23.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.34.1.150700.17.23.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-devel-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-macros-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-zfcpdump-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-docs-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-source-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP7:kernel-default-extra-6.4.0-150700.53.34.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_34-default-1-150700.15.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_34-default-1-150700.15.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_34-default-1-150700.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-devel-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.34.1.150700.17.23.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.34.1.150700.17.23.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.34.1.150700.17.23.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-devel-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-macros-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-zfcpdump-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-docs-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-source-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP7:kernel-default-extra-6.4.0-150700.53.34.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-03-26T13:23:51Z",
"details": "moderate"
}
],
"title": "CVE-2026-23085"
},
{
"cve": "CVE-2026-23086",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2026-23086"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nvsock/virtio: cap TX credit to local buffer size\n\nThe virtio transports derives its TX credit directly from peer_buf_alloc,\nwhich is set from the remote endpoint\u0027s SO_VM_SOCKETS_BUFFER_SIZE value.\n\nOn the host side this means that the amount of data we are willing to\nqueue for a connection is scaled by a guest-chosen buffer size, rather\nthan the host\u0027s own vsock configuration. A malicious guest can advertise\na large buffer and read slowly, causing the host to allocate a\ncorrespondingly large amount of sk_buff memory.\nThe same thing would happen in the guest with a malicious host, since\nvirtio transports share the same code base.\n\nIntroduce a small helper, virtio_transport_tx_buf_size(), that\nreturns min(peer_buf_alloc, buf_alloc), and use it wherever we consume\npeer_buf_alloc.\n\nThis ensures the effective TX window is bounded by both the peer\u0027s\nadvertised buffer and our own buf_alloc (already clamped to\nbuffer_max_size via SO_VM_SOCKETS_BUFFER_MAX_SIZE), so a remote peer\ncannot force the other to queue more data than allowed by its own\nvsock settings.\n\nOn an unpatched Ubuntu 22.04 host (~64 GiB RAM), running a PoC with\n32 guest vsock connections advertising 2 GiB each and reading slowly\ndrove Slab/SUnreclaim from ~0.5 GiB to ~57 GiB; the system only\nrecovered after killing the QEMU process. That said, if QEMU memory is\nlimited with cgroups, the maximum memory used will be limited.\n\nWith this patch applied:\n\n Before:\n MemFree: ~61.6 GiB\n Slab: ~142 MiB\n SUnreclaim: ~117 MiB\n\n After 32 high-credit connections:\n MemFree: ~61.5 GiB\n Slab: ~178 MiB\n SUnreclaim: ~152 MiB\n\nOnly ~35 MiB increase in Slab/SUnreclaim, no host OOM, and the guest\nremains responsive.\n\nCompatibility with non-virtio transports:\n\n - VMCI uses the AF_VSOCK buffer knobs to size its queue pairs per\n socket based on the local vsk-\u003ebuffer_* values; the remote side\n cannot enlarge those queues beyond what the local endpoint\n configured.\n\n - Hyper-V\u0027s vsock transport uses fixed-size VMBus ring buffers and\n an MTU bound; there is no peer-controlled credit field comparable\n to peer_buf_alloc, and the remote endpoint cannot drive in-flight\n kernel memory above those ring sizes.\n\n - The loopback path reuses virtio_transport_common.c, so it\n naturally follows the same semantics as the virtio transport.\n\nThis change is limited to virtio_transport_common.c and thus affects\nvirtio-vsock, vhost-vsock, and loopback, bringing them in line with the\n\"remote window intersected with local policy\" behaviour that VMCI and\nHyper-V already effectively have.\n\n[Stefano: small adjustments after changing the previous patch]\n[Stefano: tweak the commit message]",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_34-default-1-150700.15.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_34-default-1-150700.15.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_34-default-1-150700.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-devel-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.34.1.150700.17.23.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.34.1.150700.17.23.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.34.1.150700.17.23.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-devel-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-macros-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-zfcpdump-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-docs-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-source-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP7:kernel-default-extra-6.4.0-150700.53.34.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2026-23086",
"url": "https://www.suse.com/security/cve/CVE-2026-23086"
},
{
"category": "external",
"summary": "SUSE Bug 1257757 for CVE-2026-23086",
"url": "https://bugzilla.suse.com/1257757"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_34-default-1-150700.15.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_34-default-1-150700.15.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_34-default-1-150700.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-devel-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.34.1.150700.17.23.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.34.1.150700.17.23.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.34.1.150700.17.23.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-devel-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-macros-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-zfcpdump-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-docs-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-source-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP7:kernel-default-extra-6.4.0-150700.53.34.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_34-default-1-150700.15.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_34-default-1-150700.15.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_34-default-1-150700.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-devel-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.34.1.150700.17.23.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.34.1.150700.17.23.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.34.1.150700.17.23.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-devel-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-macros-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-zfcpdump-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-docs-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-source-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP7:kernel-default-extra-6.4.0-150700.53.34.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-03-26T13:23:51Z",
"details": "moderate"
}
],
"title": "CVE-2026-23086"
},
{
"cve": "CVE-2026-23088",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2026-23088"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\ntracing: Fix crash on synthetic stacktrace field usage\n\nWhen creating a synthetic event based on an existing synthetic event that\nhad a stacktrace field and the new synthetic event used that field a\nkernel crash occurred:\n\n ~# cd /sys/kernel/tracing\n ~# echo \u0027s:stack unsigned long stack[];\u0027 \u003e dynamic_events\n ~# echo \u0027hist:keys=prev_pid:s0=common_stacktrace if prev_state \u0026 3\u0027 \u003e\u003e events/sched/sched_switch/trigger\n ~# echo \u0027hist:keys=next_pid:s1=$s0:onmatch(sched.sched_switch).trace(stack,$s1)\u0027 \u003e\u003e events/sched/sched_switch/trigger\n\nThe above creates a synthetic event that takes a stacktrace when a task\nschedules out in a non-running state and passes that stacktrace to the\nsched_switch event when that task schedules back in. It triggers the\n\"stack\" synthetic event that has a stacktrace as its field (called \"stack\").\n\n ~# echo \u0027s:syscall_stack s64 id; unsigned long stack[];\u0027 \u003e\u003e dynamic_events\n ~# echo \u0027hist:keys=common_pid:s2=stack\u0027 \u003e\u003e events/synthetic/stack/trigger\n ~# echo \u0027hist:keys=common_pid:s3=$s2,i0=id:onmatch(synthetic.stack).trace(syscall_stack,$i0,$s3)\u0027 \u003e\u003e events/raw_syscalls/sys_exit/trigger\n\nThe above makes another synthetic event called \"syscall_stack\" that\nattaches the first synthetic event (stack) to the sys_exit trace event and\nrecords the stacktrace from the stack event with the id of the system call\nthat is exiting.\n\nWhen enabling this event (or using it in a historgram):\n\n ~# echo 1 \u003e events/synthetic/syscall_stack/enable\n\nProduces a kernel crash!\n\n BUG: unable to handle page fault for address: 0000000000400010\n #PF: supervisor read access in kernel mode\n #PF: error_code(0x0000) - not-present page\n PGD 0 P4D 0\n Oops: Oops: 0000 [#1] SMP PTI\n CPU: 6 UID: 0 PID: 1257 Comm: bash Not tainted 6.16.3+deb14-amd64 #1 PREEMPT(lazy) Debian 6.16.3-1\n Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.17.0-debian-1.17.0-1 04/01/2014\n RIP: 0010:trace_event_raw_event_synth+0x90/0x380\n Code: c5 00 00 00 00 85 d2 0f 84 e1 00 00 00 31 db eb 34 0f 1f 00 66 66 2e 0f 1f 84 00 00 00 00 00 66 66 2e 0f 1f 84 00 00 00 00 00 \u003c49\u003e 8b 04 24 48 83 c3 01 8d 0c c5 08 00 00 00 01 cd 41 3b 5d 40 0f\n RSP: 0018:ffffd2670388f958 EFLAGS: 00010202\n RAX: ffff8ba1065cc100 RBX: 0000000000000000 RCX: 0000000000000000\n RDX: 0000000000000001 RSI: fffff266ffda7b90 RDI: ffffd2670388f9b0\n RBP: 0000000000000010 R08: ffff8ba104e76000 R09: ffffd2670388fa50\n R10: ffff8ba102dd42e0 R11: ffffffff9a908970 R12: 0000000000400010\n R13: ffff8ba10a246400 R14: ffff8ba10a710220 R15: fffff266ffda7b90\n FS: 00007fa3bc63f740(0000) GS:ffff8ba2e0f48000(0000) knlGS:0000000000000000\n CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033\n CR2: 0000000000400010 CR3: 0000000107f9e003 CR4: 0000000000172ef0\n Call Trace:\n \u003cTASK\u003e\n ? __tracing_map_insert+0x208/0x3a0\n action_trace+0x67/0x70\n event_hist_trigger+0x633/0x6d0\n event_triggers_call+0x82/0x130\n trace_event_buffer_commit+0x19d/0x250\n trace_event_raw_event_sys_exit+0x62/0xb0\n syscall_exit_work+0x9d/0x140\n do_syscall_64+0x20a/0x2f0\n ? trace_event_raw_event_sched_switch+0x12b/0x170\n ? save_fpregs_to_fpstate+0x3e/0x90\n ? _raw_spin_unlock+0xe/0x30\n ? finish_task_switch.isra.0+0x97/0x2c0\n ? __rseq_handle_notify_resume+0xad/0x4c0\n ? __schedule+0x4b8/0xd00\n ? restore_fpregs_from_fpstate+0x3c/0x90\n ? switch_fpu_return+0x5b/0xe0\n ? do_syscall_64+0x1ef/0x2f0\n ? do_fault+0x2e9/0x540\n ? __handle_mm_fault+0x7d1/0xf70\n ? count_memcg_events+0x167/0x1d0\n ? handle_mm_fault+0x1d7/0x2e0\n ? do_user_addr_fault+0x2c3/0x7f0\n entry_SYSCALL_64_after_hwframe+0x76/0x7e\n\nThe reason is that the stacktrace field is not labeled as such, and is\ntreated as a normal field and not as a dynamic event that it is.\n\nIn trace_event_raw_event_synth() the event is field is still treated as a\ndynamic array, but the retrieval of the data is considered a normal field,\nand the reference is just the meta data:\n\n// Meta data is retrieved instead of a dynamic array\n---truncated---",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_34-default-1-150700.15.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_34-default-1-150700.15.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_34-default-1-150700.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-devel-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.34.1.150700.17.23.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.34.1.150700.17.23.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.34.1.150700.17.23.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-devel-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-macros-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-zfcpdump-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-docs-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-source-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP7:kernel-default-extra-6.4.0-150700.53.34.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2026-23088",
"url": "https://www.suse.com/security/cve/CVE-2026-23088"
},
{
"category": "external",
"summary": "SUSE Bug 1257814 for CVE-2026-23088",
"url": "https://bugzilla.suse.com/1257814"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_34-default-1-150700.15.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_34-default-1-150700.15.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_34-default-1-150700.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-devel-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.34.1.150700.17.23.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.34.1.150700.17.23.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.34.1.150700.17.23.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-devel-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-macros-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-zfcpdump-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-docs-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-source-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP7:kernel-default-extra-6.4.0-150700.53.34.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_34-default-1-150700.15.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_34-default-1-150700.15.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_34-default-1-150700.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-devel-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.34.1.150700.17.23.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.34.1.150700.17.23.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.34.1.150700.17.23.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-devel-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-macros-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-zfcpdump-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-docs-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-source-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP7:kernel-default-extra-6.4.0-150700.53.34.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-03-26T13:23:51Z",
"details": "moderate"
}
],
"title": "CVE-2026-23088"
},
{
"cve": "CVE-2026-23089",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2026-23089"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nALSA: usb-audio: Fix use-after-free in snd_usb_mixer_free()\n\nWhen snd_usb_create_mixer() fails, snd_usb_mixer_free() frees\nmixer-\u003eid_elems but the controls already added to the card still\nreference the freed memory. Later when snd_card_register() runs,\nthe OSS mixer layer calls their callbacks and hits a use-after-free read.\n\nCall trace:\n get_ctl_value+0x63f/0x820 sound/usb/mixer.c:411\n get_min_max_with_quirks.isra.0+0x240/0x1f40 sound/usb/mixer.c:1241\n mixer_ctl_feature_info+0x26b/0x490 sound/usb/mixer.c:1381\n snd_mixer_oss_build_test+0x174/0x3a0 sound/core/oss/mixer_oss.c:887\n ...\n snd_card_register+0x4ed/0x6d0 sound/core/init.c:923\n usb_audio_probe+0x5ef/0x2a90 sound/usb/card.c:1025\n\nFix by calling snd_ctl_remove() for all mixer controls before freeing\nid_elems. We save the next pointer first because snd_ctl_remove()\nfrees the current element.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_34-default-1-150700.15.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_34-default-1-150700.15.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_34-default-1-150700.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-devel-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.34.1.150700.17.23.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.34.1.150700.17.23.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.34.1.150700.17.23.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-devel-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-macros-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-zfcpdump-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-docs-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-source-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP7:kernel-default-extra-6.4.0-150700.53.34.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2026-23089",
"url": "https://www.suse.com/security/cve/CVE-2026-23089"
},
{
"category": "external",
"summary": "SUSE Bug 1257790 for CVE-2026-23089",
"url": "https://bugzilla.suse.com/1257790"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_34-default-1-150700.15.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_34-default-1-150700.15.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_34-default-1-150700.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-devel-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.34.1.150700.17.23.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.34.1.150700.17.23.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.34.1.150700.17.23.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-devel-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-macros-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-zfcpdump-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-docs-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-source-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP7:kernel-default-extra-6.4.0-150700.53.34.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.9,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_34-default-1-150700.15.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_34-default-1-150700.15.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_34-default-1-150700.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-devel-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.34.1.150700.17.23.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.34.1.150700.17.23.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.34.1.150700.17.23.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-devel-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-macros-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-zfcpdump-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-docs-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-source-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP7:kernel-default-extra-6.4.0-150700.53.34.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-03-26T13:23:51Z",
"details": "moderate"
}
],
"title": "CVE-2026-23089"
},
{
"cve": "CVE-2026-23090",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2026-23090"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nslimbus: core: fix device reference leak on report present\n\nSlimbus devices can be allocated dynamically upon reception of\nreport-present messages.\n\nMake sure to drop the reference taken when looking up already registered\ndevices.\n\nNote that this requires taking an extra reference in case the device has\nnot yet been registered and has to be allocated.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_34-default-1-150700.15.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_34-default-1-150700.15.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_34-default-1-150700.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-devel-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.34.1.150700.17.23.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.34.1.150700.17.23.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.34.1.150700.17.23.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-devel-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-macros-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-zfcpdump-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-docs-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-source-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP7:kernel-default-extra-6.4.0-150700.53.34.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2026-23090",
"url": "https://www.suse.com/security/cve/CVE-2026-23090"
},
{
"category": "external",
"summary": "SUSE Bug 1257759 for CVE-2026-23090",
"url": "https://bugzilla.suse.com/1257759"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_34-default-1-150700.15.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_34-default-1-150700.15.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_34-default-1-150700.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-devel-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.34.1.150700.17.23.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.34.1.150700.17.23.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.34.1.150700.17.23.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-devel-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-macros-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-zfcpdump-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-docs-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-source-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP7:kernel-default-extra-6.4.0-150700.53.34.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_34-default-1-150700.15.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_34-default-1-150700.15.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_34-default-1-150700.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-devel-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.34.1.150700.17.23.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.34.1.150700.17.23.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.34.1.150700.17.23.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-devel-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-macros-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-zfcpdump-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-docs-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-source-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP7:kernel-default-extra-6.4.0-150700.53.34.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-03-26T13:23:51Z",
"details": "moderate"
}
],
"title": "CVE-2026-23090"
},
{
"cve": "CVE-2026-23091",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2026-23091"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nintel_th: fix device leak on output open()\n\nMake sure to drop the reference taken when looking up the th device\nduring output device open() on errors and on close().\n\nNote that a recent commit fixed the leak in a couple of open() error\npaths but not all of them, and the reference is still leaking on\nsuccessful open().",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_34-default-1-150700.15.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_34-default-1-150700.15.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_34-default-1-150700.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-devel-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.34.1.150700.17.23.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.34.1.150700.17.23.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.34.1.150700.17.23.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-devel-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-macros-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-zfcpdump-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-docs-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-source-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP7:kernel-default-extra-6.4.0-150700.53.34.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2026-23091",
"url": "https://www.suse.com/security/cve/CVE-2026-23091"
},
{
"category": "external",
"summary": "SUSE Bug 1257813 for CVE-2026-23091",
"url": "https://bugzilla.suse.com/1257813"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_34-default-1-150700.15.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_34-default-1-150700.15.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_34-default-1-150700.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-devel-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.34.1.150700.17.23.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.34.1.150700.17.23.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.34.1.150700.17.23.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-devel-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-macros-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-zfcpdump-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-docs-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-source-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP7:kernel-default-extra-6.4.0-150700.53.34.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_34-default-1-150700.15.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_34-default-1-150700.15.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_34-default-1-150700.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-devel-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.34.1.150700.17.23.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.34.1.150700.17.23.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.34.1.150700.17.23.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-devel-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-macros-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-zfcpdump-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-docs-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-source-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP7:kernel-default-extra-6.4.0-150700.53.34.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-03-26T13:23:51Z",
"details": "moderate"
}
],
"title": "CVE-2026-23091"
},
{
"cve": "CVE-2026-23094",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2026-23094"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nuacce: fix isolate sysfs check condition\n\nuacce supports the device isolation feature. If the driver\nimplements the isolate_err_threshold_read and\nisolate_err_threshold_write callback functions, uacce will create\nsysfs files now. Users can read and configure the isolation policy\nthrough sysfs. Currently, sysfs files are created as long as either\nisolate_err_threshold_read or isolate_err_threshold_write callback\nfunctions are present.\n\nHowever, accessing a non-existent callback function may cause the\nsystem to crash. Therefore, intercept the creation of sysfs if\nneither read nor write exists; create sysfs if either is supported,\nbut intercept unsupported operations at the call site.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_34-default-1-150700.15.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_34-default-1-150700.15.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_34-default-1-150700.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-devel-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.34.1.150700.17.23.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.34.1.150700.17.23.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.34.1.150700.17.23.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-devel-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-macros-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-zfcpdump-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-docs-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-source-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP7:kernel-default-extra-6.4.0-150700.53.34.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2026-23094",
"url": "https://www.suse.com/security/cve/CVE-2026-23094"
},
{
"category": "external",
"summary": "SUSE Bug 1257811 for CVE-2026-23094",
"url": "https://bugzilla.suse.com/1257811"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_34-default-1-150700.15.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_34-default-1-150700.15.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_34-default-1-150700.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-devel-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.34.1.150700.17.23.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.34.1.150700.17.23.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.34.1.150700.17.23.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-devel-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-macros-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-zfcpdump-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-docs-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-source-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP7:kernel-default-extra-6.4.0-150700.53.34.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_34-default-1-150700.15.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_34-default-1-150700.15.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_34-default-1-150700.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-devel-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.34.1.150700.17.23.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.34.1.150700.17.23.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.34.1.150700.17.23.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-devel-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-macros-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-zfcpdump-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-docs-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-source-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP7:kernel-default-extra-6.4.0-150700.53.34.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-03-26T13:23:51Z",
"details": "moderate"
}
],
"title": "CVE-2026-23094"
},
{
"cve": "CVE-2026-23095",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2026-23095"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\ngue: Fix skb memleak with inner IP protocol 0.\n\nsyzbot reported skb memleak below. [0]\n\nThe repro generated a GUE packet with its inner protocol 0.\n\ngue_udp_recv() returns -guehdr-\u003eproto_ctype for \"resubmit\"\nin ip_protocol_deliver_rcu(), but this only works with\nnon-zero protocol number.\n\nLet\u0027s drop such packets.\n\nNote that 0 is a valid number (IPv6 Hop-by-Hop Option).\n\nI think it is not practical to encap HOPOPT in GUE, so once\nsomeone starts to complain, we could pass down a resubmit\nflag pointer to distinguish two zeros from the upper layer:\n\n * no error\n * resubmit HOPOPT\n\n[0]\nBUG: memory leak\nunreferenced object 0xffff888109695a00 (size 240):\n comm \"syz.0.17\", pid 6088, jiffies 4294943096\n hex dump (first 32 bytes):\n 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................\n 00 40 c2 10 81 88 ff ff 00 00 00 00 00 00 00 00 .@..............\n backtrace (crc a84b336f):\n kmemleak_alloc_recursive include/linux/kmemleak.h:44 [inline]\n slab_post_alloc_hook mm/slub.c:4958 [inline]\n slab_alloc_node mm/slub.c:5263 [inline]\n kmem_cache_alloc_noprof+0x3b4/0x590 mm/slub.c:5270\n __build_skb+0x23/0x60 net/core/skbuff.c:474\n build_skb+0x20/0x190 net/core/skbuff.c:490\n __tun_build_skb drivers/net/tun.c:1541 [inline]\n tun_build_skb+0x4a1/0xa40 drivers/net/tun.c:1636\n tun_get_user+0xc12/0x2030 drivers/net/tun.c:1770\n tun_chr_write_iter+0x71/0x120 drivers/net/tun.c:1999\n new_sync_write fs/read_write.c:593 [inline]\n vfs_write+0x45d/0x710 fs/read_write.c:686\n ksys_write+0xa7/0x170 fs/read_write.c:738\n do_syscall_x64 arch/x86/entry/syscall_64.c:63 [inline]\n do_syscall_64+0xa4/0xf80 arch/x86/entry/syscall_64.c:94\n entry_SYSCALL_64_after_hwframe+0x77/0x7f",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_34-default-1-150700.15.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_34-default-1-150700.15.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_34-default-1-150700.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-devel-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.34.1.150700.17.23.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.34.1.150700.17.23.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.34.1.150700.17.23.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-devel-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-macros-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-zfcpdump-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-docs-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-source-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP7:kernel-default-extra-6.4.0-150700.53.34.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2026-23095",
"url": "https://www.suse.com/security/cve/CVE-2026-23095"
},
{
"category": "external",
"summary": "SUSE Bug 1257808 for CVE-2026-23095",
"url": "https://bugzilla.suse.com/1257808"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_34-default-1-150700.15.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_34-default-1-150700.15.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_34-default-1-150700.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-devel-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.34.1.150700.17.23.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.34.1.150700.17.23.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.34.1.150700.17.23.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-devel-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-macros-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-zfcpdump-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-docs-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-source-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP7:kernel-default-extra-6.4.0-150700.53.34.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_34-default-1-150700.15.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_34-default-1-150700.15.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_34-default-1-150700.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-devel-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.34.1.150700.17.23.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.34.1.150700.17.23.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.34.1.150700.17.23.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-devel-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-macros-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-zfcpdump-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-docs-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-source-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP7:kernel-default-extra-6.4.0-150700.53.34.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-03-26T13:23:51Z",
"details": "moderate"
}
],
"title": "CVE-2026-23095"
},
{
"cve": "CVE-2026-23096",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2026-23096"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nuacce: fix cdev handling in the cleanup path\n\nWhen cdev_device_add fails, it internally releases the cdev memory,\nand if cdev_device_del is then executed, it will cause a hang error.\nTo fix it, we check the return value of cdev_device_add() and clear\nuacce-\u003ecdev to avoid calling cdev_device_del in the uacce_remove.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_34-default-1-150700.15.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_34-default-1-150700.15.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_34-default-1-150700.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-devel-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.34.1.150700.17.23.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.34.1.150700.17.23.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.34.1.150700.17.23.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-devel-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-macros-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-zfcpdump-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-docs-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-source-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP7:kernel-default-extra-6.4.0-150700.53.34.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2026-23096",
"url": "https://www.suse.com/security/cve/CVE-2026-23096"
},
{
"category": "external",
"summary": "SUSE Bug 1257809 for CVE-2026-23096",
"url": "https://bugzilla.suse.com/1257809"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_34-default-1-150700.15.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_34-default-1-150700.15.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_34-default-1-150700.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-devel-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.34.1.150700.17.23.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.34.1.150700.17.23.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.34.1.150700.17.23.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-devel-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-macros-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-zfcpdump-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-docs-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-source-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP7:kernel-default-extra-6.4.0-150700.53.34.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_34-default-1-150700.15.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_34-default-1-150700.15.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_34-default-1-150700.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-devel-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.34.1.150700.17.23.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.34.1.150700.17.23.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.34.1.150700.17.23.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-devel-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-macros-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-zfcpdump-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-docs-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-source-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP7:kernel-default-extra-6.4.0-150700.53.34.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-03-26T13:23:51Z",
"details": "moderate"
}
],
"title": "CVE-2026-23096"
},
{
"cve": "CVE-2026-23099",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2026-23099"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nbonding: limit BOND_MODE_8023AD to Ethernet devices\n\nBOND_MODE_8023AD makes sense for ARPHRD_ETHER only.\n\nsyzbot reported:\n\n BUG: KASAN: global-out-of-bounds in __hw_addr_create net/core/dev_addr_lists.c:63 [inline]\n BUG: KASAN: global-out-of-bounds in __hw_addr_add_ex+0x25d/0x760 net/core/dev_addr_lists.c:118\nRead of size 16 at addr ffffffff8bf94040 by task syz.1.3580/19497\n\nCPU: 1 UID: 0 PID: 19497 Comm: syz.1.3580 Tainted: G L syzkaller #0 PREEMPT(full)\nTainted: [L]=SOFTLOCKUP\nHardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/25/2025\nCall Trace:\n \u003cTASK\u003e\n dump_stack_lvl+0xe8/0x150 lib/dump_stack.c:120\n print_address_description mm/kasan/report.c:378 [inline]\n print_report+0xca/0x240 mm/kasan/report.c:482\n kasan_report+0x118/0x150 mm/kasan/report.c:595\n check_region_inline mm/kasan/generic.c:-1 [inline]\n kasan_check_range+0x2b0/0x2c0 mm/kasan/generic.c:200\n __asan_memcpy+0x29/0x70 mm/kasan/shadow.c:105\n __hw_addr_create net/core/dev_addr_lists.c:63 [inline]\n __hw_addr_add_ex+0x25d/0x760 net/core/dev_addr_lists.c:118\n __dev_mc_add net/core/dev_addr_lists.c:868 [inline]\n dev_mc_add+0xa1/0x120 net/core/dev_addr_lists.c:886\n bond_enslave+0x2b8b/0x3ac0 drivers/net/bonding/bond_main.c:2180\n do_set_master+0x533/0x6d0 net/core/rtnetlink.c:2963\n do_setlink+0xcf0/0x41c0 net/core/rtnetlink.c:3165\n rtnl_changelink net/core/rtnetlink.c:3776 [inline]\n __rtnl_newlink net/core/rtnetlink.c:3935 [inline]\n rtnl_newlink+0x161c/0x1c90 net/core/rtnetlink.c:4072\n rtnetlink_rcv_msg+0x7cf/0xb70 net/core/rtnetlink.c:6958\n netlink_rcv_skb+0x208/0x470 net/netlink/af_netlink.c:2550\n netlink_unicast_kernel net/netlink/af_netlink.c:1318 [inline]\n netlink_unicast+0x82f/0x9e0 net/netlink/af_netlink.c:1344\n netlink_sendmsg+0x805/0xb30 net/netlink/af_netlink.c:1894\n sock_sendmsg_nosec net/socket.c:727 [inline]\n __sock_sendmsg+0x21c/0x270 net/socket.c:742\n ____sys_sendmsg+0x505/0x820 net/socket.c:2592\n ___sys_sendmsg+0x21f/0x2a0 net/socket.c:2646\n __sys_sendmsg+0x164/0x220 net/socket.c:2678\n do_syscall_32_irqs_on arch/x86/entry/syscall_32.c:83 [inline]\n __do_fast_syscall_32+0x1dc/0x560 arch/x86/entry/syscall_32.c:307\n do_fast_syscall_32+0x34/0x80 arch/x86/entry/syscall_32.c:332\n entry_SYSENTER_compat_after_hwframe+0x84/0x8e\n \u003c/TASK\u003e\n\nThe buggy address belongs to the variable:\n lacpdu_mcast_addr+0x0/0x40",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_34-default-1-150700.15.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_34-default-1-150700.15.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_34-default-1-150700.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-devel-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.34.1.150700.17.23.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.34.1.150700.17.23.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.34.1.150700.17.23.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-devel-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-macros-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-zfcpdump-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-docs-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-source-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP7:kernel-default-extra-6.4.0-150700.53.34.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2026-23099",
"url": "https://www.suse.com/security/cve/CVE-2026-23099"
},
{
"category": "external",
"summary": "SUSE Bug 1257816 for CVE-2026-23099",
"url": "https://bugzilla.suse.com/1257816"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_34-default-1-150700.15.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_34-default-1-150700.15.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_34-default-1-150700.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-devel-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.34.1.150700.17.23.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.34.1.150700.17.23.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.34.1.150700.17.23.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-devel-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-macros-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-zfcpdump-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-docs-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-source-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP7:kernel-default-extra-6.4.0-150700.53.34.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_34-default-1-150700.15.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_34-default-1-150700.15.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_34-default-1-150700.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-devel-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.34.1.150700.17.23.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.34.1.150700.17.23.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.34.1.150700.17.23.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-devel-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-macros-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-zfcpdump-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-docs-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-source-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP7:kernel-default-extra-6.4.0-150700.53.34.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-03-26T13:23:51Z",
"details": "moderate"
}
],
"title": "CVE-2026-23099"
},
{
"cve": "CVE-2026-23101",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2026-23101"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nleds: led-class: Only Add LED to leds_list when it is fully ready\n\nBefore this change the LED was added to leds_list before led_init_core()\ngets called adding it the list before led_classdev.set_brightness_work gets\ninitialized.\n\nThis leaves a window where led_trigger_register() of a LED\u0027s default\ntrigger will call led_trigger_set() which calls led_set_brightness()\nwhich in turn will end up queueing the *uninitialized*\nled_classdev.set_brightness_work.\n\nThis race gets hit by the lenovo-thinkpad-t14s EC driver which registers\n2 LEDs with a default trigger provided by snd_ctl_led.ko in quick\nsuccession. The first led_classdev_register() causes an async modprobe of\nsnd_ctl_led to run and that async modprobe manages to exactly hit\nthe window where the second LED is on the leds_list without led_init_core()\nbeing called for it, resulting in:\n\n ------------[ cut here ]------------\n WARNING: CPU: 11 PID: 5608 at kernel/workqueue.c:4234 __flush_work+0x344/0x390\n Hardware name: LENOVO 21N2S01F0B/21N2S01F0B, BIOS N42ET93W (2.23 ) 09/01/2025\n ...\n Call trace:\n __flush_work+0x344/0x390 (P)\n flush_work+0x2c/0x50\n led_trigger_set+0x1c8/0x340\n led_trigger_register+0x17c/0x1c0\n led_trigger_register_simple+0x84/0xe8\n snd_ctl_led_init+0x40/0xf88 [snd_ctl_led]\n do_one_initcall+0x5c/0x318\n do_init_module+0x9c/0x2b8\n load_module+0x7e0/0x998\n\nClose the race window by moving the adding of the LED to leds_list to\nafter the led_init_core() call.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_34-default-1-150700.15.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_34-default-1-150700.15.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_34-default-1-150700.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-devel-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.34.1.150700.17.23.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.34.1.150700.17.23.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.34.1.150700.17.23.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-devel-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-macros-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-zfcpdump-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-docs-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-source-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP7:kernel-default-extra-6.4.0-150700.53.34.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2026-23101",
"url": "https://www.suse.com/security/cve/CVE-2026-23101"
},
{
"category": "external",
"summary": "SUSE Bug 1257768 for CVE-2026-23101",
"url": "https://bugzilla.suse.com/1257768"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_34-default-1-150700.15.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_34-default-1-150700.15.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_34-default-1-150700.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-devel-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.34.1.150700.17.23.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.34.1.150700.17.23.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.34.1.150700.17.23.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-devel-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-macros-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-zfcpdump-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-docs-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-source-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP7:kernel-default-extra-6.4.0-150700.53.34.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_34-default-1-150700.15.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_34-default-1-150700.15.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_34-default-1-150700.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-devel-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.34.1.150700.17.23.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.34.1.150700.17.23.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.34.1.150700.17.23.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-devel-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-macros-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-zfcpdump-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-docs-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-source-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP7:kernel-default-extra-6.4.0-150700.53.34.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-03-26T13:23:51Z",
"details": "moderate"
}
],
"title": "CVE-2026-23101"
},
{
"cve": "CVE-2026-23102",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2026-23102"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\narm64/fpsimd: signal: Fix restoration of SVE context\n\nWhen SME is supported, Restoring SVE signal context can go wrong in a\nfew ways, including placing the task into an invalid state where the\nkernel may read from out-of-bounds memory (and may potentially take a\nfatal fault) and/or may kill the task with a SIGKILL.\n\n(1) Restoring a context with SVE_SIG_FLAG_SM set can place the task into\n an invalid state where SVCR.SM is set (and sve_state is non-NULL)\n but TIF_SME is clear, consequently resuting in out-of-bounds memory\n reads and/or killing the task with SIGKILL.\n\n This can only occur in unusual (but legitimate) cases where the SVE\n signal context has either been modified by userspace or was saved in\n the context of another task (e.g. as with CRIU), as otherwise the\n presence of an SVE signal context with SVE_SIG_FLAG_SM implies that\n TIF_SME is already set.\n\n While in this state, task_fpsimd_load() will NOT configure SMCR_ELx\n (leaving some arbitrary value configured in hardware) before\n restoring SVCR and attempting to restore the streaming mode SVE\n registers from memory via sve_load_state(). As the value of\n SMCR_ELx.LEN may be larger than the task\u0027s streaming SVE vector\n length, this may read memory outside of the task\u0027s allocated\n sve_state, reading unrelated data and/or triggering a fault.\n\n While this can result in secrets being loaded into streaming SVE\n registers, these values are never exposed. As TIF_SME is clear,\n fpsimd_bind_task_to_cpu() will configure CPACR_ELx.SMEN to trap EL0\n accesses to streaming mode SVE registers, so these cannot be\n accessed directly at EL0. As fpsimd_save_user_state() verifies the\n live vector length before saving (S)SVE state to memory, no secret\n values can be saved back to memory (and hence cannot be observed via\n ptrace, signals, etc).\n\n When the live vector length doesn\u0027t match the expected vector length\n for the task, fpsimd_save_user_state() will send a fatal SIGKILL\n signal to the task. Hence the task may be killed after executing\n userspace for some period of time.\n\n(2) Restoring a context with SVE_SIG_FLAG_SM clear does not clear the\n task\u0027s SVCR.SM. If SVCR.SM was set prior to restoring the context,\n then the task will be left in streaming mode unexpectedly, and some\n register state will be combined inconsistently, though the task will\n be left in legitimate state from the kernel\u0027s PoV.\n\n This can only occur in unusual (but legitimate) cases where ptrace\n has been used to set SVCR.SM after entry to the sigreturn syscall,\n as syscall entry clears SVCR.SM.\n\n In these cases, the the provided SVE register data will be loaded\n into the task\u0027s sve_state using the non-streaming SVE vector length\n and the FPSIMD registers will be merged into this using the\n streaming SVE vector length.\n\nFix (1) by setting TIF_SME when setting SVCR.SM. This also requires\nensuring that the task\u0027s sme_state has been allocated, but as this could\ncontain live ZA state, it should not be zeroed. Fix (2) by clearing\nSVCR.SM when restoring a SVE signal context with SVE_SIG_FLAG_SM clear.\n\nFor consistency, I\u0027ve pulled the manipulation of SVCR, TIF_SVE, TIF_SME,\nand fp_type earlier, immediately after the allocation of\nsve_state/sme_state, before the restore of the actual register state.\nThis makes it easier to ensure that these are always modified\nconsistently, even if a fault is taken while reading the register data\nfrom the signal context. I do not expect any software to depend on the\nexact state restored when a fault is taken while reading the context.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_34-default-1-150700.15.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_34-default-1-150700.15.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_34-default-1-150700.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-devel-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.34.1.150700.17.23.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.34.1.150700.17.23.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.34.1.150700.17.23.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-devel-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-macros-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-zfcpdump-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-docs-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-source-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP7:kernel-default-extra-6.4.0-150700.53.34.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2026-23102",
"url": "https://www.suse.com/security/cve/CVE-2026-23102"
},
{
"category": "external",
"summary": "SUSE Bug 1257772 for CVE-2026-23102",
"url": "https://bugzilla.suse.com/1257772"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_34-default-1-150700.15.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_34-default-1-150700.15.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_34-default-1-150700.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-devel-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.34.1.150700.17.23.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.34.1.150700.17.23.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.34.1.150700.17.23.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-devel-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-macros-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-zfcpdump-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-docs-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-source-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP7:kernel-default-extra-6.4.0-150700.53.34.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_34-default-1-150700.15.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_34-default-1-150700.15.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_34-default-1-150700.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-devel-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.34.1.150700.17.23.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.34.1.150700.17.23.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.34.1.150700.17.23.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-devel-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-macros-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-zfcpdump-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-docs-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-source-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP7:kernel-default-extra-6.4.0-150700.53.34.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-03-26T13:23:51Z",
"details": "moderate"
}
],
"title": "CVE-2026-23102"
},
{
"cve": "CVE-2026-23104",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2026-23104"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nice: fix devlink reload call trace\n\nCommit 4da71a77fc3b (\"ice: read internal temperature sensor\") introduced\ninternal temperature sensor reading via HWMON. ice_hwmon_init() was added\nto ice_init_feature() and ice_hwmon_exit() was added to ice_remove(). As a\nresult if devlink reload is used to reinit the device and then the driver\nis removed, a call trace can occur.\n\nBUG: unable to handle page fault for address: ffffffffc0fd4b5d\nCall Trace:\n string+0x48/0xe0\n vsnprintf+0x1f9/0x650\n sprintf+0x62/0x80\n name_show+0x1f/0x30\n dev_attr_show+0x19/0x60\n\nThe call trace repeats approximately every 10 minutes when system\nmonitoring tools (e.g., sadc) attempt to read the orphaned hwmon sysfs\nattributes that reference freed module memory.\n\nThe sequence is:\n1. Driver load, ice_hwmon_init() gets called from ice_init_feature()\n2. Devlink reload down, flow does not call ice_remove()\n3. Devlink reload up, ice_hwmon_init() gets called from\n ice_init_feature() resulting in a second instance\n4. Driver unload, ice_hwmon_exit() called from ice_remove() leaving the\n first hwmon instance orphaned with dangling pointer\n\nFix this by moving ice_hwmon_exit() from ice_remove() to\nice_deinit_features() to ensure proper cleanup symmetry with\nice_hwmon_init().",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_34-default-1-150700.15.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_34-default-1-150700.15.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_34-default-1-150700.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-devel-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.34.1.150700.17.23.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.34.1.150700.17.23.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.34.1.150700.17.23.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-devel-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-macros-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-zfcpdump-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-docs-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-source-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP7:kernel-default-extra-6.4.0-150700.53.34.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2026-23104",
"url": "https://www.suse.com/security/cve/CVE-2026-23104"
},
{
"category": "external",
"summary": "SUSE Bug 1257763 for CVE-2026-23104",
"url": "https://bugzilla.suse.com/1257763"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_34-default-1-150700.15.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_34-default-1-150700.15.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_34-default-1-150700.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-devel-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.34.1.150700.17.23.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.34.1.150700.17.23.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.34.1.150700.17.23.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-devel-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-macros-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-zfcpdump-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-docs-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-source-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP7:kernel-default-extra-6.4.0-150700.53.34.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.1,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:L/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_34-default-1-150700.15.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_34-default-1-150700.15.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_34-default-1-150700.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-devel-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.34.1.150700.17.23.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.34.1.150700.17.23.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.34.1.150700.17.23.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-devel-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-macros-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-zfcpdump-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-docs-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-source-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP7:kernel-default-extra-6.4.0-150700.53.34.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-03-26T13:23:51Z",
"details": "moderate"
}
],
"title": "CVE-2026-23104"
},
{
"cve": "CVE-2026-23105",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2026-23105"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nnet/sched: qfq: Use cl_is_active to determine whether class is active in qfq_rm_from_ag\n\nThis is more of a preventive patch to make the code more consistent and\nto prevent possible exploits that employ child qlen manipulations on qfq.\nuse cl_is_active instead of relying on the child qdisc\u0027s qlen to determine\nclass activation.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_34-default-1-150700.15.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_34-default-1-150700.15.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_34-default-1-150700.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-devel-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.34.1.150700.17.23.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.34.1.150700.17.23.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.34.1.150700.17.23.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-devel-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-macros-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-zfcpdump-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-docs-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-source-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP7:kernel-default-extra-6.4.0-150700.53.34.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2026-23105",
"url": "https://www.suse.com/security/cve/CVE-2026-23105"
},
{
"category": "external",
"summary": "SUSE Bug 1257775 for CVE-2026-23105",
"url": "https://bugzilla.suse.com/1257775"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_34-default-1-150700.15.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_34-default-1-150700.15.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_34-default-1-150700.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-devel-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.34.1.150700.17.23.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.34.1.150700.17.23.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.34.1.150700.17.23.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-devel-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-macros-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-zfcpdump-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-docs-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-source-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP7:kernel-default-extra-6.4.0-150700.53.34.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.7,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_34-default-1-150700.15.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_34-default-1-150700.15.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_34-default-1-150700.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-devel-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.34.1.150700.17.23.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.34.1.150700.17.23.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.34.1.150700.17.23.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-devel-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-macros-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-zfcpdump-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-docs-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-source-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP7:kernel-default-extra-6.4.0-150700.53.34.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-03-26T13:23:51Z",
"details": "moderate"
}
],
"title": "CVE-2026-23105"
},
{
"cve": "CVE-2026-23107",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2026-23107"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\narm64/fpsimd: signal: Allocate SSVE storage when restoring ZA\n\nThe code to restore a ZA context doesn\u0027t attempt to allocate the task\u0027s\nsve_state before setting TIF_SME. Consequently, restoring a ZA context\ncan place a task into an invalid state where TIF_SME is set but the\ntask\u0027s sve_state is NULL.\n\nIn legitimate but uncommon cases where the ZA signal context was NOT\ncreated by the kernel in the context of the same task (e.g. if the task\nis saved/restored with something like CRIU), we have no guarantee that\nsve_state had been allocated previously. In these cases, userspace can\nenter streaming mode without trapping while sve_state is NULL, causing a\nlater NULL pointer dereference when the kernel attempts to store the\nregister state:\n\n| # ./sigreturn-za\n| Unable to handle kernel NULL pointer dereference at virtual address 0000000000000000\n| Mem abort info:\n| ESR = 0x0000000096000046\n| EC = 0x25: DABT (current EL), IL = 32 bits\n| SET = 0, FnV = 0\n| EA = 0, S1PTW = 0\n| FSC = 0x06: level 2 translation fault\n| Data abort info:\n| ISV = 0, ISS = 0x00000046, ISS2 = 0x00000000\n| CM = 0, WnR = 1, TnD = 0, TagAccess = 0\n| GCS = 0, Overlay = 0, DirtyBit = 0, Xs = 0\n| user pgtable: 4k pages, 52-bit VAs, pgdp=0000000101f47c00\n| [0000000000000000] pgd=08000001021d8403, p4d=0800000102274403, pud=0800000102275403, pmd=0000000000000000\n| Internal error: Oops: 0000000096000046 [#1] SMP\n| Modules linked in:\n| CPU: 0 UID: 0 PID: 153 Comm: sigreturn-za Not tainted 6.19.0-rc1 #1 PREEMPT\n| Hardware name: linux,dummy-virt (DT)\n| pstate: 214000c9 (nzCv daIF +PAN -UAO -TCO +DIT -SSBS BTYPE=--)\n| pc : sve_save_state+0x4/0xf0\n| lr : fpsimd_save_user_state+0xb0/0x1c0\n| sp : ffff80008070bcc0\n| x29: ffff80008070bcc0 x28: fff00000c1ca4c40 x27: 63cfa172fb5cf658\n| x26: fff00000c1ca5228 x25: 0000000000000000 x24: 0000000000000000\n| x23: 0000000000000000 x22: fff00000c1ca4c40 x21: fff00000c1ca4c40\n| x20: 0000000000000020 x19: fff00000ff6900f0 x18: 0000000000000000\n| x17: fff05e8e0311f000 x16: 0000000000000000 x15: 028fca8f3bdaf21c\n| x14: 0000000000000212 x13: fff00000c0209f10 x12: 0000000000000020\n| x11: 0000000000200b20 x10: 0000000000000000 x9 : fff00000ff69dcc0\n| x8 : 00000000000003f2 x7 : 0000000000000001 x6 : fff00000c1ca5b48\n| x5 : fff05e8e0311f000 x4 : 0000000008000000 x3 : 0000000000000000\n| x2 : 0000000000000001 x1 : fff00000c1ca5970 x0 : 0000000000000440\n| Call trace:\n| sve_save_state+0x4/0xf0 (P)\n| fpsimd_thread_switch+0x48/0x198\n| __switch_to+0x20/0x1c0\n| __schedule+0x36c/0xce0\n| schedule+0x34/0x11c\n| exit_to_user_mode_loop+0x124/0x188\n| el0_interrupt+0xc8/0xd8\n| __el0_irq_handler_common+0x18/0x24\n| el0t_64_irq_handler+0x10/0x1c\n| el0t_64_irq+0x198/0x19c\n| Code: 54000040 d51b4408 d65f03c0 d503245f (e5bb5800)\n| ---[ end trace 0000000000000000 ]---\n\nFix this by having restore_za_context() ensure that the task\u0027s sve_state\nis allocated, matching what we do when taking an SME trap. Any live\nSVE/SSVE state (which is restored earlier from a separate signal\ncontext) must be preserved, and hence this is not zeroed.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_34-default-1-150700.15.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_34-default-1-150700.15.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_34-default-1-150700.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-devel-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.34.1.150700.17.23.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.34.1.150700.17.23.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.34.1.150700.17.23.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-devel-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-macros-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-zfcpdump-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-docs-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-source-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP7:kernel-default-extra-6.4.0-150700.53.34.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2026-23107",
"url": "https://www.suse.com/security/cve/CVE-2026-23107"
},
{
"category": "external",
"summary": "SUSE Bug 1257762 for CVE-2026-23107",
"url": "https://bugzilla.suse.com/1257762"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_34-default-1-150700.15.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_34-default-1-150700.15.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_34-default-1-150700.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-devel-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.34.1.150700.17.23.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.34.1.150700.17.23.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.34.1.150700.17.23.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-devel-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-macros-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-zfcpdump-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-docs-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-source-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP7:kernel-default-extra-6.4.0-150700.53.34.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_34-default-1-150700.15.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_34-default-1-150700.15.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_34-default-1-150700.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-devel-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.34.1.150700.17.23.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.34.1.150700.17.23.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.34.1.150700.17.23.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-devel-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-macros-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-zfcpdump-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-docs-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-source-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP7:kernel-default-extra-6.4.0-150700.53.34.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-03-26T13:23:51Z",
"details": "moderate"
}
],
"title": "CVE-2026-23107"
},
{
"cve": "CVE-2026-23108",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2026-23108"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\ncan: usb_8dev: usb_8dev_read_bulk_callback(): fix URB memory leak\n\nFix similar memory leak as in commit 7352e1d5932a (\"can: gs_usb:\ngs_usb_receive_bulk_callback(): fix URB memory leak\").\n\nIn usb_8dev_open() -\u003e usb_8dev_start(), the URBs for USB-in transfers are\nallocated, added to the priv-\u003erx_submitted anchor and submitted. In the\ncomplete callback usb_8dev_read_bulk_callback(), the URBs are processed and\nresubmitted. In usb_8dev_close() -\u003e unlink_all_urbs() the URBs are freed by\ncalling usb_kill_anchored_urbs(\u0026priv-\u003erx_submitted).\n\nHowever, this does not take into account that the USB framework unanchors\nthe URB before the complete function is called. This means that once an\nin-URB has been completed, it is no longer anchored and is ultimately not\nreleased in usb_kill_anchored_urbs().\n\nFix the memory leak by anchoring the URB in the\nusb_8dev_read_bulk_callback() to the priv-\u003erx_submitted anchor.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_34-default-1-150700.15.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_34-default-1-150700.15.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_34-default-1-150700.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-devel-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.34.1.150700.17.23.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.34.1.150700.17.23.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.34.1.150700.17.23.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-devel-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-macros-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-zfcpdump-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-docs-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-source-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP7:kernel-default-extra-6.4.0-150700.53.34.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2026-23108",
"url": "https://www.suse.com/security/cve/CVE-2026-23108"
},
{
"category": "external",
"summary": "SUSE Bug 1257770 for CVE-2026-23108",
"url": "https://bugzilla.suse.com/1257770"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_34-default-1-150700.15.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_34-default-1-150700.15.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_34-default-1-150700.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-devel-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.34.1.150700.17.23.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.34.1.150700.17.23.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.34.1.150700.17.23.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-devel-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-macros-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-zfcpdump-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-docs-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-source-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP7:kernel-default-extra-6.4.0-150700.53.34.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_34-default-1-150700.15.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_34-default-1-150700.15.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_34-default-1-150700.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-devel-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.34.1.150700.17.23.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.34.1.150700.17.23.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.34.1.150700.17.23.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-devel-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-macros-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-zfcpdump-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-docs-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-source-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP7:kernel-default-extra-6.4.0-150700.53.34.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-03-26T13:23:51Z",
"details": "moderate"
}
],
"title": "CVE-2026-23108"
},
{
"cve": "CVE-2026-23110",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2026-23110"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nscsi: core: Wake up the error handler when final completions race against each other\n\nThe fragile ordering between marking commands completed or failed so\nthat the error handler only wakes when the last running command\ncompletes or times out has race conditions. These race conditions can\ncause the SCSI layer to fail to wake the error handler, leaving I/O\nthrough the SCSI host stuck as the error state cannot advance.\n\nFirst, there is an memory ordering issue within scsi_dec_host_busy().\nThe write which clears SCMD_STATE_INFLIGHT may be reordered with reads\ncounting in scsi_host_busy(). While the local CPU will see its own\nwrite, reordering can allow other CPUs in scsi_dec_host_busy() or\nscsi_eh_inc_host_failed() to see a raised busy count, causing no CPU to\nsee a host busy equal to the host_failed count.\n\nThis race condition can be prevented with a memory barrier on the error\npath to force the write to be visible before counting host busy\ncommands.\n\nSecond, there is a general ordering issue with scsi_eh_inc_host_failed(). By\ncounting busy commands before incrementing host_failed, it can race with a\nfinal command in scsi_dec_host_busy(), such that scsi_dec_host_busy() does\nnot see host_failed incremented but scsi_eh_inc_host_failed() counts busy\ncommands before SCMD_STATE_INFLIGHT is cleared by scsi_dec_host_busy(),\nresulting in neither waking the error handler task.\n\nThis needs the call to scsi_host_busy() to be moved after host_failed is\nincremented to close the race condition.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_34-default-1-150700.15.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_34-default-1-150700.15.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_34-default-1-150700.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-devel-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.34.1.150700.17.23.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.34.1.150700.17.23.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.34.1.150700.17.23.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-devel-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-macros-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-zfcpdump-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-docs-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-source-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP7:kernel-default-extra-6.4.0-150700.53.34.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2026-23110",
"url": "https://www.suse.com/security/cve/CVE-2026-23110"
},
{
"category": "external",
"summary": "SUSE Bug 1257761 for CVE-2026-23110",
"url": "https://bugzilla.suse.com/1257761"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_34-default-1-150700.15.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_34-default-1-150700.15.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_34-default-1-150700.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-devel-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.34.1.150700.17.23.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.34.1.150700.17.23.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.34.1.150700.17.23.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-devel-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-macros-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-zfcpdump-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-docs-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-source-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP7:kernel-default-extra-6.4.0-150700.53.34.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.7,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_34-default-1-150700.15.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_34-default-1-150700.15.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_34-default-1-150700.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-devel-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.34.1.150700.17.23.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.34.1.150700.17.23.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.34.1.150700.17.23.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-devel-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-macros-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-zfcpdump-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-docs-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-source-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP7:kernel-default-extra-6.4.0-150700.53.34.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-03-26T13:23:51Z",
"details": "moderate"
}
],
"title": "CVE-2026-23110"
},
{
"cve": "CVE-2026-23111",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2026-23111"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nnetfilter: nf_tables: fix inverted genmask check in nft_map_catchall_activate()\n\nnft_map_catchall_activate() has an inverted element activity check\ncompared to its non-catchall counterpart nft_mapelem_activate() and\ncompared to what is logically required.\n\nnft_map_catchall_activate() is called from the abort path to re-activate\ncatchall map elements that were deactivated during a failed transaction.\nIt should skip elements that are already active (they don\u0027t need\nre-activation) and process elements that are inactive (they need to be\nrestored). Instead, the current code does the opposite: it skips inactive\nelements and processes active ones.\n\nCompare the non-catchall activate callback, which is correct:\n\n nft_mapelem_activate():\n if (nft_set_elem_active(ext, iter-\u003egenmask))\n return 0; /* skip active, process inactive */\n\nWith the buggy catchall version:\n\n nft_map_catchall_activate():\n if (!nft_set_elem_active(ext, genmask))\n continue; /* skip inactive, process active */\n\nThe consequence is that when a DELSET operation is aborted,\nnft_setelem_data_activate() is never called for the catchall element.\nFor NFT_GOTO verdict elements, this means nft_data_hold() is never\ncalled to restore the chain-\u003euse reference count. Each abort cycle\npermanently decrements chain-\u003euse. Once chain-\u003euse reaches zero,\nDELCHAIN succeeds and frees the chain while catchall verdict elements\nstill reference it, resulting in a use-after-free.\n\nThis is exploitable for local privilege escalation from an unprivileged\nuser via user namespaces + nftables on distributions that enable\nCONFIG_USER_NS and CONFIG_NF_TABLES.\n\nFix by removing the negation so the check matches nft_mapelem_activate():\nskip active elements, process inactive ones.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_34-default-1-150700.15.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_34-default-1-150700.15.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_34-default-1-150700.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-devel-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.34.1.150700.17.23.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.34.1.150700.17.23.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.34.1.150700.17.23.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-devel-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-macros-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-zfcpdump-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-docs-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-source-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP7:kernel-default-extra-6.4.0-150700.53.34.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2026-23111",
"url": "https://www.suse.com/security/cve/CVE-2026-23111"
},
{
"category": "external",
"summary": "SUSE Bug 1258181 for CVE-2026-23111",
"url": "https://bugzilla.suse.com/1258181"
},
{
"category": "external",
"summary": "SUSE Bug 1258183 for CVE-2026-23111",
"url": "https://bugzilla.suse.com/1258183"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_34-default-1-150700.15.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_34-default-1-150700.15.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_34-default-1-150700.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-devel-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.34.1.150700.17.23.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.34.1.150700.17.23.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.34.1.150700.17.23.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-devel-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-macros-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-zfcpdump-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-docs-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-source-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP7:kernel-default-extra-6.4.0-150700.53.34.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_34-default-1-150700.15.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_34-default-1-150700.15.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_34-default-1-150700.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-devel-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.34.1.150700.17.23.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.34.1.150700.17.23.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.34.1.150700.17.23.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-devel-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-macros-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-zfcpdump-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-docs-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-source-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP7:kernel-default-extra-6.4.0-150700.53.34.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-03-26T13:23:51Z",
"details": "important"
}
],
"title": "CVE-2026-23111"
},
{
"cve": "CVE-2026-23112",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2026-23112"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nnvmet-tcp: add bounds checks in nvmet_tcp_build_pdu_iovec\n\nnvmet_tcp_build_pdu_iovec() could walk past cmd-\u003ereq.sg when a PDU\nlength or offset exceeds sg_cnt and then use bogus sg-\u003elength/offset\nvalues, leading to _copy_to_iter() GPF/KASAN. Guard sg_idx, remaining\nentries, and sg-\u003elength/offset before building the bvec.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_34-default-1-150700.15.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_34-default-1-150700.15.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_34-default-1-150700.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-devel-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.34.1.150700.17.23.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.34.1.150700.17.23.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.34.1.150700.17.23.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-devel-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-macros-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-zfcpdump-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-docs-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-source-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP7:kernel-default-extra-6.4.0-150700.53.34.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2026-23112",
"url": "https://www.suse.com/security/cve/CVE-2026-23112"
},
{
"category": "external",
"summary": "SUSE Bug 1258184 for CVE-2026-23112",
"url": "https://bugzilla.suse.com/1258184"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_34-default-1-150700.15.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_34-default-1-150700.15.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_34-default-1-150700.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-devel-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.34.1.150700.17.23.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.34.1.150700.17.23.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.34.1.150700.17.23.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-devel-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-macros-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-zfcpdump-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-docs-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-source-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP7:kernel-default-extra-6.4.0-150700.53.34.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.1,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_34-default-1-150700.15.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_34-default-1-150700.15.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_34-default-1-150700.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-devel-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.34.1.150700.17.23.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.34.1.150700.17.23.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.34.1.150700.17.23.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-devel-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-macros-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-zfcpdump-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-docs-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-source-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP7:kernel-default-extra-6.4.0-150700.53.34.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-03-26T13:23:51Z",
"details": "moderate"
}
],
"title": "CVE-2026-23112"
},
{
"cve": "CVE-2026-23113",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2026-23113"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nio_uring/io-wq: check IO_WQ_BIT_EXIT inside work run loop\n\nCurrently this is checked before running the pending work. Normally this\nis quite fine, as work items either end up blocking (which will create a\nnew worker for other items), or they complete fairly quickly. But syzbot\nreports an issue where io-wq takes seemingly forever to exit, and with a\nbit of debugging, this turns out to be because it queues a bunch of big\n(2GB - 4096b) reads with a /dev/msr* file. Since this file type doesn\u0027t\nsupport -\u003eread_iter(), loop_rw_iter() ends up handling them. Each read\nreturns 16MB of data read, which takes 20 (!!) seconds. With a bunch of\nthese pending, processing the whole chain can take a long time. Easily\nlonger than the syzbot uninterruptible sleep timeout of 140 seconds.\nThis then triggers a complaint off the io-wq exit path:\n\nINFO: task syz.4.135:6326 blocked for more than 143 seconds.\n Not tainted syzkaller #0\n Blocked by coredump.\n\"echo 0 \u003e /proc/sys/kernel/hung_task_timeout_secs\" disables this message.\ntask:syz.4.135 state:D stack:26824 pid:6326 tgid:6324 ppid:5957 task_flags:0x400548 flags:0x00080000\nCall Trace:\n \u003cTASK\u003e\n context_switch kernel/sched/core.c:5256 [inline]\n __schedule+0x1139/0x6150 kernel/sched/core.c:6863\n __schedule_loop kernel/sched/core.c:6945 [inline]\n schedule+0xe7/0x3a0 kernel/sched/core.c:6960\n schedule_timeout+0x257/0x290 kernel/time/sleep_timeout.c:75\n do_wait_for_common kernel/sched/completion.c:100 [inline]\n __wait_for_common+0x2fc/0x4e0 kernel/sched/completion.c:121\n io_wq_exit_workers io_uring/io-wq.c:1328 [inline]\n io_wq_put_and_exit+0x271/0x8a0 io_uring/io-wq.c:1356\n io_uring_clean_tctx+0x10d/0x190 io_uring/tctx.c:203\n io_uring_cancel_generic+0x69c/0x9a0 io_uring/cancel.c:651\n io_uring_files_cancel include/linux/io_uring.h:19 [inline]\n do_exit+0x2ce/0x2bd0 kernel/exit.c:911\n do_group_exit+0xd3/0x2a0 kernel/exit.c:1112\n get_signal+0x2671/0x26d0 kernel/signal.c:3034\n arch_do_signal_or_restart+0x8f/0x7e0 arch/x86/kernel/signal.c:337\n __exit_to_user_mode_loop kernel/entry/common.c:41 [inline]\n exit_to_user_mode_loop+0x8c/0x540 kernel/entry/common.c:75\n __exit_to_user_mode_prepare include/linux/irq-entry-common.h:226 [inline]\n syscall_exit_to_user_mode_prepare include/linux/irq-entry-common.h:256 [inline]\n syscall_exit_to_user_mode_work include/linux/entry-common.h:159 [inline]\n syscall_exit_to_user_mode include/linux/entry-common.h:194 [inline]\n do_syscall_64+0x4ee/0xf80 arch/x86/entry/syscall_64.c:100\n entry_SYSCALL_64_after_hwframe+0x77/0x7f\nRIP: 0033:0x7fa02738f749\nRSP: 002b:00007fa0281ae0e8 EFLAGS: 00000246 ORIG_RAX: 00000000000000ca\nRAX: fffffffffffffe00 RBX: 00007fa0275e6098 RCX: 00007fa02738f749\nRDX: 0000000000000000 RSI: 0000000000000080 RDI: 00007fa0275e6098\nRBP: 00007fa0275e6090 R08: 0000000000000000 R09: 0000000000000000\nR10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000\nR13: 00007fa0275e6128 R14: 00007fff14e4fcb0 R15: 00007fff14e4fd98\n\nThere\u0027s really nothing wrong here, outside of processing these reads\nwill take a LONG time. However, we can speed up the exit by checking the\nIO_WQ_BIT_EXIT inside the io_worker_handle_work() loop, as syzbot will\nexit the ring after queueing up all of these reads. Then once the first\nitem is processed, io-wq will simply cancel the rest. That should avoid\nsyzbot running into this complaint again.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_34-default-1-150700.15.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_34-default-1-150700.15.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_34-default-1-150700.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-devel-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.34.1.150700.17.23.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.34.1.150700.17.23.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.34.1.150700.17.23.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-devel-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-macros-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-zfcpdump-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-docs-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-source-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP7:kernel-default-extra-6.4.0-150700.53.34.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2026-23113",
"url": "https://www.suse.com/security/cve/CVE-2026-23113"
},
{
"category": "external",
"summary": "SUSE Bug 1258278 for CVE-2026-23113",
"url": "https://bugzilla.suse.com/1258278"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_34-default-1-150700.15.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_34-default-1-150700.15.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_34-default-1-150700.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-devel-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.34.1.150700.17.23.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.34.1.150700.17.23.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.34.1.150700.17.23.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-devel-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-macros-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-zfcpdump-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-docs-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-source-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP7:kernel-default-extra-6.4.0-150700.53.34.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_34-default-1-150700.15.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_34-default-1-150700.15.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_34-default-1-150700.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-devel-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.34.1.150700.17.23.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.34.1.150700.17.23.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.34.1.150700.17.23.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-devel-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-macros-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-zfcpdump-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-docs-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-source-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP7:kernel-default-extra-6.4.0-150700.53.34.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-03-26T13:23:51Z",
"details": "moderate"
}
],
"title": "CVE-2026-23113"
},
{
"cve": "CVE-2026-23116",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2026-23116"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\npmdomain: imx8m-blk-ctrl: Remove separate rst and clk mask for 8mq vpu\n\nFor i.MX8MQ platform, the ADB in the VPUMIX domain has no separate reset\nand clock enable bits, but is ungated and reset together with the VPUs.\nSo we can\u0027t reset G1 or G2 separately, it may led to the system hang.\nRemove rst_mask and clk_mask of imx8mq_vpu_blk_ctl_domain_data.\nLet imx8mq_vpu_power_notifier() do really vpu reset.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_34-default-1-150700.15.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_34-default-1-150700.15.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_34-default-1-150700.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-devel-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.34.1.150700.17.23.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.34.1.150700.17.23.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.34.1.150700.17.23.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-devel-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-macros-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-zfcpdump-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-docs-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-source-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP7:kernel-default-extra-6.4.0-150700.53.34.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2026-23116",
"url": "https://www.suse.com/security/cve/CVE-2026-23116"
},
{
"category": "external",
"summary": "SUSE Bug 1258277 for CVE-2026-23116",
"url": "https://bugzilla.suse.com/1258277"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_34-default-1-150700.15.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_34-default-1-150700.15.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_34-default-1-150700.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-devel-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.34.1.150700.17.23.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.34.1.150700.17.23.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.34.1.150700.17.23.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-devel-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-macros-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-zfcpdump-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-docs-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-source-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP7:kernel-default-extra-6.4.0-150700.53.34.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_34-default-1-150700.15.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_34-default-1-150700.15.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_34-default-1-150700.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-devel-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.34.1.150700.17.23.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.34.1.150700.17.23.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.34.1.150700.17.23.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-devel-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-macros-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-zfcpdump-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-docs-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-source-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP7:kernel-default-extra-6.4.0-150700.53.34.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-03-26T13:23:51Z",
"details": "moderate"
}
],
"title": "CVE-2026-23116"
},
{
"cve": "CVE-2026-23119",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2026-23119"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nbonding: provide a net pointer to __skb_flow_dissect()\n\nAfter 3cbf4ffba5ee (\"net: plumb network namespace into __skb_flow_dissect\")\nwe have to provide a net pointer to __skb_flow_dissect(),\neither via skb-\u003edev, skb-\u003esk, or a user provided pointer.\n\nIn the following case, syzbot was able to cook a bare skb.\n\nWARNING: net/core/flow_dissector.c:1131 at __skb_flow_dissect+0xb57/0x68b0 net/core/flow_dissector.c:1131, CPU#1: syz.2.1418/11053\nCall Trace:\n \u003cTASK\u003e\n bond_flow_dissect drivers/net/bonding/bond_main.c:4093 [inline]\n __bond_xmit_hash+0x2d7/0xba0 drivers/net/bonding/bond_main.c:4157\n bond_xmit_hash_xdp drivers/net/bonding/bond_main.c:4208 [inline]\n bond_xdp_xmit_3ad_xor_slave_get drivers/net/bonding/bond_main.c:5139 [inline]\n bond_xdp_get_xmit_slave+0x1fd/0x710 drivers/net/bonding/bond_main.c:5515\n xdp_master_redirect+0x13f/0x2c0 net/core/filter.c:4388\n bpf_prog_run_xdp include/net/xdp.h:700 [inline]\n bpf_test_run+0x6b2/0x7d0 net/bpf/test_run.c:421\n bpf_prog_test_run_xdp+0x795/0x10e0 net/bpf/test_run.c:1390\n bpf_prog_test_run+0x2c7/0x340 kernel/bpf/syscall.c:4703\n __sys_bpf+0x562/0x860 kernel/bpf/syscall.c:6182\n __do_sys_bpf kernel/bpf/syscall.c:6274 [inline]\n __se_sys_bpf kernel/bpf/syscall.c:6272 [inline]\n __x64_sys_bpf+0x7c/0x90 kernel/bpf/syscall.c:6272\n do_syscall_x64 arch/x86/entry/syscall_64.c:63 [inline]\n do_syscall_64+0xec/0xf80 arch/x86/entry/syscall_64.c:94",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_34-default-1-150700.15.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_34-default-1-150700.15.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_34-default-1-150700.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-devel-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.34.1.150700.17.23.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.34.1.150700.17.23.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.34.1.150700.17.23.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-devel-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-macros-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-zfcpdump-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-docs-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-source-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP7:kernel-default-extra-6.4.0-150700.53.34.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2026-23119",
"url": "https://www.suse.com/security/cve/CVE-2026-23119"
},
{
"category": "external",
"summary": "SUSE Bug 1258273 for CVE-2026-23119",
"url": "https://bugzilla.suse.com/1258273"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_34-default-1-150700.15.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_34-default-1-150700.15.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_34-default-1-150700.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-devel-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.34.1.150700.17.23.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.34.1.150700.17.23.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.34.1.150700.17.23.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-devel-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-macros-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-zfcpdump-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-docs-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-source-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP7:kernel-default-extra-6.4.0-150700.53.34.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_34-default-1-150700.15.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_34-default-1-150700.15.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_34-default-1-150700.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-devel-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.34.1.150700.17.23.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.34.1.150700.17.23.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.34.1.150700.17.23.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-devel-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-macros-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-zfcpdump-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-docs-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-source-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP7:kernel-default-extra-6.4.0-150700.53.34.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-03-26T13:23:51Z",
"details": "moderate"
}
],
"title": "CVE-2026-23119"
},
{
"cve": "CVE-2026-23121",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2026-23121"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nmISDN: annotate data-race around dev-\u003ework\n\ndev-\u003ework can re read locklessly in mISDN_read()\nand mISDN_poll(). Add READ_ONCE()/WRITE_ONCE() annotations.\n\nBUG: KCSAN: data-race in mISDN_ioctl / mISDN_read\n\nwrite to 0xffff88812d848280 of 4 bytes by task 10864 on cpu 1:\n misdn_add_timer drivers/isdn/mISDN/timerdev.c:175 [inline]\n mISDN_ioctl+0x2fb/0x550 drivers/isdn/mISDN/timerdev.c:233\n vfs_ioctl fs/ioctl.c:51 [inline]\n __do_sys_ioctl fs/ioctl.c:597 [inline]\n __se_sys_ioctl+0xce/0x140 fs/ioctl.c:583\n __x64_sys_ioctl+0x43/0x50 fs/ioctl.c:583\n x64_sys_call+0x14b0/0x3000 arch/x86/include/generated/asm/syscalls_64.h:17\n do_syscall_x64 arch/x86/entry/syscall_64.c:63 [inline]\n do_syscall_64+0xd8/0x2c0 arch/x86/entry/syscall_64.c:94\n entry_SYSCALL_64_after_hwframe+0x77/0x7f\n\nread to 0xffff88812d848280 of 4 bytes by task 10857 on cpu 0:\n mISDN_read+0x1f2/0x470 drivers/isdn/mISDN/timerdev.c:112\n do_loop_readv_writev fs/read_write.c:847 [inline]\n vfs_readv+0x3fb/0x690 fs/read_write.c:1020\n do_readv+0xe7/0x210 fs/read_write.c:1080\n __do_sys_readv fs/read_write.c:1165 [inline]\n __se_sys_readv fs/read_write.c:1162 [inline]\n __x64_sys_readv+0x45/0x50 fs/read_write.c:1162\n x64_sys_call+0x2831/0x3000 arch/x86/include/generated/asm/syscalls_64.h:20\n do_syscall_x64 arch/x86/entry/syscall_64.c:63 [inline]\n do_syscall_64+0xd8/0x2c0 arch/x86/entry/syscall_64.c:94\n entry_SYSCALL_64_after_hwframe+0x77/0x7f\n\nvalue changed: 0x00000000 -\u003e 0x00000001",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_34-default-1-150700.15.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_34-default-1-150700.15.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_34-default-1-150700.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-devel-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.34.1.150700.17.23.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.34.1.150700.17.23.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.34.1.150700.17.23.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-devel-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-macros-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-zfcpdump-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-docs-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-source-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP7:kernel-default-extra-6.4.0-150700.53.34.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2026-23121",
"url": "https://www.suse.com/security/cve/CVE-2026-23121"
},
{
"category": "external",
"summary": "SUSE Bug 1258309 for CVE-2026-23121",
"url": "https://bugzilla.suse.com/1258309"
},
{
"category": "external",
"summary": "SUSE Bug 1259135 for CVE-2026-23121",
"url": "https://bugzilla.suse.com/1259135"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_34-default-1-150700.15.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_34-default-1-150700.15.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_34-default-1-150700.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-devel-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.34.1.150700.17.23.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.34.1.150700.17.23.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.34.1.150700.17.23.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-devel-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-macros-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-zfcpdump-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-docs-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-source-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP7:kernel-default-extra-6.4.0-150700.53.34.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_34-default-1-150700.15.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_34-default-1-150700.15.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_34-default-1-150700.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-devel-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.34.1.150700.17.23.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.34.1.150700.17.23.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.34.1.150700.17.23.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-devel-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-macros-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-zfcpdump-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-docs-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-source-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP7:kernel-default-extra-6.4.0-150700.53.34.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-03-26T13:23:51Z",
"details": "important"
}
],
"title": "CVE-2026-23121"
},
{
"cve": "CVE-2026-23125",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2026-23125"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nsctp: move SCTP_CMD_ASSOC_SHKEY right after SCTP_CMD_PEER_INIT\n\nA null-ptr-deref was reported in the SCTP transmit path when SCTP-AUTH key\ninitialization fails:\n\n ==================================================================\n KASAN: null-ptr-deref in range [0x0000000000000018-0x000000000000001f]\n CPU: 0 PID: 16 Comm: ksoftirqd/0 Tainted: G W 6.6.0 #2\n RIP: 0010:sctp_packet_bundle_auth net/sctp/output.c:264 [inline]\n RIP: 0010:sctp_packet_append_chunk+0xb36/0x1260 net/sctp/output.c:401\n Call Trace:\n\n sctp_packet_transmit_chunk+0x31/0x250 net/sctp/output.c:189\n sctp_outq_flush_data+0xa29/0x26d0 net/sctp/outqueue.c:1111\n sctp_outq_flush+0xc80/0x1240 net/sctp/outqueue.c:1217\n sctp_cmd_interpreter.isra.0+0x19a5/0x62c0 net/sctp/sm_sideeffect.c:1787\n sctp_side_effects net/sctp/sm_sideeffect.c:1198 [inline]\n sctp_do_sm+0x1a3/0x670 net/sctp/sm_sideeffect.c:1169\n sctp_assoc_bh_rcv+0x33e/0x640 net/sctp/associola.c:1052\n sctp_inq_push+0x1dd/0x280 net/sctp/inqueue.c:88\n sctp_rcv+0x11ae/0x3100 net/sctp/input.c:243\n sctp6_rcv+0x3d/0x60 net/sctp/ipv6.c:1127\n\nThe issue is triggered when sctp_auth_asoc_init_active_key() fails in\nsctp_sf_do_5_1C_ack() while processing an INIT_ACK. In this case, the\ncommand sequence is currently:\n\n- SCTP_CMD_PEER_INIT\n- SCTP_CMD_TIMER_STOP (T1_INIT)\n- SCTP_CMD_TIMER_START (T1_COOKIE)\n- SCTP_CMD_NEW_STATE (COOKIE_ECHOED)\n- SCTP_CMD_ASSOC_SHKEY\n- SCTP_CMD_GEN_COOKIE_ECHO\n\nIf SCTP_CMD_ASSOC_SHKEY fails, asoc-\u003eshkey remains NULL, while\nasoc-\u003epeer.auth_capable and asoc-\u003epeer.peer_chunks have already been set by\nSCTP_CMD_PEER_INIT. This allows a DATA chunk with auth = 1 and shkey = NULL\nto be queued by sctp_datamsg_from_user().\n\nSince command interpretation stops on failure, no COOKIE_ECHO should been\nsent via SCTP_CMD_GEN_COOKIE_ECHO. However, the T1_COOKIE timer has already\nbeen started, and it may enqueue a COOKIE_ECHO into the outqueue later. As\na result, the DATA chunk can be transmitted together with the COOKIE_ECHO\nin sctp_outq_flush_data(), leading to the observed issue.\n\nSimilar to the other places where it calls sctp_auth_asoc_init_active_key()\nright after sctp_process_init(), this patch moves the SCTP_CMD_ASSOC_SHKEY\nimmediately after SCTP_CMD_PEER_INIT, before stopping T1_INIT and starting\nT1_COOKIE. This ensures that if shared key generation fails, authenticated\nDATA cannot be sent. It also allows the T1_INIT timer to retransmit INIT,\ngiving the client another chance to process INIT_ACK and retry key setup.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_34-default-1-150700.15.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_34-default-1-150700.15.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_34-default-1-150700.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-devel-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.34.1.150700.17.23.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.34.1.150700.17.23.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.34.1.150700.17.23.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-devel-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-macros-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-zfcpdump-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-docs-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-source-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP7:kernel-default-extra-6.4.0-150700.53.34.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2026-23125",
"url": "https://www.suse.com/security/cve/CVE-2026-23125"
},
{
"category": "external",
"summary": "SUSE Bug 1258293 for CVE-2026-23125",
"url": "https://bugzilla.suse.com/1258293"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_34-default-1-150700.15.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_34-default-1-150700.15.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_34-default-1-150700.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-devel-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.34.1.150700.17.23.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.34.1.150700.17.23.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.34.1.150700.17.23.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-devel-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-macros-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-zfcpdump-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-docs-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-source-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP7:kernel-default-extra-6.4.0-150700.53.34.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_34-default-1-150700.15.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_34-default-1-150700.15.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_34-default-1-150700.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-devel-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.34.1.150700.17.23.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.34.1.150700.17.23.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.34.1.150700.17.23.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-devel-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-macros-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-zfcpdump-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-docs-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-source-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP7:kernel-default-extra-6.4.0-150700.53.34.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-03-26T13:23:51Z",
"details": "moderate"
}
],
"title": "CVE-2026-23125"
},
{
"cve": "CVE-2026-23128",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2026-23128"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\narm64: Set __nocfi on swsusp_arch_resume()\n\nA DABT is reported[1] on an android based system when resume from hiberate.\nThis happens because swsusp_arch_suspend_exit() is marked with SYM_CODE_*()\nand does not have a CFI hash, but swsusp_arch_resume() will attempt to\nverify the CFI hash when calling a copy of swsusp_arch_suspend_exit().\n\nGiven that there\u0027s an existing requirement that the entrypoint to\nswsusp_arch_suspend_exit() is the first byte of the .hibernate_exit.text\nsection, we cannot fix this by marking swsusp_arch_suspend_exit() with\nSYM_FUNC_*(). The simplest fix for now is to disable the CFI check in\nswsusp_arch_resume().\n\nMark swsusp_arch_resume() as __nocfi to disable the CFI check.\n\n[1]\n[ 22.991934][ T1] Unable to handle kernel paging request at virtual address 0000000109170ffc\n[ 22.991934][ T1] Mem abort info:\n[ 22.991934][ T1] ESR = 0x0000000096000007\n[ 22.991934][ T1] EC = 0x25: DABT (current EL), IL = 32 bits\n[ 22.991934][ T1] SET = 0, FnV = 0\n[ 22.991934][ T1] EA = 0, S1PTW = 0\n[ 22.991934][ T1] FSC = 0x07: level 3 translation fault\n[ 22.991934][ T1] Data abort info:\n[ 22.991934][ T1] ISV = 0, ISS = 0x00000007, ISS2 = 0x00000000\n[ 22.991934][ T1] CM = 0, WnR = 0, TnD = 0, TagAccess = 0\n[ 22.991934][ T1] GCS = 0, Overlay = 0, DirtyBit = 0, Xs = 0\n[ 22.991934][ T1] [0000000109170ffc] user address but active_mm is swapper\n[ 22.991934][ T1] Internal error: Oops: 0000000096000007 [#1] PREEMPT SMP\n[ 22.991934][ T1] Dumping ftrace buffer:\n[ 22.991934][ T1] (ftrace buffer empty)\n[ 22.991934][ T1] Modules linked in:\n[ 22.991934][ T1] CPU: 0 PID: 1 Comm: swapper/0 Not tainted 6.6.98-android15-8-g0b1d2aee7fc3-dirty-4k #1 688c7060a825a3ac418fe53881730b355915a419\n[ 22.991934][ T1] Hardware name: Unisoc UMS9360-base Board (DT)\n[ 22.991934][ T1] pstate: 804000c5 (Nzcv daIF +PAN -UAO -TCO -DIT -SSBS BTYPE=--)\n[ 22.991934][ T1] pc : swsusp_arch_resume+0x2ac/0x344\n[ 22.991934][ T1] lr : swsusp_arch_resume+0x294/0x344\n[ 22.991934][ T1] sp : ffffffc08006b960\n[ 22.991934][ T1] x29: ffffffc08006b9c0 x28: 0000000000000000 x27: 0000000000000000\n[ 22.991934][ T1] x26: 0000000000000000 x25: 0000000000000000 x24: 0000000000000820\n[ 22.991934][ T1] x23: ffffffd0817e3000 x22: ffffffd0817e3000 x21: 0000000000000000\n[ 22.991934][ T1] x20: ffffff8089171000 x19: ffffffd08252c8c8 x18: ffffffc080061058\n[ 22.991934][ T1] x17: 00000000529c6ef0 x16: 00000000529c6ef0 x15: 0000000000000004\n[ 22.991934][ T1] x14: ffffff8178c88000 x13: 0000000000000006 x12: 0000000000000000\n[ 22.991934][ T1] x11: 0000000000000015 x10: 0000000000000001 x9 : ffffffd082533000\n[ 22.991934][ T1] x8 : 0000000109171000 x7 : 205b5d3433393139 x6 : 392e32322020205b\n[ 22.991934][ T1] x5 : 000000010916f000 x4 : 000000008164b000 x3 : ffffff808a4e0530\n[ 22.991934][ T1] x2 : ffffffd08058e784 x1 : 0000000082326000 x0 : 000000010a283000\n[ 22.991934][ T1] Call trace:\n[ 22.991934][ T1] swsusp_arch_resume+0x2ac/0x344\n[ 22.991934][ T1] hibernation_restore+0x158/0x18c\n[ 22.991934][ T1] load_image_and_restore+0xb0/0xec\n[ 22.991934][ T1] software_resume+0xf4/0x19c\n[ 22.991934][ T1] software_resume_initcall+0x34/0x78\n[ 22.991934][ T1] do_one_initcall+0xe8/0x370\n[ 22.991934][ T1] do_initcall_level+0xc8/0x19c\n[ 22.991934][ T1] do_initcalls+0x70/0xc0\n[ 22.991934][ T1] do_basic_setup+0x1c/0x28\n[ 22.991934][ T1] kernel_init_freeable+0xe0/0x148\n[ 22.991934][ T1] kernel_init+0x20/0x1a8\n[ 22.991934][ T1] ret_from_fork+0x10/0x20\n[ 22.991934][ T1] Code: a9400a61 f94013e0 f9438923 f9400a64 (b85fc110)\n\n[catalin.marinas@arm.com: commit log updated by Mark Rutland]",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_34-default-1-150700.15.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_34-default-1-150700.15.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_34-default-1-150700.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-devel-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.34.1.150700.17.23.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.34.1.150700.17.23.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.34.1.150700.17.23.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-devel-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-macros-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-zfcpdump-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-docs-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-source-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP7:kernel-default-extra-6.4.0-150700.53.34.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2026-23128",
"url": "https://www.suse.com/security/cve/CVE-2026-23128"
},
{
"category": "external",
"summary": "SUSE Bug 1258298 for CVE-2026-23128",
"url": "https://bugzilla.suse.com/1258298"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_34-default-1-150700.15.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_34-default-1-150700.15.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_34-default-1-150700.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-devel-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.34.1.150700.17.23.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.34.1.150700.17.23.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.34.1.150700.17.23.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-devel-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-macros-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-zfcpdump-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-docs-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-source-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP7:kernel-default-extra-6.4.0-150700.53.34.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_34-default-1-150700.15.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_34-default-1-150700.15.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_34-default-1-150700.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-devel-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.34.1.150700.17.23.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.34.1.150700.17.23.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.34.1.150700.17.23.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-devel-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-macros-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-zfcpdump-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-docs-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-source-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP7:kernel-default-extra-6.4.0-150700.53.34.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-03-26T13:23:51Z",
"details": "moderate"
}
],
"title": "CVE-2026-23128"
},
{
"cve": "CVE-2026-23129",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2026-23129"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\ndpll: Prevent duplicate registrations\n\nModify the internal registration helpers dpll_xa_ref_{dpll,pin}_add()\nto reject duplicate registration attempts.\n\nPreviously, if a caller attempted to register the same pin multiple\ntimes (with the same ops, priv, and cookie) on the same device, the core\nsilently increments the reference count and return success. This behavior\nis incorrect because if the caller makes these duplicate registrations\nthen for the first one dpll_pin_registration is allocated and for others\nthe associated dpll_pin_ref.refcount is incremented. During the first\nunregistration the associated dpll_pin_registration is freed and for\nothers WARN is fired.\n\nFix this by updating the logic to return `-EEXIST` if a matching\nregistration is found to enforce a strict \"register once\" policy.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_34-default-1-150700.15.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_34-default-1-150700.15.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_34-default-1-150700.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-devel-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.34.1.150700.17.23.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.34.1.150700.17.23.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.34.1.150700.17.23.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-devel-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-macros-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-zfcpdump-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-docs-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-source-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP7:kernel-default-extra-6.4.0-150700.53.34.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2026-23129",
"url": "https://www.suse.com/security/cve/CVE-2026-23129"
},
{
"category": "external",
"summary": "SUSE Bug 1258299 for CVE-2026-23129",
"url": "https://bugzilla.suse.com/1258299"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_34-default-1-150700.15.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_34-default-1-150700.15.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_34-default-1-150700.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-devel-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.34.1.150700.17.23.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.34.1.150700.17.23.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.34.1.150700.17.23.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-devel-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-macros-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-zfcpdump-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-docs-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-source-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP7:kernel-default-extra-6.4.0-150700.53.34.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_34-default-1-150700.15.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_34-default-1-150700.15.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_34-default-1-150700.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-devel-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.34.1.150700.17.23.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.34.1.150700.17.23.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.34.1.150700.17.23.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-devel-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-macros-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-zfcpdump-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-docs-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-source-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP7:kernel-default-extra-6.4.0-150700.53.34.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-03-26T13:23:51Z",
"details": "moderate"
}
],
"title": "CVE-2026-23129"
},
{
"cve": "CVE-2026-23131",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2026-23131"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nplatform/x86: hp-bioscfg: Fix kobject warnings for empty attribute names\n\nThe hp-bioscfg driver attempts to register kobjects with empty names when\nthe HP BIOS returns attributes with empty name strings. This causes\nmultiple kernel warnings:\n\n kobject: (00000000135fb5e6): attempted to be registered with empty name!\n WARNING: CPU: 14 PID: 3336 at lib/kobject.c:219 kobject_add_internal+0x2eb/0x310\n\nAdd validation in hp_init_bios_buffer_attribute() to check if the\nattribute name is empty after parsing it from the WMI buffer. If empty,\nlog a debug message and skip registration of that attribute, allowing the\nmodule to continue processing other valid attributes.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_34-default-1-150700.15.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_34-default-1-150700.15.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_34-default-1-150700.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-devel-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.34.1.150700.17.23.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.34.1.150700.17.23.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.34.1.150700.17.23.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-devel-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-macros-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-zfcpdump-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-docs-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-source-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP7:kernel-default-extra-6.4.0-150700.53.34.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2026-23131",
"url": "https://www.suse.com/security/cve/CVE-2026-23131"
},
{
"category": "external",
"summary": "SUSE Bug 1258297 for CVE-2026-23131",
"url": "https://bugzilla.suse.com/1258297"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_34-default-1-150700.15.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_34-default-1-150700.15.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_34-default-1-150700.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-devel-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.34.1.150700.17.23.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.34.1.150700.17.23.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.34.1.150700.17.23.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-devel-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-macros-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-zfcpdump-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-docs-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-source-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP7:kernel-default-extra-6.4.0-150700.53.34.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_34-default-1-150700.15.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_34-default-1-150700.15.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_34-default-1-150700.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-devel-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.34.1.150700.17.23.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.34.1.150700.17.23.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.34.1.150700.17.23.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-devel-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-macros-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-zfcpdump-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-docs-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-source-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP7:kernel-default-extra-6.4.0-150700.53.34.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-03-26T13:23:51Z",
"details": "moderate"
}
],
"title": "CVE-2026-23131"
},
{
"cve": "CVE-2026-23133",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2026-23133"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nwifi: ath10k: fix dma_free_coherent() pointer\n\ndma_alloc_coherent() allocates a DMA mapped buffer and stores the\naddresses in XXX_unaligned fields. Those should be reused when freeing\nthe buffer rather than the aligned addresses.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_34-default-1-150700.15.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_34-default-1-150700.15.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_34-default-1-150700.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-devel-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.34.1.150700.17.23.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.34.1.150700.17.23.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.34.1.150700.17.23.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-devel-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-macros-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-zfcpdump-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-docs-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-source-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP7:kernel-default-extra-6.4.0-150700.53.34.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2026-23133",
"url": "https://www.suse.com/security/cve/CVE-2026-23133"
},
{
"category": "external",
"summary": "SUSE Bug 1258249 for CVE-2026-23133",
"url": "https://bugzilla.suse.com/1258249"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_34-default-1-150700.15.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_34-default-1-150700.15.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_34-default-1-150700.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-devel-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.34.1.150700.17.23.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.34.1.150700.17.23.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.34.1.150700.17.23.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-devel-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-macros-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-zfcpdump-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-docs-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-source-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP7:kernel-default-extra-6.4.0-150700.53.34.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.7,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:L/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_34-default-1-150700.15.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_34-default-1-150700.15.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_34-default-1-150700.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-devel-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.34.1.150700.17.23.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.34.1.150700.17.23.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.34.1.150700.17.23.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-devel-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-macros-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-zfcpdump-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-docs-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-source-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP7:kernel-default-extra-6.4.0-150700.53.34.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-03-26T13:23:51Z",
"details": "moderate"
}
],
"title": "CVE-2026-23133"
},
{
"cve": "CVE-2026-23135",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2026-23135"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nwifi: ath12k: fix dma_free_coherent() pointer\n\ndma_alloc_coherent() allocates a DMA mapped buffer and stores the\naddresses in XXX_unaligned fields. Those should be reused when freeing\nthe buffer rather than the aligned addresses.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_34-default-1-150700.15.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_34-default-1-150700.15.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_34-default-1-150700.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-devel-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.34.1.150700.17.23.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.34.1.150700.17.23.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.34.1.150700.17.23.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-devel-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-macros-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-zfcpdump-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-docs-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-source-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP7:kernel-default-extra-6.4.0-150700.53.34.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2026-23135",
"url": "https://www.suse.com/security/cve/CVE-2026-23135"
},
{
"category": "external",
"summary": "SUSE Bug 1258245 for CVE-2026-23135",
"url": "https://bugzilla.suse.com/1258245"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_34-default-1-150700.15.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_34-default-1-150700.15.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_34-default-1-150700.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-devel-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.34.1.150700.17.23.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.34.1.150700.17.23.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.34.1.150700.17.23.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-devel-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-macros-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-zfcpdump-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-docs-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-source-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP7:kernel-default-extra-6.4.0-150700.53.34.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.7,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:L/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_34-default-1-150700.15.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_34-default-1-150700.15.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_34-default-1-150700.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-devel-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.34.1.150700.17.23.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.34.1.150700.17.23.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.34.1.150700.17.23.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-devel-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-macros-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-zfcpdump-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-docs-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-source-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP7:kernel-default-extra-6.4.0-150700.53.34.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-03-26T13:23:51Z",
"details": "moderate"
}
],
"title": "CVE-2026-23135"
},
{
"cve": "CVE-2026-23139",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2026-23139"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nnetfilter: nf_conncount: update last_gc only when GC has been performed\n\nCurrently last_gc is being updated everytime a new connection is\ntracked, that means that it is updated even if a GC wasn\u0027t performed.\nWith a sufficiently high packet rate, it is possible to always bypass\nthe GC, causing the list to grow infinitely.\n\nUpdate the last_gc value only when a GC has been actually performed.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_34-default-1-150700.15.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_34-default-1-150700.15.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_34-default-1-150700.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-devel-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.34.1.150700.17.23.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.34.1.150700.17.23.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.34.1.150700.17.23.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-devel-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-macros-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-zfcpdump-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-docs-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-source-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP7:kernel-default-extra-6.4.0-150700.53.34.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2026-23139",
"url": "https://www.suse.com/security/cve/CVE-2026-23139"
},
{
"category": "external",
"summary": "SUSE Bug 1258304 for CVE-2026-23139",
"url": "https://bugzilla.suse.com/1258304"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_34-default-1-150700.15.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_34-default-1-150700.15.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_34-default-1-150700.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-devel-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.34.1.150700.17.23.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.34.1.150700.17.23.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.34.1.150700.17.23.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-devel-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-macros-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-zfcpdump-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-docs-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-source-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP7:kernel-default-extra-6.4.0-150700.53.34.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_34-default-1-150700.15.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_34-default-1-150700.15.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_34-default-1-150700.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-devel-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.34.1.150700.17.23.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.34.1.150700.17.23.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.34.1.150700.17.23.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-devel-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-macros-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-zfcpdump-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-docs-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-source-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP7:kernel-default-extra-6.4.0-150700.53.34.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-03-26T13:23:51Z",
"details": "moderate"
}
],
"title": "CVE-2026-23139"
},
{
"cve": "CVE-2026-23141",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2026-23141"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nbtrfs: send: check for inline extents in range_is_hole_in_parent()\n\nBefore accessing the disk_bytenr field of a file extent item we need\nto check if we are dealing with an inline extent.\nThis is because for inline extents their data starts at the offset of\nthe disk_bytenr field. So accessing the disk_bytenr\nmeans we are accessing inline data or in case the inline data is less\nthan 8 bytes we can actually cause an invalid\nmemory access if this inline extent item is the first item in the leaf\nor access metadata from other items.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_34-default-1-150700.15.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_34-default-1-150700.15.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_34-default-1-150700.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-devel-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.34.1.150700.17.23.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.34.1.150700.17.23.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.34.1.150700.17.23.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-devel-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-macros-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-zfcpdump-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-docs-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-source-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP7:kernel-default-extra-6.4.0-150700.53.34.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2026-23141",
"url": "https://www.suse.com/security/cve/CVE-2026-23141"
},
{
"category": "external",
"summary": "SUSE Bug 1258377 for CVE-2026-23141",
"url": "https://bugzilla.suse.com/1258377"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_34-default-1-150700.15.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_34-default-1-150700.15.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_34-default-1-150700.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-devel-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.34.1.150700.17.23.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.34.1.150700.17.23.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.34.1.150700.17.23.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-devel-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-macros-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-zfcpdump-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-docs-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-source-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP7:kernel-default-extra-6.4.0-150700.53.34.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_34-default-1-150700.15.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_34-default-1-150700.15.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_34-default-1-150700.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-devel-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.34.1.150700.17.23.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.34.1.150700.17.23.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.34.1.150700.17.23.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-devel-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-macros-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-zfcpdump-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-docs-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-source-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP7:kernel-default-extra-6.4.0-150700.53.34.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-03-26T13:23:51Z",
"details": "moderate"
}
],
"title": "CVE-2026-23141"
},
{
"cve": "CVE-2026-23145",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2026-23145"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\next4: fix iloc.bh leak in ext4_xattr_inode_update_ref\n\nThe error branch for ext4_xattr_inode_update_ref forget to release the\nrefcount for iloc.bh. Find this when review code.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_34-default-1-150700.15.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_34-default-1-150700.15.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_34-default-1-150700.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-devel-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.34.1.150700.17.23.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.34.1.150700.17.23.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.34.1.150700.17.23.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-devel-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-macros-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-zfcpdump-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-docs-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-source-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP7:kernel-default-extra-6.4.0-150700.53.34.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2026-23145",
"url": "https://www.suse.com/security/cve/CVE-2026-23145"
},
{
"category": "external",
"summary": "SUSE Bug 1258326 for CVE-2026-23145",
"url": "https://bugzilla.suse.com/1258326"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_34-default-1-150700.15.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_34-default-1-150700.15.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_34-default-1-150700.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-devel-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.34.1.150700.17.23.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.34.1.150700.17.23.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.34.1.150700.17.23.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-devel-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-macros-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-zfcpdump-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-docs-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-source-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP7:kernel-default-extra-6.4.0-150700.53.34.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_34-default-1-150700.15.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_34-default-1-150700.15.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_34-default-1-150700.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-devel-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.34.1.150700.17.23.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.34.1.150700.17.23.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.34.1.150700.17.23.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-devel-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-macros-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-zfcpdump-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-docs-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-source-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP7:kernel-default-extra-6.4.0-150700.53.34.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-03-26T13:23:51Z",
"details": "moderate"
}
],
"title": "CVE-2026-23145"
},
{
"cve": "CVE-2026-23146",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2026-23146"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nBluetooth: hci_uart: fix null-ptr-deref in hci_uart_write_work\n\nhci_uart_set_proto() sets HCI_UART_PROTO_INIT before calling\nhci_uart_register_dev(), which calls proto-\u003eopen() to initialize\nhu-\u003epriv. However, if a TTY write wakeup occurs during this window,\nhci_uart_tx_wakeup() may schedule write_work before hu-\u003epriv is\ninitialized, leading to a NULL pointer dereference in\nhci_uart_write_work() when proto-\u003edequeue() accesses hu-\u003epriv.\n\nThe race condition is:\n\n CPU0 CPU1\n ---- ----\n hci_uart_set_proto()\n set_bit(HCI_UART_PROTO_INIT)\n hci_uart_register_dev()\n tty write wakeup\n hci_uart_tty_wakeup()\n hci_uart_tx_wakeup()\n schedule_work(\u0026hu-\u003ewrite_work)\n proto-\u003eopen(hu)\n // initializes hu-\u003epriv\n hci_uart_write_work()\n hci_uart_dequeue()\n proto-\u003edequeue(hu)\n // accesses hu-\u003epriv (NULL!)\n\nFix this by moving set_bit(HCI_UART_PROTO_INIT) after proto-\u003eopen()\nsucceeds, ensuring hu-\u003epriv is initialized before any work can be\nscheduled.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_34-default-1-150700.15.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_34-default-1-150700.15.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_34-default-1-150700.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-devel-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.34.1.150700.17.23.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.34.1.150700.17.23.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.34.1.150700.17.23.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-devel-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-macros-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-zfcpdump-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-docs-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-source-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP7:kernel-default-extra-6.4.0-150700.53.34.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2026-23146",
"url": "https://www.suse.com/security/cve/CVE-2026-23146"
},
{
"category": "external",
"summary": "SUSE Bug 1258234 for CVE-2026-23146",
"url": "https://bugzilla.suse.com/1258234"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_34-default-1-150700.15.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_34-default-1-150700.15.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_34-default-1-150700.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-devel-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.34.1.150700.17.23.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.34.1.150700.17.23.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.34.1.150700.17.23.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-devel-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-macros-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-zfcpdump-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-docs-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-source-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP7:kernel-default-extra-6.4.0-150700.53.34.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.7,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_34-default-1-150700.15.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_34-default-1-150700.15.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_34-default-1-150700.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-devel-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.34.1.150700.17.23.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.34.1.150700.17.23.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.34.1.150700.17.23.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-devel-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-macros-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-zfcpdump-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-docs-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-source-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP7:kernel-default-extra-6.4.0-150700.53.34.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-03-26T13:23:51Z",
"details": "moderate"
}
],
"title": "CVE-2026-23146"
},
{
"cve": "CVE-2026-23150",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2026-23150"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nnfc: llcp: Fix memleak in nfc_llcp_send_ui_frame().\n\nsyzbot reported various memory leaks related to NFC, struct\nnfc_llcp_sock, sk_buff, nfc_dev, etc. [0]\n\nThe leading log hinted that nfc_llcp_send_ui_frame() failed\nto allocate skb due to sock_error(sk) being -ENXIO.\n\nENXIO is set by nfc_llcp_socket_release() when struct\nnfc_llcp_local is destroyed by local_cleanup().\n\nThe problem is that there is no synchronisation between\nnfc_llcp_send_ui_frame() and local_cleanup(), and skb\ncould be put into local-\u003etx_queue after it was purged in\nlocal_cleanup():\n\n CPU1 CPU2\n ---- ----\n nfc_llcp_send_ui_frame() local_cleanup()\n |- do { \u0027\n |- pdu = nfc_alloc_send_skb(..., \u0026err)\n | .\n | |- nfc_llcp_socket_release(local, false, ENXIO);\n | |- skb_queue_purge(\u0026local-\u003etx_queue); |\n | \u0027 |\n |- skb_queue_tail(\u0026local-\u003etx_queue, pdu); |\n ... |\n |- pdu = nfc_alloc_send_skb(..., \u0026err) |\n ^._________________________________.\u0027\n\nlocal_cleanup() is called for struct nfc_llcp_local only\nafter nfc_llcp_remove_local() unlinks it from llcp_devices.\n\nIf we hold local-\u003etx_queue.lock then, we can synchronise\nthe thread and nfc_llcp_send_ui_frame().\n\nLet\u0027s do that and check list_empty(\u0026local-\u003elist) before\nqueuing skb to local-\u003etx_queue in nfc_llcp_send_ui_frame().\n\n[0]:\n[ 56.074943][ T6096] llcp: nfc_llcp_send_ui_frame: Could not allocate PDU (error=-6)\n[ 64.318868][ T5813] kmemleak: 6 new suspected memory leaks (see /sys/kernel/debug/kmemleak)\nBUG: memory leak\nunreferenced object 0xffff8881272f6800 (size 1024):\n comm \"syz.0.17\", pid 6096, jiffies 4294942766\n hex dump (first 32 bytes):\n 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................\n 27 00 03 40 00 00 00 00 00 00 00 00 00 00 00 00 \u0027..@............\n backtrace (crc da58d84d):\n kmemleak_alloc_recursive include/linux/kmemleak.h:44 [inline]\n slab_post_alloc_hook mm/slub.c:4979 [inline]\n slab_alloc_node mm/slub.c:5284 [inline]\n __do_kmalloc_node mm/slub.c:5645 [inline]\n __kmalloc_noprof+0x3e3/0x6b0 mm/slub.c:5658\n kmalloc_noprof include/linux/slab.h:961 [inline]\n sk_prot_alloc+0x11a/0x1b0 net/core/sock.c:2239\n sk_alloc+0x36/0x360 net/core/sock.c:2295\n nfc_llcp_sock_alloc+0x37/0x130 net/nfc/llcp_sock.c:979\n llcp_sock_create+0x71/0xd0 net/nfc/llcp_sock.c:1044\n nfc_sock_create+0xc9/0xf0 net/nfc/af_nfc.c:31\n __sock_create+0x1a9/0x340 net/socket.c:1605\n sock_create net/socket.c:1663 [inline]\n __sys_socket_create net/socket.c:1700 [inline]\n __sys_socket+0xb9/0x1a0 net/socket.c:1747\n __do_sys_socket net/socket.c:1761 [inline]\n __se_sys_socket net/socket.c:1759 [inline]\n __x64_sys_socket+0x1b/0x30 net/socket.c:1759\n do_syscall_x64 arch/x86/entry/syscall_64.c:63 [inline]\n do_syscall_64+0xa4/0xfa0 arch/x86/entry/syscall_64.c:94\n entry_SYSCALL_64_after_hwframe+0x77/0x7f\n\nBUG: memory leak\nunreferenced object 0xffff88810fbd9800 (size 240):\n comm \"syz.0.17\", pid 6096, jiffies 4294942850\n hex dump (first 32 bytes):\n 68 f0 ff 08 81 88 ff ff 68 f0 ff 08 81 88 ff ff h.......h.......\n 00 00 00 00 00 00 00 00 00 68 2f 27 81 88 ff ff .........h/\u0027....\n backtrace (crc 6cc652b1):\n kmemleak_alloc_recursive include/linux/kmemleak.h:44 [inline]\n slab_post_alloc_hook mm/slub.c:4979 [inline]\n slab_alloc_node mm/slub.c:5284 [inline]\n kmem_cache_alloc_node_noprof+0x36f/0x5e0 mm/slub.c:5336\n __alloc_skb+0x203/0x240 net/core/skbuff.c:660\n alloc_skb include/linux/skbuff.h:1383 [inline]\n alloc_skb_with_frags+0x69/0x3f0 net/core/sk\n---truncated---",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_34-default-1-150700.15.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_34-default-1-150700.15.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_34-default-1-150700.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-devel-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.34.1.150700.17.23.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.34.1.150700.17.23.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.34.1.150700.17.23.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-devel-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-macros-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-zfcpdump-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-docs-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-source-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP7:kernel-default-extra-6.4.0-150700.53.34.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2026-23150",
"url": "https://www.suse.com/security/cve/CVE-2026-23150"
},
{
"category": "external",
"summary": "SUSE Bug 1258354 for CVE-2026-23150",
"url": "https://bugzilla.suse.com/1258354"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_34-default-1-150700.15.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_34-default-1-150700.15.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_34-default-1-150700.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-devel-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.34.1.150700.17.23.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.34.1.150700.17.23.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.34.1.150700.17.23.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-devel-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-macros-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-zfcpdump-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-docs-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-source-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP7:kernel-default-extra-6.4.0-150700.53.34.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.7,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_34-default-1-150700.15.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_34-default-1-150700.15.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_34-default-1-150700.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-devel-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.34.1.150700.17.23.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.34.1.150700.17.23.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.34.1.150700.17.23.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-devel-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-macros-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-zfcpdump-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-docs-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-source-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP7:kernel-default-extra-6.4.0-150700.53.34.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-03-26T13:23:51Z",
"details": "moderate"
}
],
"title": "CVE-2026-23150"
},
{
"cve": "CVE-2026-23151",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2026-23151"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nBluetooth: MGMT: Fix memory leak in set_ssp_complete\n\nFix memory leak in set_ssp_complete() where mgmt_pending_cmd structures\nare not freed after being removed from the pending list.\n\nCommit 302a1f674c00 (\"Bluetooth: MGMT: Fix possible UAFs\") replaced\nmgmt_pending_foreach() calls with individual command handling but missed\nadding mgmt_pending_free() calls in both error and success paths of\nset_ssp_complete(). Other completion functions like set_le_complete()\nwere fixed correctly in the same commit.\n\nThis causes a memory leak of the mgmt_pending_cmd structure and its\nassociated parameter data for each SSP command that completes.\n\nAdd the missing mgmt_pending_free(cmd) calls in both code paths to fix\nthe memory leak. Also fix the same issue in set_advertising_complete().",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_34-default-1-150700.15.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_34-default-1-150700.15.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_34-default-1-150700.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-devel-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.34.1.150700.17.23.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.34.1.150700.17.23.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.34.1.150700.17.23.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-devel-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-macros-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-zfcpdump-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-docs-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-source-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP7:kernel-default-extra-6.4.0-150700.53.34.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2026-23151",
"url": "https://www.suse.com/security/cve/CVE-2026-23151"
},
{
"category": "external",
"summary": "SUSE Bug 1258237 for CVE-2026-23151",
"url": "https://bugzilla.suse.com/1258237"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_34-default-1-150700.15.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_34-default-1-150700.15.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_34-default-1-150700.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-devel-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.34.1.150700.17.23.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.34.1.150700.17.23.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.34.1.150700.17.23.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-devel-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-macros-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-zfcpdump-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-docs-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-source-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP7:kernel-default-extra-6.4.0-150700.53.34.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_34-default-1-150700.15.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_34-default-1-150700.15.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_34-default-1-150700.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-devel-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.34.1.150700.17.23.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.34.1.150700.17.23.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.34.1.150700.17.23.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-devel-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-macros-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-zfcpdump-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-docs-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-source-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP7:kernel-default-extra-6.4.0-150700.53.34.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-03-26T13:23:51Z",
"details": "moderate"
}
],
"title": "CVE-2026-23151"
},
{
"cve": "CVE-2026-23152",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2026-23152"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nwifi: mac80211: correctly decode TTLM with default link map\n\nTID-To-Link Mapping (TTLM) elements do not contain any link mapping\npresence indicator if a default mapping is used and parsing needs to be\nskipped.\n\nNote that access points should not explicitly report an advertised TTLM\nwith a default mapping as that is the implied mapping if the element is\nnot included, this is even the case when switching back to the default\nmapping. However, mac80211 would incorrectly parse the frame and would\nalso read one byte beyond the end of the element.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_34-default-1-150700.15.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_34-default-1-150700.15.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_34-default-1-150700.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-devel-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.34.1.150700.17.23.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.34.1.150700.17.23.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.34.1.150700.17.23.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-devel-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-macros-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-zfcpdump-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-docs-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-source-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP7:kernel-default-extra-6.4.0-150700.53.34.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2026-23152",
"url": "https://www.suse.com/security/cve/CVE-2026-23152"
},
{
"category": "external",
"summary": "SUSE Bug 1258252 for CVE-2026-23152",
"url": "https://bugzilla.suse.com/1258252"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_34-default-1-150700.15.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_34-default-1-150700.15.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_34-default-1-150700.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-devel-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.34.1.150700.17.23.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.34.1.150700.17.23.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.34.1.150700.17.23.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-devel-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-macros-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-zfcpdump-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-docs-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-source-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP7:kernel-default-extra-6.4.0-150700.53.34.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:A/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_34-default-1-150700.15.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_34-default-1-150700.15.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_34-default-1-150700.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-devel-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.34.1.150700.17.23.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.34.1.150700.17.23.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.34.1.150700.17.23.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-devel-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-macros-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-zfcpdump-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-docs-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-source-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP7:kernel-default-extra-6.4.0-150700.53.34.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-03-26T13:23:51Z",
"details": "moderate"
}
],
"title": "CVE-2026-23152"
},
{
"cve": "CVE-2026-23154",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2026-23154"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nnet: fix segmentation of forwarding fraglist GRO\n\nThis patch enhances GSO segment handling by properly checking\nthe SKB_GSO_DODGY flag for frag_list GSO packets, addressing\nlow throughput issues observed when a station accesses IPv4\nservers via hotspots with an IPv6-only upstream interface.\n\nSpecifically, it fixes a bug in GSO segmentation when forwarding\nGRO packets containing a frag_list. The function skb_segment_list\ncannot correctly process GRO skbs that have been converted by XLAT,\nsince XLAT only translates the header of the head skb. Consequently,\nskbs in the frag_list may remain untranslated, resulting in protocol\ninconsistencies and reduced throughput.\n\nTo address this, the patch explicitly sets the SKB_GSO_DODGY flag\nfor GSO packets in XLAT\u0027s IPv4/IPv6 protocol translation helpers\n(bpf_skb_proto_4_to_6 and bpf_skb_proto_6_to_4). This marks GSO\npackets as potentially modified after protocol translation. As a\nresult, GSO segmentation will avoid using skb_segment_list and\ninstead falls back to skb_segment for packets with the SKB_GSO_DODGY\nflag. This ensures that only safe and fully translated frag_list\npackets are processed by skb_segment_list, resolving protocol\ninconsistencies and improving throughput when forwarding GRO packets\nconverted by XLAT.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_34-default-1-150700.15.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_34-default-1-150700.15.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_34-default-1-150700.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-devel-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.34.1.150700.17.23.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.34.1.150700.17.23.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.34.1.150700.17.23.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-devel-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-macros-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-zfcpdump-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-docs-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-source-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP7:kernel-default-extra-6.4.0-150700.53.34.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2026-23154",
"url": "https://www.suse.com/security/cve/CVE-2026-23154"
},
{
"category": "external",
"summary": "SUSE Bug 1258286 for CVE-2026-23154",
"url": "https://bugzilla.suse.com/1258286"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_34-default-1-150700.15.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_34-default-1-150700.15.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_34-default-1-150700.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-devel-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.34.1.150700.17.23.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.34.1.150700.17.23.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.34.1.150700.17.23.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-devel-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-macros-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-zfcpdump-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-docs-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-source-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP7:kernel-default-extra-6.4.0-150700.53.34.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_34-default-1-150700.15.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_34-default-1-150700.15.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_34-default-1-150700.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-devel-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.34.1.150700.17.23.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.34.1.150700.17.23.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.34.1.150700.17.23.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-devel-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-macros-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-zfcpdump-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-docs-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-source-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP7:kernel-default-extra-6.4.0-150700.53.34.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-03-26T13:23:51Z",
"details": "moderate"
}
],
"title": "CVE-2026-23154"
},
{
"cve": "CVE-2026-23155",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2026-23155"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\ncan: gs_usb: gs_usb_receive_bulk_callback(): fix error message\n\nSinc commit 79a6d1bfe114 (\"can: gs_usb: gs_usb_receive_bulk_callback():\nunanchor URL on usb_submit_urb() error\") a failing resubmit URB will print\nan info message.\n\nIn the case of a short read where netdev has not yet been assigned,\ninitialize as NULL to avoid dereferencing an undefined value. Also report\nthe error value of the failed resubmit.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_34-default-1-150700.15.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_34-default-1-150700.15.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_34-default-1-150700.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-devel-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.34.1.150700.17.23.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.34.1.150700.17.23.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.34.1.150700.17.23.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-devel-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-macros-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-zfcpdump-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-docs-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-source-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP7:kernel-default-extra-6.4.0-150700.53.34.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2026-23155",
"url": "https://www.suse.com/security/cve/CVE-2026-23155"
},
{
"category": "external",
"summary": "SUSE Bug 1258313 for CVE-2026-23155",
"url": "https://bugzilla.suse.com/1258313"
},
{
"category": "external",
"summary": "SUSE Bug 1258315 for CVE-2026-23155",
"url": "https://bugzilla.suse.com/1258315"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_34-default-1-150700.15.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_34-default-1-150700.15.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_34-default-1-150700.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-devel-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.34.1.150700.17.23.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.34.1.150700.17.23.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.34.1.150700.17.23.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-devel-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-macros-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-zfcpdump-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-docs-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-source-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP7:kernel-default-extra-6.4.0-150700.53.34.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_34-default-1-150700.15.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_34-default-1-150700.15.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_34-default-1-150700.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-devel-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.34.1.150700.17.23.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.34.1.150700.17.23.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.34.1.150700.17.23.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-devel-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-macros-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-zfcpdump-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-docs-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-source-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP7:kernel-default-extra-6.4.0-150700.53.34.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-03-26T13:23:51Z",
"details": "important"
}
],
"title": "CVE-2026-23155"
},
{
"cve": "CVE-2026-23156",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2026-23156"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nefivarfs: fix error propagation in efivar_entry_get()\n\nefivar_entry_get() always returns success even if the underlying\n__efivar_entry_get() fails, masking errors.\n\nThis may result in uninitialized heap memory being copied to userspace\nin the efivarfs_file_read() path.\n\nFix it by returning the error from __efivar_entry_get().",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_34-default-1-150700.15.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_34-default-1-150700.15.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_34-default-1-150700.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-devel-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.34.1.150700.17.23.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.34.1.150700.17.23.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.34.1.150700.17.23.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-devel-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-macros-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-zfcpdump-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-docs-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-source-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP7:kernel-default-extra-6.4.0-150700.53.34.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2026-23156",
"url": "https://www.suse.com/security/cve/CVE-2026-23156"
},
{
"category": "external",
"summary": "SUSE Bug 1258317 for CVE-2026-23156",
"url": "https://bugzilla.suse.com/1258317"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_34-default-1-150700.15.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_34-default-1-150700.15.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_34-default-1-150700.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-devel-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.34.1.150700.17.23.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.34.1.150700.17.23.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.34.1.150700.17.23.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-devel-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-macros-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-zfcpdump-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-docs-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-source-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP7:kernel-default-extra-6.4.0-150700.53.34.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.8,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:H/A:L",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_34-default-1-150700.15.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_34-default-1-150700.15.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_34-default-1-150700.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-devel-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.34.1.150700.17.23.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.34.1.150700.17.23.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.34.1.150700.17.23.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-devel-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-macros-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-zfcpdump-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-docs-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-source-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP7:kernel-default-extra-6.4.0-150700.53.34.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-03-26T13:23:51Z",
"details": "moderate"
}
],
"title": "CVE-2026-23156"
},
{
"cve": "CVE-2026-23157",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2026-23157"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nbtrfs: do not strictly require dirty metadata threshold for metadata writepages\n\n[BUG]\nThere is an internal report that over 1000 processes are\nwaiting at the io_schedule_timeout() of balance_dirty_pages(), causing\na system hang and trigger a kernel coredump.\n\nThe kernel is v6.4 kernel based, but the root problem still applies to\nany upstream kernel before v6.18.\n\n[CAUSE]\nFrom Jan Kara for his wisdom on the dirty page balance behavior first.\n\n This cgroup dirty limit was what was actually playing the role here\n because the cgroup had only a small amount of memory and so the dirty\n limit for it was something like 16MB.\n\n Dirty throttling is responsible for enforcing that nobody can dirty\n (significantly) more dirty memory than there\u0027s dirty limit. Thus when\n a task is dirtying pages it periodically enters into balance_dirty_pages()\n and we let it sleep there to slow down the dirtying.\n\n When the system is over dirty limit already (either globally or within\n a cgroup of the running task), we will not let the task exit from\n balance_dirty_pages() until the number of dirty pages drops below the\n limit.\n\n So in this particular case, as I already mentioned, there was a cgroup\n with relatively small amount of memory and as a result with dirty limit\n set at 16MB. A task from that cgroup has dirtied about 28MB worth of\n pages in btrfs btree inode and these were practically the only dirty\n pages in that cgroup.\n\nSo that means the only way to reduce the dirty pages of that cgroup is\nto writeback the dirty pages of btrfs btree inode, and only after that\nthose processes can exit balance_dirty_pages().\n\nNow back to the btrfs part, btree_writepages() is responsible for\nwriting back dirty btree inode pages.\n\nThe problem here is, there is a btrfs internal threshold that if the\nbtree inode\u0027s dirty bytes are below the 32M threshold, it will not\ndo any writeback.\n\nThis behavior is to batch as much metadata as possible so we won\u0027t write\nback those tree blocks and then later re-COW them again for another\nmodification.\n\nThis internal 32MiB is higher than the existing dirty page size (28MiB),\nmeaning no writeback will happen, causing a deadlock between btrfs and\ncgroup:\n\n- Btrfs doesn\u0027t want to write back btree inode until more dirty pages\n\n- Cgroup/MM doesn\u0027t want more dirty pages for btrfs btree inode\n Thus any process touching that btree inode is put into sleep until\n the number of dirty pages is reduced.\n\nThanks Jan Kara a lot for the analysis of the root cause.\n\n[ENHANCEMENT]\nSince kernel commit b55102826d7d (\"btrfs: set AS_KERNEL_FILE on the\nbtree_inode\"), btrfs btree inode pages will only be charged to the root\ncgroup which should have a much larger limit than btrfs\u0027 32MiB\nthreshold.\nSo it should not affect newer kernels.\n\nBut for all current LTS kernels, they are all affected by this problem,\nand backporting the whole AS_KERNEL_FILE may not be a good idea.\n\nEven for newer kernels I still think it\u0027s a good idea to get\nrid of the internal threshold at btree_writepages(), since for most cases\ncgroup/MM has a better view of full system memory usage than btrfs\u0027 fixed\nthreshold.\n\nFor internal callers using btrfs_btree_balance_dirty() since that\nfunction is already doing internal threshold check, we don\u0027t need to\nbother them.\n\nBut for external callers of btree_writepages(), just respect their\nrequests and write back whatever they want, ignoring the internal\nbtrfs threshold to avoid such deadlock on btree inode dirty page\nbalancing.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_34-default-1-150700.15.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_34-default-1-150700.15.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_34-default-1-150700.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-devel-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.34.1.150700.17.23.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.34.1.150700.17.23.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.34.1.150700.17.23.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-devel-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-macros-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-zfcpdump-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-docs-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-source-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP7:kernel-default-extra-6.4.0-150700.53.34.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2026-23157",
"url": "https://www.suse.com/security/cve/CVE-2026-23157"
},
{
"category": "external",
"summary": "SUSE Bug 1258376 for CVE-2026-23157",
"url": "https://bugzilla.suse.com/1258376"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_34-default-1-150700.15.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_34-default-1-150700.15.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_34-default-1-150700.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-devel-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.34.1.150700.17.23.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.34.1.150700.17.23.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.34.1.150700.17.23.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-devel-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-macros-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-zfcpdump-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-docs-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-source-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP7:kernel-default-extra-6.4.0-150700.53.34.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_34-default-1-150700.15.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_34-default-1-150700.15.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_34-default-1-150700.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-devel-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.34.1.150700.17.23.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.34.1.150700.17.23.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.34.1.150700.17.23.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-devel-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-macros-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-zfcpdump-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-docs-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-source-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP7:kernel-default-extra-6.4.0-150700.53.34.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-03-26T13:23:51Z",
"details": "moderate"
}
],
"title": "CVE-2026-23157"
},
{
"cve": "CVE-2026-23163",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2026-23163"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\ndrm/amdgpu: fix NULL pointer dereference in amdgpu_gmc_filter_faults_remove\n\nOn APUs such as Raven and Renoir (GC 9.1.0, 9.2.2, 9.3.0), the ih1 and\nih2 interrupt ring buffers are not initialized. This is by design, as\nthese secondary IH rings are only available on discrete GPUs. See\nvega10_ih_sw_init() which explicitly skips ih1/ih2 initialization when\nAMD_IS_APU is set.\n\nHowever, amdgpu_gmc_filter_faults_remove() unconditionally uses ih1 to\nget the timestamp of the last interrupt entry. When retry faults are\nenabled on APUs (noretry=0), this function is called from the SVM page\nfault recovery path, resulting in a NULL pointer dereference when\namdgpu_ih_decode_iv_ts_helper() attempts to access ih-\u003ering[].\n\nThe crash manifests as:\n\n BUG: kernel NULL pointer dereference, address: 0000000000000004\n RIP: 0010:amdgpu_ih_decode_iv_ts_helper+0x22/0x40 [amdgpu]\n Call Trace:\n amdgpu_gmc_filter_faults_remove+0x60/0x130 [amdgpu]\n svm_range_restore_pages+0xae5/0x11c0 [amdgpu]\n amdgpu_vm_handle_fault+0xc8/0x340 [amdgpu]\n gmc_v9_0_process_interrupt+0x191/0x220 [amdgpu]\n amdgpu_irq_dispatch+0xed/0x2c0 [amdgpu]\n amdgpu_ih_process+0x84/0x100 [amdgpu]\n\nThis issue was exposed by commit 1446226d32a4 (\"drm/amdgpu: Remove GC HW\nIP 9.3.0 from noretry=1\") which changed the default for Renoir APU from\nnoretry=1 to noretry=0, enabling retry fault handling and thus\nexercising the buggy code path.\n\nFix this by adding a check for ih1.ring_size before attempting to use\nit. Also restore the soft_ih support from commit dd299441654f (\"drm/amdgpu:\nRework retry fault removal\"). This is needed if the hardware doesn\u0027t\nsupport secondary HW IH rings.\n\nv2: additional updates (Alex)\n\n(cherry picked from commit 6ce8d536c80aa1f059e82184f0d1994436b1d526)",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_34-default-1-150700.15.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_34-default-1-150700.15.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_34-default-1-150700.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-devel-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.34.1.150700.17.23.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.34.1.150700.17.23.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.34.1.150700.17.23.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-devel-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-macros-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-zfcpdump-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-docs-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-source-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP7:kernel-default-extra-6.4.0-150700.53.34.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2026-23163",
"url": "https://www.suse.com/security/cve/CVE-2026-23163"
},
{
"category": "external",
"summary": "SUSE Bug 1258544 for CVE-2026-23163",
"url": "https://bugzilla.suse.com/1258544"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_34-default-1-150700.15.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_34-default-1-150700.15.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_34-default-1-150700.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-devel-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.34.1.150700.17.23.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.34.1.150700.17.23.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.34.1.150700.17.23.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-devel-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-macros-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-zfcpdump-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-docs-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-source-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP7:kernel-default-extra-6.4.0-150700.53.34.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_34-default-1-150700.15.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_34-default-1-150700.15.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_34-default-1-150700.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-devel-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.34.1.150700.17.23.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.34.1.150700.17.23.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.34.1.150700.17.23.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-devel-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-macros-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-zfcpdump-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-docs-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-source-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP7:kernel-default-extra-6.4.0-150700.53.34.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-03-26T13:23:51Z",
"details": "moderate"
}
],
"title": "CVE-2026-23163"
},
{
"cve": "CVE-2026-23166",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2026-23166"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nice: Fix NULL pointer dereference in ice_vsi_set_napi_queues\n\nAdd NULL pointer checks in ice_vsi_set_napi_queues() to prevent crashes\nduring resume from suspend when rings[q_idx]-\u003eq_vector is NULL.\n\nTested adaptor:\n60:00.0 Ethernet controller [0200]: Intel Corporation Ethernet Controller E810-XXV for SFP [8086:159b] (rev 02)\n Subsystem: Intel Corporation Ethernet Network Adapter E810-XXV-2 [8086:4003]\n\nSR-IOV state: both disabled and enabled can reproduce this issue.\n\nkernel version: v6.18\n\nReproduce steps:\nBoot up and execute suspend like systemctl suspend or rtcwake.\n\nLog:\n\u003c1\u003e[ 231.443607] BUG: kernel NULL pointer dereference, address: 0000000000000040\n\u003c1\u003e[ 231.444052] #PF: supervisor read access in kernel mode\n\u003c1\u003e[ 231.444484] #PF: error_code(0x0000) - not-present page\n\u003c6\u003e[ 231.444913] PGD 0 P4D 0\n\u003c4\u003e[ 231.445342] Oops: Oops: 0000 [#1] SMP NOPTI\n\u003c4\u003e[ 231.446635] RIP: 0010:netif_queue_set_napi+0xa/0x170\n\u003c4\u003e[ 231.447067] Code: 31 f6 31 ff c3 cc cc cc cc 0f 1f 80 00 00 00 00 90 90 90 90 90 90 90 90 90 90 90 90 90 90 90 90 0f 1f 44 00 00 48 85 c9 74 0b \u003c48\u003e 83 79 30 00 0f 84 39 01 00 00 55 41 89 d1 49 89 f8 89 f2 48 89\n\u003c4\u003e[ 231.447513] RSP: 0018:ffffcc780fc078c0 EFLAGS: 00010202\n\u003c4\u003e[ 231.447961] RAX: ffff8b848ca30400 RBX: ffff8b848caf2028 RCX: 0000000000000010\n\u003c4\u003e[ 231.448443] RDX: 0000000000000000 RSI: 0000000000000000 RDI: ffff8b848dbd4000\n\u003c4\u003e[ 231.448896] RBP: ffffcc780fc078e8 R08: 0000000000000000 R09: 0000000000000000\n\u003c4\u003e[ 231.449345] R10: 0000000000000000 R11: 0000000000000000 R12: 0000000000000001\n\u003c4\u003e[ 231.449817] R13: ffff8b848dbd4000 R14: ffff8b84833390c8 R15: 0000000000000000\n\u003c4\u003e[ 231.450265] FS: 00007c7b29e9d740(0000) GS:ffff8b8c068e2000(0000) knlGS:0000000000000000\n\u003c4\u003e[ 231.450715] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033\n\u003c4\u003e[ 231.451179] CR2: 0000000000000040 CR3: 000000030626f004 CR4: 0000000000f72ef0\n\u003c4\u003e[ 231.451629] PKRU: 55555554\n\u003c4\u003e[ 231.452076] Call Trace:\n\u003c4\u003e[ 231.452549] \u003cTASK\u003e\n\u003c4\u003e[ 231.452996] ? ice_vsi_set_napi_queues+0x4d/0x110 [ice]\n\u003c4\u003e[ 231.453482] ice_resume+0xfd/0x220 [ice]\n\u003c4\u003e[ 231.453977] ? __pfx_pci_pm_resume+0x10/0x10\n\u003c4\u003e[ 231.454425] pci_pm_resume+0x8c/0x140\n\u003c4\u003e[ 231.454872] ? __pfx_pci_pm_resume+0x10/0x10\n\u003c4\u003e[ 231.455347] dpm_run_callback+0x5f/0x160\n\u003c4\u003e[ 231.455796] ? dpm_wait_for_superior+0x107/0x170\n\u003c4\u003e[ 231.456244] device_resume+0x177/0x270\n\u003c4\u003e[ 231.456708] dpm_resume+0x209/0x2f0\n\u003c4\u003e[ 231.457151] dpm_resume_end+0x15/0x30\n\u003c4\u003e[ 231.457596] suspend_devices_and_enter+0x1da/0x2b0\n\u003c4\u003e[ 231.458054] enter_state+0x10e/0x570\n\nAdd defensive checks for both the ring pointer and its q_vector\nbefore dereferencing, allowing the system to resume successfully even when\nq_vectors are unmapped.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_34-default-1-150700.15.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_34-default-1-150700.15.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_34-default-1-150700.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-devel-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.34.1.150700.17.23.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.34.1.150700.17.23.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.34.1.150700.17.23.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-devel-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-macros-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-zfcpdump-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-docs-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-source-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP7:kernel-default-extra-6.4.0-150700.53.34.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2026-23166",
"url": "https://www.suse.com/security/cve/CVE-2026-23166"
},
{
"category": "external",
"summary": "SUSE Bug 1258272 for CVE-2026-23166",
"url": "https://bugzilla.suse.com/1258272"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_34-default-1-150700.15.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_34-default-1-150700.15.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_34-default-1-150700.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-devel-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.34.1.150700.17.23.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.34.1.150700.17.23.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.34.1.150700.17.23.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-devel-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-macros-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-zfcpdump-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-docs-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-source-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP7:kernel-default-extra-6.4.0-150700.53.34.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_34-default-1-150700.15.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_34-default-1-150700.15.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_34-default-1-150700.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-devel-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.34.1.150700.17.23.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.34.1.150700.17.23.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.34.1.150700.17.23.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-devel-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-macros-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-zfcpdump-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-docs-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-source-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP7:kernel-default-extra-6.4.0-150700.53.34.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-03-26T13:23:51Z",
"details": "moderate"
}
],
"title": "CVE-2026-23166"
},
{
"cve": "CVE-2026-23167",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2026-23167"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nnfc: nci: Fix race between rfkill and nci_unregister_device().\n\nsyzbot reported the splat below [0] without a repro.\n\nIt indicates that struct nci_dev.cmd_wq had been destroyed before\nnci_close_device() was called via rfkill.\n\nnci_dev.cmd_wq is only destroyed in nci_unregister_device(), which\n(I think) was called from virtual_ncidev_close() when syzbot close()d\nan fd of virtual_ncidev.\n\nThe problem is that nci_unregister_device() destroys nci_dev.cmd_wq\nfirst and then calls nfc_unregister_device(), which removes the\ndevice from rfkill by rfkill_unregister().\n\nSo, the device is still visible via rfkill even after nci_dev.cmd_wq\nis destroyed.\n\nLet\u0027s unregister the device from rfkill first in nci_unregister_device().\n\nNote that we cannot call nfc_unregister_device() before\nnci_close_device() because\n\n 1) nfc_unregister_device() calls device_del() which frees\n all memory allocated by devm_kzalloc() and linked to\n ndev-\u003econn_info_list\n\n 2) nci_rx_work() could try to queue nci_conn_info to\n ndev-\u003econn_info_list which could be leaked\n\nThus, nfc_unregister_device() is split into two functions so we\ncan remove rfkill interfaces only before nci_close_device().\n\n[0]:\nDEBUG_LOCKS_WARN_ON(1)\nWARNING: kernel/locking/lockdep.c:238 at hlock_class kernel/locking/lockdep.c:238 [inline], CPU#0: syz.0.8675/6349\nWARNING: kernel/locking/lockdep.c:238 at check_wait_context kernel/locking/lockdep.c:4854 [inline], CPU#0: syz.0.8675/6349\nWARNING: kernel/locking/lockdep.c:238 at __lock_acquire+0x39d/0x2cf0 kernel/locking/lockdep.c:5187, CPU#0: syz.0.8675/6349\nModules linked in:\nCPU: 0 UID: 0 PID: 6349 Comm: syz.0.8675 Not tainted syzkaller #0 PREEMPT(full)\nHardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/13/2026\nRIP: 0010:hlock_class kernel/locking/lockdep.c:238 [inline]\nRIP: 0010:check_wait_context kernel/locking/lockdep.c:4854 [inline]\nRIP: 0010:__lock_acquire+0x3a4/0x2cf0 kernel/locking/lockdep.c:5187\nCode: 18 00 4c 8b 74 24 08 75 27 90 e8 17 f2 fc 02 85 c0 74 1c 83 3d 50 e0 4e 0e 00 75 13 48 8d 3d 43 f7 51 0e 48 c7 c6 8b 3a de 8d \u003c67\u003e 48 0f b9 3a 90 31 c0 0f b6 98 c4 00 00 00 41 8b 45 20 25 ff 1f\nRSP: 0018:ffffc9000c767680 EFLAGS: 00010046\nRAX: 0000000000000001 RBX: 0000000000040000 RCX: 0000000000080000\nRDX: ffffc90013080000 RSI: ffffffff8dde3a8b RDI: ffffffff8ff24ca0\nRBP: 0000000000000003 R08: ffffffff8fef35a3 R09: 1ffffffff1fde6b4\nR10: dffffc0000000000 R11: fffffbfff1fde6b5 R12: 00000000000012a2\nR13: ffff888030338ba8 R14: ffff888030338000 R15: ffff888030338b30\nFS: 00007fa5995f66c0(0000) GS:ffff8881256f8000(0000) knlGS:0000000000000000\nCS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033\nCR2: 00007f7e72f842d0 CR3: 00000000485a0000 CR4: 00000000003526f0\nCall Trace:\n \u003cTASK\u003e\n lock_acquire+0x106/0x330 kernel/locking/lockdep.c:5868\n touch_wq_lockdep_map+0xcb/0x180 kernel/workqueue.c:3940\n __flush_workqueue+0x14b/0x14f0 kernel/workqueue.c:3982\n nci_close_device+0x302/0x630 net/nfc/nci/core.c:567\n nci_dev_down+0x3b/0x50 net/nfc/nci/core.c:639\n nfc_dev_down+0x152/0x290 net/nfc/core.c:161\n nfc_rfkill_set_block+0x2d/0x100 net/nfc/core.c:179\n rfkill_set_block+0x1d2/0x440 net/rfkill/core.c:346\n rfkill_fop_write+0x461/0x5a0 net/rfkill/core.c:1301\n vfs_write+0x29a/0xb90 fs/read_write.c:684\n ksys_write+0x150/0x270 fs/read_write.c:738\n do_syscall_x64 arch/x86/entry/syscall_64.c:63 [inline]\n do_syscall_64+0xe2/0xf80 arch/x86/entry/syscall_64.c:94\n entry_SYSCALL_64_after_hwframe+0x77/0x7f\nRIP: 0033:0x7fa59b39acb9\nCode: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 \u003c48\u003e 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48\nRSP: 002b:00007fa5995f6028 EFLAGS: 00000246 ORIG_RAX: 0000000000000001\nRAX: ffffffffffffffda RBX: 00007fa59b615fa0 RCX: 00007fa59b39acb9\nRDX: 0000000000000008 RSI: 0000200000000080 RDI: 0000000000000007\nRBP: 00007fa59b408bf7 R08: \n---truncated---",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_34-default-1-150700.15.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_34-default-1-150700.15.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_34-default-1-150700.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-devel-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.34.1.150700.17.23.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.34.1.150700.17.23.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.34.1.150700.17.23.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-devel-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-macros-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-zfcpdump-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-docs-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-source-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP7:kernel-default-extra-6.4.0-150700.53.34.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2026-23167",
"url": "https://www.suse.com/security/cve/CVE-2026-23167"
},
{
"category": "external",
"summary": "SUSE Bug 1258374 for CVE-2026-23167",
"url": "https://bugzilla.suse.com/1258374"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_34-default-1-150700.15.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_34-default-1-150700.15.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_34-default-1-150700.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-devel-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.34.1.150700.17.23.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.34.1.150700.17.23.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.34.1.150700.17.23.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-devel-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-macros-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-zfcpdump-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-docs-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-source-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP7:kernel-default-extra-6.4.0-150700.53.34.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_34-default-1-150700.15.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_34-default-1-150700.15.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_34-default-1-150700.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-devel-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.34.1.150700.17.23.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.34.1.150700.17.23.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.34.1.150700.17.23.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-devel-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-macros-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-zfcpdump-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-docs-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-source-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP7:kernel-default-extra-6.4.0-150700.53.34.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-03-26T13:23:51Z",
"details": "moderate"
}
],
"title": "CVE-2026-23167"
},
{
"cve": "CVE-2026-23169",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2026-23169"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nmptcp: fix race in mptcp_pm_nl_flush_addrs_doit()\n\nsyzbot and Eulgyu Kim reported crashes in mptcp_pm_nl_get_local_id()\nand/or mptcp_pm_nl_is_backup()\n\nRoot cause is list_splice_init() in mptcp_pm_nl_flush_addrs_doit()\nwhich is not RCU ready.\n\nlist_splice_init_rcu() can not be called here while holding pernet-\u003elock\nspinlock.\n\nMany thanks to Eulgyu Kim for providing a repro and testing our patches.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_34-default-1-150700.15.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_34-default-1-150700.15.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_34-default-1-150700.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-devel-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.34.1.150700.17.23.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.34.1.150700.17.23.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.34.1.150700.17.23.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-devel-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-macros-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-zfcpdump-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-docs-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-source-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP7:kernel-default-extra-6.4.0-150700.53.34.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2026-23169",
"url": "https://www.suse.com/security/cve/CVE-2026-23169"
},
{
"category": "external",
"summary": "SUSE Bug 1258389 for CVE-2026-23169",
"url": "https://bugzilla.suse.com/1258389"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_34-default-1-150700.15.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_34-default-1-150700.15.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_34-default-1-150700.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-devel-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.34.1.150700.17.23.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.34.1.150700.17.23.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.34.1.150700.17.23.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-devel-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-macros-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-zfcpdump-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-docs-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-source-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP7:kernel-default-extra-6.4.0-150700.53.34.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.6,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_34-default-1-150700.15.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_34-default-1-150700.15.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_34-default-1-150700.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-devel-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.34.1.150700.17.23.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.34.1.150700.17.23.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.34.1.150700.17.23.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-devel-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-macros-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-zfcpdump-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-docs-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-source-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP7:kernel-default-extra-6.4.0-150700.53.34.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-03-26T13:23:51Z",
"details": "moderate"
}
],
"title": "CVE-2026-23169"
},
{
"cve": "CVE-2026-23170",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2026-23170"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\ndrm/imx/tve: fix probe device leak\n\nMake sure to drop the reference taken to the DDC device during probe on\nprobe failure (e.g. probe deferral) and on driver unbind.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_34-default-1-150700.15.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_34-default-1-150700.15.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_34-default-1-150700.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-devel-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.34.1.150700.17.23.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.34.1.150700.17.23.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.34.1.150700.17.23.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-devel-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-macros-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-zfcpdump-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-docs-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-source-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP7:kernel-default-extra-6.4.0-150700.53.34.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2026-23170",
"url": "https://www.suse.com/security/cve/CVE-2026-23170"
},
{
"category": "external",
"summary": "SUSE Bug 1258379 for CVE-2026-23170",
"url": "https://bugzilla.suse.com/1258379"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_34-default-1-150700.15.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_34-default-1-150700.15.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_34-default-1-150700.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-devel-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.34.1.150700.17.23.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.34.1.150700.17.23.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.34.1.150700.17.23.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-devel-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-macros-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-zfcpdump-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-docs-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-source-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP7:kernel-default-extra-6.4.0-150700.53.34.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_34-default-1-150700.15.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_34-default-1-150700.15.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_34-default-1-150700.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-devel-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.34.1.150700.17.23.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.34.1.150700.17.23.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.34.1.150700.17.23.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-devel-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-macros-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-zfcpdump-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-docs-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-source-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP7:kernel-default-extra-6.4.0-150700.53.34.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-03-26T13:23:51Z",
"details": "moderate"
}
],
"title": "CVE-2026-23170"
},
{
"cve": "CVE-2026-23171",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2026-23171"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nbonding: fix use-after-free due to enslave fail after slave array update\n\nFix a use-after-free which happens due to enslave failure after the new\nslave has been added to the array. Since the new slave can be used for Tx\nimmediately, we can use it after it has been freed by the enslave error\ncleanup path which frees the allocated slave memory. Slave update array is\nsupposed to be called last when further enslave failures are not expected.\nMove it after xdp setup to avoid any problems.\n\nIt is very easy to reproduce the problem with a simple xdp_pass prog:\n ip l add bond1 type bond mode balance-xor\n ip l set bond1 up\n ip l set dev bond1 xdp object xdp_pass.o sec xdp_pass\n ip l add dumdum type dummy\n\nThen run in parallel:\n while :; do ip l set dumdum master bond1 1\u003e/dev/null 2\u003e\u00261; done;\n mausezahn bond1 -a own -b rand -A rand -B 1.1.1.1 -c 0 -t tcp \"dp=1-1023, flags=syn\"\n\nThe crash happens almost immediately:\n [ 605.602850] Oops: general protection fault, probably for non-canonical address 0xe0e6fc2460000137: 0000 [#1] SMP KASAN NOPTI\n [ 605.602916] KASAN: maybe wild-memory-access in range [0x07380123000009b8-0x07380123000009bf]\n [ 605.602946] CPU: 0 UID: 0 PID: 2445 Comm: mausezahn Kdump: loaded Tainted: G B 6.19.0-rc6+ #21 PREEMPT(voluntary)\n [ 605.602979] Tainted: [B]=BAD_PAGE\n [ 605.602998] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014\n [ 605.603032] RIP: 0010:netdev_core_pick_tx+0xcd/0x210\n [ 605.603063] Code: 48 89 fa 48 c1 ea 03 80 3c 02 00 0f 85 3e 01 00 00 48 b8 00 00 00 00 00 fc ff df 4c 8b 6b 08 49 8d 7d 30 48 89 fa 48 c1 ea 03 \u003c80\u003e 3c 02 00 0f 85 25 01 00 00 49 8b 45 30 4c 89 e2 48 89 ee 48 89\n [ 605.603111] RSP: 0018:ffff88817b9af348 EFLAGS: 00010213\n [ 605.603145] RAX: dffffc0000000000 RBX: ffff88817d28b420 RCX: 0000000000000000\n [ 605.603172] RDX: 00e7002460000137 RSI: 0000000000000008 RDI: 07380123000009be\n [ 605.603199] RBP: ffff88817b541a00 R08: 0000000000000001 R09: fffffbfff3ed8c0c\n [ 605.603226] R10: ffffffff9f6c6067 R11: 0000000000000001 R12: 0000000000000000\n [ 605.603253] R13: 073801230000098e R14: ffff88817d28b448 R15: ffff88817b541a84\n [ 605.603286] FS: 00007f6570ef67c0(0000) GS:ffff888221dfa000(0000) knlGS:0000000000000000\n [ 605.603319] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033\n [ 605.603343] CR2: 00007f65712fae40 CR3: 000000011371b000 CR4: 0000000000350ef0\n [ 605.603373] Call Trace:\n [ 605.603392] \u003cTASK\u003e\n [ 605.603410] __dev_queue_xmit+0x448/0x32a0\n [ 605.603434] ? __pfx_vprintk_emit+0x10/0x10\n [ 605.603461] ? __pfx_vprintk_emit+0x10/0x10\n [ 605.603484] ? __pfx___dev_queue_xmit+0x10/0x10\n [ 605.603507] ? bond_start_xmit+0xbfb/0xc20 [bonding]\n [ 605.603546] ? _printk+0xcb/0x100\n [ 605.603566] ? __pfx__printk+0x10/0x10\n [ 605.603589] ? bond_start_xmit+0xbfb/0xc20 [bonding]\n [ 605.603627] ? add_taint+0x5e/0x70\n [ 605.603648] ? add_taint+0x2a/0x70\n [ 605.603670] ? end_report.cold+0x51/0x75\n [ 605.603693] ? bond_start_xmit+0xbfb/0xc20 [bonding]\n [ 605.603731] bond_start_xmit+0x623/0xc20 [bonding]",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_34-default-1-150700.15.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_34-default-1-150700.15.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_34-default-1-150700.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-devel-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.34.1.150700.17.23.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.34.1.150700.17.23.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.34.1.150700.17.23.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-devel-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-macros-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-zfcpdump-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-docs-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-source-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP7:kernel-default-extra-6.4.0-150700.53.34.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2026-23171",
"url": "https://www.suse.com/security/cve/CVE-2026-23171"
},
{
"category": "external",
"summary": "SUSE Bug 1258349 for CVE-2026-23171",
"url": "https://bugzilla.suse.com/1258349"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_34-default-1-150700.15.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_34-default-1-150700.15.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_34-default-1-150700.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-devel-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.34.1.150700.17.23.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.34.1.150700.17.23.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.34.1.150700.17.23.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-devel-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-macros-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-zfcpdump-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-docs-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-source-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP7:kernel-default-extra-6.4.0-150700.53.34.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_34-default-1-150700.15.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_34-default-1-150700.15.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_34-default-1-150700.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-devel-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.34.1.150700.17.23.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.34.1.150700.17.23.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.34.1.150700.17.23.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-devel-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-macros-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-zfcpdump-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-docs-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-source-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP7:kernel-default-extra-6.4.0-150700.53.34.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-03-26T13:23:51Z",
"details": "moderate"
}
],
"title": "CVE-2026-23171"
},
{
"cve": "CVE-2026-23172",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2026-23172"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nnet: wwan: t7xx: fix potential skb-\u003efrags overflow in RX path\n\nWhen receiving data in the DPMAIF RX path,\nthe t7xx_dpmaif_set_frag_to_skb() function adds\npage fragments to an skb without checking if the number of\nfragments has exceeded MAX_SKB_FRAGS. This could lead to a buffer overflow\nin skb_shinfo(skb)-\u003efrags[] array, corrupting adjacent memory and\npotentially causing kernel crashes or other undefined behavior.\n\nThis issue was identified through static code analysis by comparing with a\nsimilar vulnerability fixed in the mt76 driver commit b102f0c522cf (\"mt76:\nfix array overflow on receiving too many fragments for a packet\").\n\nThe vulnerability could be triggered if the modem firmware sends packets\nwith excessive fragments. While under normal protocol conditions (MTU 3080\nbytes, BAT buffer 3584 bytes),\na single packet should not require additional\nfragments, the kernel should not blindly trust firmware behavior.\nMalicious, buggy, or compromised firmware could potentially craft packets\nwith more fragments than the kernel expects.\n\nFix this by adding a bounds check before calling skb_add_rx_frag() to\nensure nr_frags does not exceed MAX_SKB_FRAGS.\n\nThe check must be performed before unmapping to avoid a page leak\nand double DMA unmap during device teardown.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_34-default-1-150700.15.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_34-default-1-150700.15.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_34-default-1-150700.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-devel-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.34.1.150700.17.23.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.34.1.150700.17.23.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.34.1.150700.17.23.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-devel-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-macros-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-zfcpdump-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-docs-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-source-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP7:kernel-default-extra-6.4.0-150700.53.34.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2026-23172",
"url": "https://www.suse.com/security/cve/CVE-2026-23172"
},
{
"category": "external",
"summary": "SUSE Bug 1258519 for CVE-2026-23172",
"url": "https://bugzilla.suse.com/1258519"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_34-default-1-150700.15.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_34-default-1-150700.15.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_34-default-1-150700.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-devel-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.34.1.150700.17.23.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.34.1.150700.17.23.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.34.1.150700.17.23.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-devel-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-macros-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-zfcpdump-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-docs-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-source-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP7:kernel-default-extra-6.4.0-150700.53.34.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_34-default-1-150700.15.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_34-default-1-150700.15.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_34-default-1-150700.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-devel-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.34.1.150700.17.23.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.34.1.150700.17.23.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.34.1.150700.17.23.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-devel-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-macros-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-zfcpdump-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-docs-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-source-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP7:kernel-default-extra-6.4.0-150700.53.34.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-03-26T13:23:51Z",
"details": "moderate"
}
],
"title": "CVE-2026-23172"
},
{
"cve": "CVE-2026-23173",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2026-23173"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nnet/mlx5e: TC, delete flows only for existing peers\n\nWhen deleting TC steering flows, iterate only over actual devcom\npeers instead of assuming all possible ports exist. This avoids\ntouching non-existent peers and ensures cleanup is limited to\ndevices the driver is currently connected to.\n\n BUG: kernel NULL pointer dereference, address: 0000000000000008\n #PF: supervisor write access in kernel mode\n #PF: error_code(0x0002) - not-present page\n PGD 133c8a067 P4D 0\n Oops: Oops: 0002 [#1] SMP\n CPU: 19 UID: 0 PID: 2169 Comm: tc Not tainted 6.18.0+ #156 NONE\n Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS rel-1.16.0-0-gd239552ce722-prebuilt.qemu.org 04/01/2014\n RIP: 0010:mlx5e_tc_del_fdb_peers_flow+0xbe/0x200 [mlx5_core]\n Code: 00 00 a8 08 74 a8 49 8b 46 18 f6 c4 02 74 9f 4c 8d bf a0 12 00 00 4c 89 ff e8 0e e7 96 e1 49 8b 44 24 08 49 8b 0c 24 4c 89 ff \u003c48\u003e 89 41 08 48 89 08 49 89 2c 24 49 89 5c 24 08 e8 7d ce 96 e1 49\n RSP: 0018:ff11000143867528 EFLAGS: 00010246\n RAX: 0000000000000000 RBX: dead000000000122 RCX: 0000000000000000\n RDX: ff11000143691580 RSI: ff110001026e5000 RDI: ff11000106f3d2a0\n RBP: dead000000000100 R08: 00000000000003fd R09: 0000000000000002\n R10: ff11000101c75690 R11: ff1100085faea178 R12: ff11000115f0ae78\n R13: 0000000000000000 R14: ff11000115f0a800 R15: ff11000106f3d2a0\n FS: 00007f35236bf740(0000) GS:ff110008dc809000(0000) knlGS:0000000000000000\n CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033\n CR2: 0000000000000008 CR3: 0000000157a01001 CR4: 0000000000373eb0\n Call Trace:\n \u003cTASK\u003e\n mlx5e_tc_del_flow+0x46/0x270 [mlx5_core]\n mlx5e_flow_put+0x25/0x50 [mlx5_core]\n mlx5e_delete_flower+0x2a6/0x3e0 [mlx5_core]\n tc_setup_cb_reoffload+0x20/0x80\n fl_reoffload+0x26f/0x2f0 [cls_flower]\n ? mlx5e_tc_reoffload_flows_work+0xc0/0xc0 [mlx5_core]\n ? mlx5e_tc_reoffload_flows_work+0xc0/0xc0 [mlx5_core]\n tcf_block_playback_offloads+0x9e/0x1c0\n tcf_block_unbind+0x7b/0xd0\n tcf_block_setup+0x186/0x1d0\n tcf_block_offload_cmd.isra.0+0xef/0x130\n tcf_block_offload_unbind+0x43/0x70\n __tcf_block_put+0x85/0x160\n ingress_destroy+0x32/0x110 [sch_ingress]\n __qdisc_destroy+0x44/0x100\n qdisc_graft+0x22b/0x610\n tc_get_qdisc+0x183/0x4d0\n rtnetlink_rcv_msg+0x2d7/0x3d0\n ? rtnl_calcit.isra.0+0x100/0x100\n netlink_rcv_skb+0x53/0x100\n netlink_unicast+0x249/0x320\n ? __alloc_skb+0x102/0x1f0\n netlink_sendmsg+0x1e3/0x420\n __sock_sendmsg+0x38/0x60\n ____sys_sendmsg+0x1ef/0x230\n ? copy_msghdr_from_user+0x6c/0xa0\n ___sys_sendmsg+0x7f/0xc0\n ? ___sys_recvmsg+0x8a/0xc0\n ? __sys_sendto+0x119/0x180\n __sys_sendmsg+0x61/0xb0\n do_syscall_64+0x55/0x640\n entry_SYSCALL_64_after_hwframe+0x4b/0x53\n RIP: 0033:0x7f35238bb764\n Code: 15 b9 86 0c 00 f7 d8 64 89 02 b8 ff ff ff ff eb bf 0f 1f 44 00 00 f3 0f 1e fa 80 3d e5 08 0d 00 00 74 13 b8 2e 00 00 00 0f 05 \u003c48\u003e 3d 00 f0 ff ff 77 4c c3 0f 1f 00 55 48 89 e5 48 83 ec 20 89 55\n RSP: 002b:00007ffed4c35638 EFLAGS: 00000202 ORIG_RAX: 000000000000002e\n RAX: ffffffffffffffda RBX: 000055a2efcc75e0 RCX: 00007f35238bb764\n RDX: 0000000000000000 RSI: 00007ffed4c356a0 RDI: 0000000000000003\n RBP: 00007ffed4c35710 R08: 0000000000000010 R09: 00007f3523984b20\n R10: 0000000000000004 R11: 0000000000000202 R12: 00007ffed4c35790\n R13: 000000006947df8f R14: 000055a2efcc75e0 R15: 00007ffed4c35780",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_34-default-1-150700.15.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_34-default-1-150700.15.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_34-default-1-150700.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-devel-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.34.1.150700.17.23.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.34.1.150700.17.23.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.34.1.150700.17.23.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-devel-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-macros-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-zfcpdump-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-docs-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-source-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP7:kernel-default-extra-6.4.0-150700.53.34.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2026-23173",
"url": "https://www.suse.com/security/cve/CVE-2026-23173"
},
{
"category": "external",
"summary": "SUSE Bug 1258520 for CVE-2026-23173",
"url": "https://bugzilla.suse.com/1258520"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_34-default-1-150700.15.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_34-default-1-150700.15.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_34-default-1-150700.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-devel-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.34.1.150700.17.23.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.34.1.150700.17.23.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.34.1.150700.17.23.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-devel-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-macros-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-zfcpdump-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-docs-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-source-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP7:kernel-default-extra-6.4.0-150700.53.34.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_34-default-1-150700.15.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_34-default-1-150700.15.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_34-default-1-150700.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-devel-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.34.1.150700.17.23.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.34.1.150700.17.23.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.34.1.150700.17.23.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-devel-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-macros-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-zfcpdump-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-docs-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-source-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP7:kernel-default-extra-6.4.0-150700.53.34.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-03-26T13:23:51Z",
"details": "moderate"
}
],
"title": "CVE-2026-23173"
},
{
"cve": "CVE-2026-23176",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2026-23176"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nplatform/x86: toshiba_haps: Fix memory leaks in add/remove routines\n\ntoshiba_haps_add() leaks the haps object allocated by it if it returns\nan error after allocating that object successfully.\n\ntoshiba_haps_remove() does not free the object pointed to by\ntoshiba_haps before clearing that pointer, so it becomes unreachable\nallocated memory.\n\nAddress these memory leaks by using devm_kzalloc() for allocating\nthe memory in question.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_34-default-1-150700.15.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_34-default-1-150700.15.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_34-default-1-150700.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-devel-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.34.1.150700.17.23.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.34.1.150700.17.23.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.34.1.150700.17.23.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-devel-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-macros-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-zfcpdump-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-docs-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-source-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP7:kernel-default-extra-6.4.0-150700.53.34.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2026-23176",
"url": "https://www.suse.com/security/cve/CVE-2026-23176"
},
{
"category": "external",
"summary": "SUSE Bug 1258256 for CVE-2026-23176",
"url": "https://bugzilla.suse.com/1258256"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_34-default-1-150700.15.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_34-default-1-150700.15.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_34-default-1-150700.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-devel-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.34.1.150700.17.23.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.34.1.150700.17.23.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.34.1.150700.17.23.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-devel-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-macros-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-zfcpdump-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-docs-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-source-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP7:kernel-default-extra-6.4.0-150700.53.34.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_34-default-1-150700.15.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_34-default-1-150700.15.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_34-default-1-150700.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-devel-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.34.1.150700.17.23.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.34.1.150700.17.23.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.34.1.150700.17.23.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-devel-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-macros-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-zfcpdump-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-docs-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-source-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP7:kernel-default-extra-6.4.0-150700.53.34.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-03-26T13:23:51Z",
"details": "moderate"
}
],
"title": "CVE-2026-23176"
},
{
"cve": "CVE-2026-23178",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2026-23178"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nHID: i2c-hid: fix potential buffer overflow in i2c_hid_get_report()\n\n`i2c_hid_xfer` is used to read `recv_len + sizeof(__le16)` bytes of data\ninto `ihid-\u003erawbuf`.\n\nThe former can come from the userspace in the hidraw driver and is only\nbounded by HID_MAX_BUFFER_SIZE(16384) by default (unless we also set\n`max_buffer_size` field of `struct hid_ll_driver` which we do not).\n\nThe latter has size determined at runtime by the maximum size of\ndifferent report types you could receive on any particular device and\ncan be a much smaller value.\n\nFix this by truncating `recv_len` to `ihid-\u003ebufsize - sizeof(__le16)`.\n\nThe impact is low since access to hidraw devices requires root.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_34-default-1-150700.15.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_34-default-1-150700.15.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_34-default-1-150700.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-devel-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.34.1.150700.17.23.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.34.1.150700.17.23.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.34.1.150700.17.23.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-devel-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-macros-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-zfcpdump-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-docs-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-source-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP7:kernel-default-extra-6.4.0-150700.53.34.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2026-23178",
"url": "https://www.suse.com/security/cve/CVE-2026-23178"
},
{
"category": "external",
"summary": "SUSE Bug 1258358 for CVE-2026-23178",
"url": "https://bugzilla.suse.com/1258358"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_34-default-1-150700.15.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_34-default-1-150700.15.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_34-default-1-150700.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-devel-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.34.1.150700.17.23.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.34.1.150700.17.23.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.34.1.150700.17.23.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-devel-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-macros-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-zfcpdump-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-docs-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-source-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP7:kernel-default-extra-6.4.0-150700.53.34.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.1,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_34-default-1-150700.15.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_34-default-1-150700.15.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_34-default-1-150700.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-devel-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.34.1.150700.17.23.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.34.1.150700.17.23.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.34.1.150700.17.23.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-devel-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-macros-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-zfcpdump-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-docs-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-source-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP7:kernel-default-extra-6.4.0-150700.53.34.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-03-26T13:23:51Z",
"details": "moderate"
}
],
"title": "CVE-2026-23178"
},
{
"cve": "CVE-2026-23179",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2026-23179"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nnvmet-tcp: fixup hang in nvmet_tcp_listen_data_ready()\n\nWhen the socket is closed while in TCP_LISTEN a callback is run to\nflush all outstanding packets, which in turns calls\nnvmet_tcp_listen_data_ready() with the sk_callback_lock held.\nSo we need to check if we are in TCP_LISTEN before attempting\nto get the sk_callback_lock() to avoid a deadlock.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_34-default-1-150700.15.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_34-default-1-150700.15.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_34-default-1-150700.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-devel-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.34.1.150700.17.23.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.34.1.150700.17.23.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.34.1.150700.17.23.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-devel-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-macros-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-zfcpdump-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-docs-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-source-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP7:kernel-default-extra-6.4.0-150700.53.34.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2026-23179",
"url": "https://www.suse.com/security/cve/CVE-2026-23179"
},
{
"category": "external",
"summary": "SUSE Bug 1258394 for CVE-2026-23179",
"url": "https://bugzilla.suse.com/1258394"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_34-default-1-150700.15.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_34-default-1-150700.15.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_34-default-1-150700.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-devel-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.34.1.150700.17.23.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.34.1.150700.17.23.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.34.1.150700.17.23.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-devel-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-macros-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-zfcpdump-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-docs-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-source-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP7:kernel-default-extra-6.4.0-150700.53.34.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_34-default-1-150700.15.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_34-default-1-150700.15.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_34-default-1-150700.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-devel-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.34.1.150700.17.23.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.34.1.150700.17.23.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.34.1.150700.17.23.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-devel-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-macros-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-zfcpdump-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-docs-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-source-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP7:kernel-default-extra-6.4.0-150700.53.34.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-03-26T13:23:51Z",
"details": "moderate"
}
],
"title": "CVE-2026-23179"
},
{
"cve": "CVE-2026-23182",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2026-23182"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nspi: tegra: Fix a memory leak in tegra_slink_probe()\n\nIn tegra_slink_probe(), when platform_get_irq() fails, it directly\nreturns from the function with an error code, which causes a memory leak.\n\nReplace it with a goto label to ensure proper cleanup.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_34-default-1-150700.15.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_34-default-1-150700.15.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_34-default-1-150700.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-devel-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.34.1.150700.17.23.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.34.1.150700.17.23.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.34.1.150700.17.23.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-devel-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-macros-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-zfcpdump-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-docs-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-source-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP7:kernel-default-extra-6.4.0-150700.53.34.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2026-23182",
"url": "https://www.suse.com/security/cve/CVE-2026-23182"
},
{
"category": "external",
"summary": "SUSE Bug 1258259 for CVE-2026-23182",
"url": "https://bugzilla.suse.com/1258259"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_34-default-1-150700.15.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_34-default-1-150700.15.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_34-default-1-150700.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-devel-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.34.1.150700.17.23.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.34.1.150700.17.23.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.34.1.150700.17.23.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-devel-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-macros-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-zfcpdump-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-docs-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-source-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP7:kernel-default-extra-6.4.0-150700.53.34.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_34-default-1-150700.15.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_34-default-1-150700.15.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_34-default-1-150700.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-devel-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.34.1.150700.17.23.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.34.1.150700.17.23.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.34.1.150700.17.23.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-devel-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-macros-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-zfcpdump-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-docs-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-source-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP7:kernel-default-extra-6.4.0-150700.53.34.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-03-26T13:23:51Z",
"details": "moderate"
}
],
"title": "CVE-2026-23182"
},
{
"cve": "CVE-2026-23190",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2026-23190"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nASoC: amd: fix memory leak in acp3x pdm dma ops",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_34-default-1-150700.15.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_34-default-1-150700.15.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_34-default-1-150700.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-devel-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.34.1.150700.17.23.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.34.1.150700.17.23.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.34.1.150700.17.23.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-devel-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-macros-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-zfcpdump-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-docs-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-source-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP7:kernel-default-extra-6.4.0-150700.53.34.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2026-23190",
"url": "https://www.suse.com/security/cve/CVE-2026-23190"
},
{
"category": "external",
"summary": "SUSE Bug 1258397 for CVE-2026-23190",
"url": "https://bugzilla.suse.com/1258397"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_34-default-1-150700.15.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_34-default-1-150700.15.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_34-default-1-150700.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-devel-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.34.1.150700.17.23.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.34.1.150700.17.23.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.34.1.150700.17.23.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-devel-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-macros-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-zfcpdump-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-docs-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-source-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP7:kernel-default-extra-6.4.0-150700.53.34.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_34-default-1-150700.15.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_34-default-1-150700.15.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_34-default-1-150700.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-devel-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.34.1.150700.17.23.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.34.1.150700.17.23.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.34.1.150700.17.23.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-devel-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-macros-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-zfcpdump-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-docs-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-source-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP7:kernel-default-extra-6.4.0-150700.53.34.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-03-26T13:23:51Z",
"details": "moderate"
}
],
"title": "CVE-2026-23190"
},
{
"cve": "CVE-2026-23191",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2026-23191"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nALSA: aloop: Fix racy access at PCM trigger\n\nThe PCM trigger callback of aloop driver tries to check the PCM state\nand stop the stream of the tied substream in the corresponding cable.\nSince both check and stop operations are performed outside the cable\nlock, this may result in UAF when a program attempts to trigger\nfrequently while opening/closing the tied stream, as spotted by\nfuzzers.\n\nFor addressing the UAF, this patch changes two things:\n- It covers the most of code in loopback_check_format() with\n cable-\u003elock spinlock, and add the proper NULL checks. This avoids\n already some racy accesses.\n- In addition, now we try to check the state of the capture PCM stream\n that may be stopped in this function, which was the major pain point\n leading to UAF.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_34-default-1-150700.15.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_34-default-1-150700.15.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_34-default-1-150700.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-devel-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.34.1.150700.17.23.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.34.1.150700.17.23.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.34.1.150700.17.23.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-devel-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-macros-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-zfcpdump-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-docs-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-source-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP7:kernel-default-extra-6.4.0-150700.53.34.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2026-23191",
"url": "https://www.suse.com/security/cve/CVE-2026-23191"
},
{
"category": "external",
"summary": "SUSE Bug 1258395 for CVE-2026-23191",
"url": "https://bugzilla.suse.com/1258395"
},
{
"category": "external",
"summary": "SUSE Bug 1258396 for CVE-2026-23191",
"url": "https://bugzilla.suse.com/1258396"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_34-default-1-150700.15.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_34-default-1-150700.15.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_34-default-1-150700.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-devel-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.34.1.150700.17.23.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.34.1.150700.17.23.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.34.1.150700.17.23.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-devel-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-macros-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-zfcpdump-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-docs-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-source-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP7:kernel-default-extra-6.4.0-150700.53.34.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.1,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_34-default-1-150700.15.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_34-default-1-150700.15.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_34-default-1-150700.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-devel-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.34.1.150700.17.23.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.34.1.150700.17.23.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.34.1.150700.17.23.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-devel-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-macros-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-zfcpdump-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-docs-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-source-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP7:kernel-default-extra-6.4.0-150700.53.34.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-03-26T13:23:51Z",
"details": "important"
}
],
"title": "CVE-2026-23191"
},
{
"cve": "CVE-2026-23198",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2026-23198"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nKVM: Don\u0027t clobber irqfd routing type when deassigning irqfd\n\nWhen deassigning a KVM_IRQFD, don\u0027t clobber the irqfd\u0027s copy of the IRQ\u0027s\nrouting entry as doing so breaks kvm_arch_irq_bypass_del_producer() on x86\nand arm64, which explicitly look for KVM_IRQ_ROUTING_MSI. Instead, to\nhandle a concurrent routing update, verify that the irqfd is still active\nbefore consuming the routing information. As evidenced by the x86 and\narm64 bugs, and another bug in kvm_arch_update_irqfd_routing() (see below),\nclobbering the entry type without notifying arch code is surprising and\nerror prone.\n\nAs a bonus, checking that the irqfd is active provides a convenient\nlocation for documenting _why_ KVM must not consume the routing entry for\nan irqfd that is in the process of being deassigned: once the irqfd is\ndeleted from the list (which happens *before* the eventfd is detached), it\nwill no longer receive updates via kvm_irq_routing_update(), and so KVM\ncould deliver an event using stale routing information (relative to\nKVM_SET_GSI_ROUTING returning to userspace).\n\nAs an even better bonus, explicitly checking for the irqfd being active\nfixes a similar bug to the one the clobbering is trying to prevent: if an\nirqfd is deactivated, and then its routing is changed,\nkvm_irq_routing_update() won\u0027t invoke kvm_arch_update_irqfd_routing()\n(because the irqfd isn\u0027t in the list). And so if the irqfd is in bypass\nmode, IRQs will continue to be posted using the old routing information.\n\nAs for kvm_arch_irq_bypass_del_producer(), clobbering the routing type\nresults in KVM incorrectly keeping the IRQ in bypass mode, which is\nespecially problematic on AMD as KVM tracks IRQs that are being posted to\na vCPU in a list whose lifetime is tied to the irqfd.\n\nWithout the help of KASAN to detect use-after-free, the most common\nsympton on AMD is a NULL pointer deref in amd_iommu_update_ga() due to\nthe memory for irqfd structure being re-allocated and zeroed, resulting\nin irqfd-\u003eirq_bypass_data being NULL when read by\navic_update_iommu_vcpu_affinity():\n\n BUG: kernel NULL pointer dereference, address: 0000000000000018\n #PF: supervisor read access in kernel mode\n #PF: error_code(0x0000) - not-present page\n PGD 40cf2b9067 P4D 40cf2b9067 PUD 408362a067 PMD 0\n Oops: Oops: 0000 [#1] SMP\n CPU: 6 UID: 0 PID: 40383 Comm: vfio_irq_test\n Tainted: G U W O 6.19.0-smp--5dddc257e6b2-irqfd #31 NONE\n Tainted: [U]=USER, [W]=WARN, [O]=OOT_MODULE\n Hardware name: Google, Inc. Arcadia_IT_80/Arcadia_IT_80, BIOS 34.78.2-0 09/05/2025\n RIP: 0010:amd_iommu_update_ga+0x19/0xe0\n Call Trace:\n \u003cTASK\u003e\n avic_update_iommu_vcpu_affinity+0x3d/0x90 [kvm_amd]\n __avic_vcpu_load+0xf4/0x130 [kvm_amd]\n kvm_arch_vcpu_load+0x89/0x210 [kvm]\n vcpu_load+0x30/0x40 [kvm]\n kvm_arch_vcpu_ioctl_run+0x45/0x620 [kvm]\n kvm_vcpu_ioctl+0x571/0x6a0 [kvm]\n __se_sys_ioctl+0x6d/0xb0\n do_syscall_64+0x6f/0x9d0\n entry_SYSCALL_64_after_hwframe+0x4b/0x53\n RIP: 0033:0x46893b\n \u003c/TASK\u003e\n ---[ end trace 0000000000000000 ]---\n\nIf AVIC is inhibited when the irfd is deassigned, the bug will manifest as\nlist corruption, e.g. on the next irqfd assignment.\n\n list_add corruption. next-\u003eprev should be prev (ffff8d474d5cd588),\n but was 0000000000000000. (next=ffff8d8658f86530).\n ------------[ cut here ]------------\n kernel BUG at lib/list_debug.c:31!\n Oops: invalid opcode: 0000 [#1] SMP\n CPU: 128 UID: 0 PID: 80818 Comm: vfio_irq_test\n Tainted: G U W O 6.19.0-smp--f19dc4d680ba-irqfd #28 NONE\n Tainted: [U]=USER, [W]=WARN, [O]=OOT_MODULE\n Hardware name: Google, Inc. Arcadia_IT_80/Arcadia_IT_80, BIOS 34.78.2-0 09/05/2025\n RIP: 0010:__list_add_valid_or_report+0x97/0xc0\n Call Trace:\n \u003cTASK\u003e\n avic_pi_update_irte+0x28e/0x2b0 [kvm_amd]\n kvm_pi_update_irte+0xbf/0x190 [kvm]\n kvm_arch_irq_bypass_add_producer+0x72/0x90 [kvm]\n irq_bypass_register_consumer+0xcd/0x170 [irqbypa\n---truncated---",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_34-default-1-150700.15.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_34-default-1-150700.15.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_34-default-1-150700.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-devel-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.34.1.150700.17.23.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.34.1.150700.17.23.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.34.1.150700.17.23.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-devel-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-macros-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-zfcpdump-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-docs-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-source-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP7:kernel-default-extra-6.4.0-150700.53.34.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2026-23198",
"url": "https://www.suse.com/security/cve/CVE-2026-23198"
},
{
"category": "external",
"summary": "SUSE Bug 1258321 for CVE-2026-23198",
"url": "https://bugzilla.suse.com/1258321"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_34-default-1-150700.15.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_34-default-1-150700.15.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_34-default-1-150700.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-devel-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.34.1.150700.17.23.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.34.1.150700.17.23.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.34.1.150700.17.23.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-devel-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-macros-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-zfcpdump-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-docs-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-source-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP7:kernel-default-extra-6.4.0-150700.53.34.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.7,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_34-default-1-150700.15.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_34-default-1-150700.15.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_34-default-1-150700.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-devel-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.34.1.150700.17.23.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.34.1.150700.17.23.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.34.1.150700.17.23.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-devel-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-macros-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-zfcpdump-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-docs-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-source-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP7:kernel-default-extra-6.4.0-150700.53.34.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-03-26T13:23:51Z",
"details": "moderate"
}
],
"title": "CVE-2026-23198"
},
{
"cve": "CVE-2026-23202",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2026-23202"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nspi: tegra210-quad: Protect curr_xfer in tegra_qspi_combined_seq_xfer\n\nThe curr_xfer field is read by the IRQ handler without holding the lock\nto check if a transfer is in progress. When clearing curr_xfer in the\ncombined sequence transfer loop, protect it with the spinlock to prevent\na race with the interrupt handler.\n\nProtect the curr_xfer clearing at the exit path of\ntegra_qspi_combined_seq_xfer() with the spinlock to prevent a race\nwith the interrupt handler that reads this field.\n\nWithout this protection, the IRQ handler could read a partially updated\ncurr_xfer value, leading to NULL pointer dereference or use-after-free.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_34-default-1-150700.15.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_34-default-1-150700.15.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_34-default-1-150700.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-devel-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.34.1.150700.17.23.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.34.1.150700.17.23.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.34.1.150700.17.23.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-devel-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-macros-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-zfcpdump-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-docs-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-source-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP7:kernel-default-extra-6.4.0-150700.53.34.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2026-23202",
"url": "https://www.suse.com/security/cve/CVE-2026-23202"
},
{
"category": "external",
"summary": "SUSE Bug 1258338 for CVE-2026-23202",
"url": "https://bugzilla.suse.com/1258338"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_34-default-1-150700.15.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_34-default-1-150700.15.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_34-default-1-150700.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-devel-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.34.1.150700.17.23.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.34.1.150700.17.23.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.34.1.150700.17.23.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-devel-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-macros-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-zfcpdump-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-docs-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-source-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP7:kernel-default-extra-6.4.0-150700.53.34.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_34-default-1-150700.15.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_34-default-1-150700.15.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_34-default-1-150700.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-devel-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.34.1.150700.17.23.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.34.1.150700.17.23.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.34.1.150700.17.23.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-devel-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-macros-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-zfcpdump-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-docs-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-source-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP7:kernel-default-extra-6.4.0-150700.53.34.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-03-26T13:23:51Z",
"details": "important"
}
],
"title": "CVE-2026-23202"
},
{
"cve": "CVE-2026-23204",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2026-23204"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nnet/sched: cls_u32: use skb_header_pointer_careful()\n\nskb_header_pointer() does not fully validate negative @offset values.\n\nUse skb_header_pointer_careful() instead.\n\nGangMin Kim provided a report and a repro fooling u32_classify():\n\nBUG: KASAN: slab-out-of-bounds in u32_classify+0x1180/0x11b0\nnet/sched/cls_u32.c:221",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_34-default-1-150700.15.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_34-default-1-150700.15.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_34-default-1-150700.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-devel-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.34.1.150700.17.23.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.34.1.150700.17.23.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.34.1.150700.17.23.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-devel-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-macros-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-zfcpdump-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-docs-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-source-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP7:kernel-default-extra-6.4.0-150700.53.34.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2026-23204",
"url": "https://www.suse.com/security/cve/CVE-2026-23204"
},
{
"category": "external",
"summary": "SUSE Bug 1258340 for CVE-2026-23204",
"url": "https://bugzilla.suse.com/1258340"
},
{
"category": "external",
"summary": "SUSE Bug 1259126 for CVE-2026-23204",
"url": "https://bugzilla.suse.com/1259126"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_34-default-1-150700.15.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_34-default-1-150700.15.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_34-default-1-150700.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-devel-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.34.1.150700.17.23.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.34.1.150700.17.23.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.34.1.150700.17.23.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-devel-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-macros-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-zfcpdump-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-docs-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-source-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP7:kernel-default-extra-6.4.0-150700.53.34.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_34-default-1-150700.15.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_34-default-1-150700.15.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_34-default-1-150700.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-devel-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.34.1.150700.17.23.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.34.1.150700.17.23.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.34.1.150700.17.23.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-devel-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-macros-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-zfcpdump-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-docs-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-source-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP7:kernel-default-extra-6.4.0-150700.53.34.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-03-26T13:23:51Z",
"details": "important"
}
],
"title": "CVE-2026-23204"
},
{
"cve": "CVE-2026-23207",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2026-23207"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nspi: tegra210-quad: Protect curr_xfer check in IRQ handler\n\nNow that all other accesses to curr_xfer are done under the lock,\nprotect the curr_xfer NULL check in tegra_qspi_isr_thread() with the\nspinlock. Without this protection, the following race can occur:\n\n CPU0 (ISR thread) CPU1 (timeout path)\n ---------------- -------------------\n if (!tqspi-\u003ecurr_xfer)\n // sees non-NULL\n spin_lock()\n tqspi-\u003ecurr_xfer = NULL\n spin_unlock()\n handle_*_xfer()\n spin_lock()\n t = tqspi-\u003ecurr_xfer // NULL!\n ... t-\u003elen ... // NULL dereference!\n\nWith this patch, all curr_xfer accesses are now properly synchronized.\n\nAlthough all accesses to curr_xfer are done under the lock, in\ntegra_qspi_isr_thread() it checks for NULL, releases the lock and\nreacquires it later in handle_cpu_based_xfer()/handle_dma_based_xfer().\nThere is a potential for an update in between, which could cause a NULL\npointer dereference.\n\nTo handle this, add a NULL check inside the handlers after acquiring\nthe lock. This ensures that if the timeout path has already cleared\ncurr_xfer, the handler will safely return without dereferencing the\nNULL pointer.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_34-default-1-150700.15.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_34-default-1-150700.15.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_34-default-1-150700.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-devel-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.34.1.150700.17.23.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.34.1.150700.17.23.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.34.1.150700.17.23.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-devel-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-macros-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-zfcpdump-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-docs-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-source-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP7:kernel-default-extra-6.4.0-150700.53.34.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2026-23207",
"url": "https://www.suse.com/security/cve/CVE-2026-23207"
},
{
"category": "external",
"summary": "SUSE Bug 1258524 for CVE-2026-23207",
"url": "https://bugzilla.suse.com/1258524"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_34-default-1-150700.15.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_34-default-1-150700.15.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_34-default-1-150700.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-devel-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.34.1.150700.17.23.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.34.1.150700.17.23.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.34.1.150700.17.23.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-devel-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-macros-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-zfcpdump-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-docs-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-source-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP7:kernel-default-extra-6.4.0-150700.53.34.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.7,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_34-default-1-150700.15.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_34-default-1-150700.15.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_34-default-1-150700.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-devel-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.34.1.150700.17.23.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.34.1.150700.17.23.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.34.1.150700.17.23.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-devel-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-macros-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-zfcpdump-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-docs-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-source-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP7:kernel-default-extra-6.4.0-150700.53.34.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-03-26T13:23:51Z",
"details": "moderate"
}
],
"title": "CVE-2026-23207"
},
{
"cve": "CVE-2026-23208",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2026-23208"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nALSA: usb-audio: Prevent excessive number of frames\n\nIn this case, the user constructed the parameters with maxpacksize 40\nfor rate 22050 / pps 1000, and packsize[0] 22 packsize[1] 23. The buffer\nsize for each data URB is maxpacksize * packets, which in this example\nis 40 * 6 = 240; When the user performs a write operation to send audio\ndata into the ALSA PCM playback stream, the calculated number of frames\nis packsize[0] * packets = 264, which exceeds the allocated URB buffer\nsize, triggering the out-of-bounds (OOB) issue reported by syzbot [1].\n\nAdded a check for the number of single data URB frames when calculating\nthe number of frames to prevent [1].\n\n[1]\nBUG: KASAN: slab-out-of-bounds in copy_to_urb+0x261/0x460 sound/usb/pcm.c:1487\nWrite of size 264 at addr ffff88804337e800 by task syz.0.17/5506\nCall Trace:\n copy_to_urb+0x261/0x460 sound/usb/pcm.c:1487\n prepare_playback_urb+0x953/0x13d0 sound/usb/pcm.c:1611\n prepare_outbound_urb+0x377/0xc50 sound/usb/endpoint.c:333",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_34-default-1-150700.15.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_34-default-1-150700.15.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_34-default-1-150700.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-devel-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.34.1.150700.17.23.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.34.1.150700.17.23.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.34.1.150700.17.23.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-devel-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-macros-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-zfcpdump-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-docs-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-source-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP7:kernel-default-extra-6.4.0-150700.53.34.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2026-23208",
"url": "https://www.suse.com/security/cve/CVE-2026-23208"
},
{
"category": "external",
"summary": "SUSE Bug 1258468 for CVE-2026-23208",
"url": "https://bugzilla.suse.com/1258468"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_34-default-1-150700.15.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_34-default-1-150700.15.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_34-default-1-150700.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-devel-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.34.1.150700.17.23.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.34.1.150700.17.23.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.34.1.150700.17.23.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-devel-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-macros-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-zfcpdump-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-docs-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-source-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP7:kernel-default-extra-6.4.0-150700.53.34.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.8,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_34-default-1-150700.15.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_34-default-1-150700.15.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_34-default-1-150700.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-devel-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.34.1.150700.17.23.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.34.1.150700.17.23.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.34.1.150700.17.23.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-devel-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-macros-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-zfcpdump-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-docs-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-source-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP7:kernel-default-extra-6.4.0-150700.53.34.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-03-26T13:23:51Z",
"details": "moderate"
}
],
"title": "CVE-2026-23208"
},
{
"cve": "CVE-2026-23209",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2026-23209"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nmacvlan: fix error recovery in macvlan_common_newlink()\n\nvalis provided a nice repro to crash the kernel:\n\nip link add p1 type veth peer p2\nip link set address 00:00:00:00:00:20 dev p1\nip link set up dev p1\nip link set up dev p2\n\nip link add mv0 link p2 type macvlan mode source\nip link add invalid% link p2 type macvlan mode source macaddr add 00:00:00:00:00:20\n\nping -c1 -I p1 1.2.3.4\n\nHe also gave a very detailed analysis:\n\n\u003cquote valis\u003e\n\nThe issue is triggered when a new macvlan link is created with\nMACVLAN_MODE_SOURCE mode and MACVLAN_MACADDR_ADD (or\nMACVLAN_MACADDR_SET) parameter, lower device already has a macvlan\nport and register_netdevice() called from macvlan_common_newlink()\nfails (e.g. because of the invalid link name).\n\nIn this case macvlan_hash_add_source is called from\nmacvlan_change_sources() / macvlan_common_newlink():\n\nThis adds a reference to vlan to the port\u0027s vlan_source_hash using\nmacvlan_source_entry.\n\nvlan is a pointer to the priv data of the link that is being created.\n\nWhen register_netdevice() fails, the error is returned from\nmacvlan_newlink() to rtnl_newlink_create():\n\n if (ops-\u003enewlink)\n err = ops-\u003enewlink(dev, \u0026params, extack);\n else\n err = register_netdevice(dev);\n if (err \u003c 0) {\n free_netdev(dev);\n goto out;\n }\n\nand free_netdev() is called, causing a kvfree() on the struct\nnet_device that is still referenced in the source entry attached to\nthe lower device\u0027s macvlan port.\n\nNow all packets sent on the macvlan port with a matching source mac\naddress will trigger a use-after-free in macvlan_forward_source().\n\n\u003c/quote valis\u003e\n\nWith all that, my fix is to make sure we call macvlan_flush_sources()\nregardless of @create value whenever \"goto destroy_macvlan_port;\"\npath is taken.\n\nMany thanks to valis for following up on this issue.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_34-default-1-150700.15.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_34-default-1-150700.15.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_34-default-1-150700.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-devel-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.34.1.150700.17.23.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.34.1.150700.17.23.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.34.1.150700.17.23.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-devel-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-macros-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-zfcpdump-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-docs-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-source-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP7:kernel-default-extra-6.4.0-150700.53.34.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2026-23209",
"url": "https://www.suse.com/security/cve/CVE-2026-23209"
},
{
"category": "external",
"summary": "SUSE Bug 1258518 for CVE-2026-23209",
"url": "https://bugzilla.suse.com/1258518"
},
{
"category": "external",
"summary": "SUSE Bug 1258784 for CVE-2026-23209",
"url": "https://bugzilla.suse.com/1258784"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_34-default-1-150700.15.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_34-default-1-150700.15.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_34-default-1-150700.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-devel-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.34.1.150700.17.23.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.34.1.150700.17.23.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.34.1.150700.17.23.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-devel-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-macros-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-zfcpdump-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-docs-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-source-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP7:kernel-default-extra-6.4.0-150700.53.34.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_34-default-1-150700.15.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_34-default-1-150700.15.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_34-default-1-150700.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-devel-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.34.1.150700.17.23.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.34.1.150700.17.23.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.34.1.150700.17.23.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-devel-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-macros-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-zfcpdump-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-docs-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-source-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP7:kernel-default-extra-6.4.0-150700.53.34.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-03-26T13:23:51Z",
"details": "important"
}
],
"title": "CVE-2026-23209"
},
{
"cve": "CVE-2026-23210",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2026-23210"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nice: Fix PTP NULL pointer dereference during VSI rebuild\n\nFix race condition where PTP periodic work runs while VSI is being\nrebuilt, accessing NULL vsi-\u003erx_rings.\n\nThe sequence was:\n1. ice_ptp_prepare_for_reset() cancels PTP work\n2. ice_ptp_rebuild() immediately queues PTP work\n3. VSI rebuild happens AFTER ice_ptp_rebuild()\n4. PTP work runs and accesses NULL vsi-\u003erx_rings\n\nFix: Keep PTP work cancelled during rebuild, only queue it after\nVSI rebuild completes in ice_rebuild().\n\nAdded ice_ptp_queue_work() helper function to encapsulate the logic\nfor queuing PTP work, ensuring it\u0027s only queued when PTP is supported\nand the state is ICE_PTP_READY.\n\nError log:\n[ 121.392544] ice 0000:60:00.1: PTP reset successful\n[ 121.392692] BUG: kernel NULL pointer dereference, address: 0000000000000000\n[ 121.392712] #PF: supervisor read access in kernel mode\n[ 121.392720] #PF: error_code(0x0000) - not-present page\n[ 121.392727] PGD 0\n[ 121.392734] Oops: Oops: 0000 [#1] SMP NOPTI\n[ 121.392746] CPU: 8 UID: 0 PID: 1005 Comm: ice-ptp-0000:60 Tainted: G S 6.19.0-rc6+ #4 PREEMPT(voluntary)\n[ 121.392761] Tainted: [S]=CPU_OUT_OF_SPEC\n[ 121.392773] RIP: 0010:ice_ptp_update_cached_phctime+0xbf/0x150 [ice]\n[ 121.393042] Call Trace:\n[ 121.393047] \u003cTASK\u003e\n[ 121.393055] ice_ptp_periodic_work+0x69/0x180 [ice]\n[ 121.393202] kthread_worker_fn+0xa2/0x260\n[ 121.393216] ? __pfx_ice_ptp_periodic_work+0x10/0x10 [ice]\n[ 121.393359] ? __pfx_kthread_worker_fn+0x10/0x10\n[ 121.393371] kthread+0x10d/0x230\n[ 121.393382] ? __pfx_kthread+0x10/0x10\n[ 121.393393] ret_from_fork+0x273/0x2b0\n[ 121.393407] ? __pfx_kthread+0x10/0x10\n[ 121.393417] ret_from_fork_asm+0x1a/0x30\n[ 121.393432] \u003c/TASK\u003e",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_34-default-1-150700.15.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_34-default-1-150700.15.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_34-default-1-150700.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-devel-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.34.1.150700.17.23.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.34.1.150700.17.23.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.34.1.150700.17.23.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-devel-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-macros-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-zfcpdump-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-docs-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-source-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP7:kernel-default-extra-6.4.0-150700.53.34.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2026-23210",
"url": "https://www.suse.com/security/cve/CVE-2026-23210"
},
{
"category": "external",
"summary": "SUSE Bug 1258517 for CVE-2026-23210",
"url": "https://bugzilla.suse.com/1258517"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_34-default-1-150700.15.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_34-default-1-150700.15.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_34-default-1-150700.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-devel-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.34.1.150700.17.23.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.34.1.150700.17.23.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.34.1.150700.17.23.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-devel-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-macros-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-zfcpdump-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-docs-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-source-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP7:kernel-default-extra-6.4.0-150700.53.34.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.7,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_34-default-1-150700.15.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_34-default-1-150700.15.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_34-default-1-150700.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-devel-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.34.1.150700.17.23.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.34.1.150700.17.23.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.34.1.150700.17.23.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-devel-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-macros-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-zfcpdump-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-docs-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-source-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP7:kernel-default-extra-6.4.0-150700.53.34.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-03-26T13:23:51Z",
"details": "moderate"
}
],
"title": "CVE-2026-23210"
},
{
"cve": "CVE-2026-23213",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2026-23213"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\ndrm/amd/pm: Disable MMIO access during SMU Mode 1 reset\n\nDuring Mode 1 reset, the ASIC undergoes a reset cycle and becomes\ntemporarily inaccessible via PCIe. Any attempt to access MMIO registers\nduring this window (e.g., from interrupt handlers or other driver threads)\ncan result in uncompleted PCIe transactions, leading to NMI panics or\nsystem hangs.\n\nTo prevent this, set the `no_hw_access` flag to true immediately after\ntriggering the reset. This signals other driver components to skip\nregister accesses while the device is offline.\n\nA memory barrier `smp_mb()` is added to ensure the flag update is\nglobally visible to all cores before the driver enters the sleep/wait\nstate.\n\n(cherry picked from commit 7edb503fe4b6d67f47d8bb0dfafb8e699bb0f8a4)",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_34-default-1-150700.15.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_34-default-1-150700.15.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_34-default-1-150700.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-devel-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.34.1.150700.17.23.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.34.1.150700.17.23.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.34.1.150700.17.23.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-devel-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-macros-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-zfcpdump-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-docs-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-source-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP7:kernel-default-extra-6.4.0-150700.53.34.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2026-23213",
"url": "https://www.suse.com/security/cve/CVE-2026-23213"
},
{
"category": "external",
"summary": "SUSE Bug 1258465 for CVE-2026-23213",
"url": "https://bugzilla.suse.com/1258465"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_34-default-1-150700.15.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_34-default-1-150700.15.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_34-default-1-150700.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-devel-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.34.1.150700.17.23.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.34.1.150700.17.23.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.34.1.150700.17.23.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-devel-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-macros-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-zfcpdump-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-docs-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-source-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP7:kernel-default-extra-6.4.0-150700.53.34.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_34-default-1-150700.15.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_34-default-1-150700.15.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_34-default-1-150700.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-devel-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.34.1.150700.17.23.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.34.1.150700.17.23.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.34.1.150700.17.23.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-devel-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-macros-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-zfcpdump-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-docs-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-source-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP7:kernel-default-extra-6.4.0-150700.53.34.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-03-26T13:23:51Z",
"details": "moderate"
}
],
"title": "CVE-2026-23213"
},
{
"cve": "CVE-2026-23214",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2026-23214"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nbtrfs: reject new transactions if the fs is fully read-only\n\n[BUG]\nThere is a bug report where a heavily fuzzed fs is mounted with all\nrescue mount options, which leads to the following warnings during\nunmount:\n\n BTRFS: Transaction aborted (error -22)\n Modules linked in:\n CPU: 0 UID: 0 PID: 9758 Comm: repro.out Not tainted\n 6.19.0-rc5-00002-gb71e635feefc #7 PREEMPT(full)\n Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.15.0-1 04/01/2014\n RIP: 0010:find_free_extent_update_loop fs/btrfs/extent-tree.c:4208 [inline]\n RIP: 0010:find_free_extent+0x52f0/0x5d20 fs/btrfs/extent-tree.c:4611\n Call Trace:\n \u003cTASK\u003e\n btrfs_reserve_extent+0x2cd/0x790 fs/btrfs/extent-tree.c:4705\n btrfs_alloc_tree_block+0x1e1/0x10e0 fs/btrfs/extent-tree.c:5157\n btrfs_force_cow_block+0x578/0x2410 fs/btrfs/ctree.c:517\n btrfs_cow_block+0x3c4/0xa80 fs/btrfs/ctree.c:708\n btrfs_search_slot+0xcad/0x2b50 fs/btrfs/ctree.c:2130\n btrfs_truncate_inode_items+0x45d/0x2350 fs/btrfs/inode-item.c:499\n btrfs_evict_inode+0x923/0xe70 fs/btrfs/inode.c:5628\n evict+0x5f4/0xae0 fs/inode.c:837\n __dentry_kill+0x209/0x660 fs/dcache.c:670\n finish_dput+0xc9/0x480 fs/dcache.c:879\n shrink_dcache_for_umount+0xa0/0x170 fs/dcache.c:1661\n generic_shutdown_super+0x67/0x2c0 fs/super.c:621\n kill_anon_super+0x3b/0x70 fs/super.c:1289\n btrfs_kill_super+0x41/0x50 fs/btrfs/super.c:2127\n deactivate_locked_super+0xbc/0x130 fs/super.c:474\n cleanup_mnt+0x425/0x4c0 fs/namespace.c:1318\n task_work_run+0x1d4/0x260 kernel/task_work.c:233\n exit_task_work include/linux/task_work.h:40 [inline]\n do_exit+0x694/0x22f0 kernel/exit.c:971\n do_group_exit+0x21c/0x2d0 kernel/exit.c:1112\n __do_sys_exit_group kernel/exit.c:1123 [inline]\n __se_sys_exit_group kernel/exit.c:1121 [inline]\n __x64_sys_exit_group+0x3f/0x40 kernel/exit.c:1121\n x64_sys_call+0x2210/0x2210 arch/x86/include/generated/asm/syscalls_64.h:232\n do_syscall_x64 arch/x86/entry/syscall_64.c:63 [inline]\n do_syscall_64+0xe8/0xf80 arch/x86/entry/syscall_64.c:94\n entry_SYSCALL_64_after_hwframe+0x77/0x7f\n RIP: 0033:0x44f639\n Code: Unable to access opcode bytes at 0x44f60f.\n RSP: 002b:00007ffc15c4e088 EFLAGS: 00000246 ORIG_RAX: 00000000000000e7\n RAX: ffffffffffffffda RBX: 00000000004c32f0 RCX: 000000000044f639\n RDX: 000000000000003c RSI: 00000000000000e7 RDI: 0000000000000001\n RBP: 0000000000000001 R08: ffffffffffffffc0 R09: 0000000000000000\n R10: 0000000000000000 R11: 0000000000000246 R12: 00000000004c32f0\n R13: 0000000000000001 R14: 0000000000000000 R15: 0000000000000001\n \u003c/TASK\u003e\n\nSince rescue mount options will mark the full fs read-only, there should\nbe no new transaction triggered.\n\nBut during unmount we will evict all inodes, which can trigger a new\ntransaction, and triggers warnings on a heavily corrupted fs.\n\n[CAUSE]\nBtrfs allows new transaction even on a read-only fs, this is to allow\nlog replay happen even on read-only mounts, just like what ext4/xfs do.\n\nHowever with rescue mount options, the fs is fully read-only and cannot\nbe remounted read-write, thus in that case we should also reject any new\ntransactions.\n\n[FIX]\nIf we find the fs has rescue mount options, we should treat the fs as\nerror, so that no new transaction can be started.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_34-default-1-150700.15.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_34-default-1-150700.15.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_34-default-1-150700.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-devel-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.34.1.150700.17.23.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.34.1.150700.17.23.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.34.1.150700.17.23.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-devel-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-macros-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-zfcpdump-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-docs-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-source-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP7:kernel-default-extra-6.4.0-150700.53.34.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2026-23214",
"url": "https://www.suse.com/security/cve/CVE-2026-23214"
},
{
"category": "external",
"summary": "SUSE Bug 1258464 for CVE-2026-23214",
"url": "https://bugzilla.suse.com/1258464"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_34-default-1-150700.15.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_34-default-1-150700.15.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_34-default-1-150700.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-devel-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.34.1.150700.17.23.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.34.1.150700.17.23.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.34.1.150700.17.23.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-devel-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-macros-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-zfcpdump-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-docs-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-source-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP7:kernel-default-extra-6.4.0-150700.53.34.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.6,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_34-default-1-150700.15.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_34-default-1-150700.15.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_34-default-1-150700.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-devel-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.34.1.150700.17.23.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.34.1.150700.17.23.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.34.1.150700.17.23.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-devel-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-macros-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-zfcpdump-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-docs-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-source-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP7:kernel-default-extra-6.4.0-150700.53.34.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-03-26T13:23:51Z",
"details": "moderate"
}
],
"title": "CVE-2026-23214"
},
{
"cve": "CVE-2026-23221",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2026-23221"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nbus: fsl-mc: fix use-after-free in driver_override_show()\n\nThe driver_override_show() function reads the driver_override string\nwithout holding the device_lock. However, driver_override_store() uses\ndriver_set_override(), which modifies and frees the string while holding\nthe device_lock.\n\nThis can result in a concurrent use-after-free if the string is freed\nby the store function while being read by the show function.\n\nFix this by holding the device_lock around the read operation.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_34-default-1-150700.15.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_34-default-1-150700.15.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_34-default-1-150700.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-devel-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.34.1.150700.17.23.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.34.1.150700.17.23.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.34.1.150700.17.23.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-devel-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-macros-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-zfcpdump-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-docs-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-source-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP7:kernel-default-extra-6.4.0-150700.53.34.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2026-23221",
"url": "https://www.suse.com/security/cve/CVE-2026-23221"
},
{
"category": "external",
"summary": "SUSE Bug 1258660 for CVE-2026-23221",
"url": "https://bugzilla.suse.com/1258660"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_34-default-1-150700.15.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_34-default-1-150700.15.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_34-default-1-150700.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-devel-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.34.1.150700.17.23.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.34.1.150700.17.23.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.34.1.150700.17.23.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-devel-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-macros-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-zfcpdump-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-docs-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-source-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP7:kernel-default-extra-6.4.0-150700.53.34.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_34-default-1-150700.15.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_34-default-1-150700.15.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_34-default-1-150700.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-devel-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.34.1.150700.17.23.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.34.1.150700.17.23.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.34.1.150700.17.23.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-devel-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-macros-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-zfcpdump-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-docs-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-source-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP7:kernel-default-extra-6.4.0-150700.53.34.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-03-26T13:23:51Z",
"details": "moderate"
}
],
"title": "CVE-2026-23221"
},
{
"cve": "CVE-2026-23222",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2026-23222"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\ncrypto: omap - Allocate OMAP_CRYPTO_FORCE_COPY scatterlists correctly\n\nThe existing allocation of scatterlists in omap_crypto_copy_sg_lists()\nwas allocating an array of scatterlist pointers, not scatterlist objects,\nresulting in a 4x too small allocation.\n\nUse sizeof(*new_sg) to get the correct object size.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_34-default-1-150700.15.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_34-default-1-150700.15.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_34-default-1-150700.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-devel-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.34.1.150700.17.23.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.34.1.150700.17.23.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.34.1.150700.17.23.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-devel-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-macros-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-zfcpdump-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-docs-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-source-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP7:kernel-default-extra-6.4.0-150700.53.34.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2026-23222",
"url": "https://www.suse.com/security/cve/CVE-2026-23222"
},
{
"category": "external",
"summary": "SUSE Bug 1258484 for CVE-2026-23222",
"url": "https://bugzilla.suse.com/1258484"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_34-default-1-150700.15.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_34-default-1-150700.15.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_34-default-1-150700.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-devel-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.34.1.150700.17.23.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.34.1.150700.17.23.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.34.1.150700.17.23.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-devel-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-macros-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-zfcpdump-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-docs-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-source-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP7:kernel-default-extra-6.4.0-150700.53.34.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:L",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_34-default-1-150700.15.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_34-default-1-150700.15.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_34-default-1-150700.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-devel-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.34.1.150700.17.23.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.34.1.150700.17.23.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.34.1.150700.17.23.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-devel-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-macros-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-zfcpdump-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-docs-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-source-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP7:kernel-default-extra-6.4.0-150700.53.34.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-03-26T13:23:51Z",
"details": "moderate"
}
],
"title": "CVE-2026-23222"
},
{
"cve": "CVE-2026-23229",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2026-23229"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\ncrypto: virtio - Add spinlock protection with virtqueue notification\n\nWhen VM boots with one virtio-crypto PCI device and builtin backend,\nrun openssl benchmark command with multiple processes, such as\n openssl speed -evp aes-128-cbc -engine afalg -seconds 10 -multi 32\n\nopenssl processes will hangup and there is error reported like this:\n virtio_crypto virtio0: dataq.0:id 3 is not a head!\n\nIt seems that the data virtqueue need protection when it is handled\nfor virtio done notification. If the spinlock protection is added\nin virtcrypto_done_task(), openssl benchmark with multiple processes\nworks well.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_34-default-1-150700.15.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_34-default-1-150700.15.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_34-default-1-150700.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-devel-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.34.1.150700.17.23.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.34.1.150700.17.23.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.34.1.150700.17.23.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-devel-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-macros-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-zfcpdump-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-docs-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-source-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP7:kernel-default-extra-6.4.0-150700.53.34.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2026-23229",
"url": "https://www.suse.com/security/cve/CVE-2026-23229"
},
{
"category": "external",
"summary": "SUSE Bug 1258429 for CVE-2026-23229",
"url": "https://bugzilla.suse.com/1258429"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_34-default-1-150700.15.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_34-default-1-150700.15.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_34-default-1-150700.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-devel-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.34.1.150700.17.23.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.34.1.150700.17.23.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.34.1.150700.17.23.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-devel-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-macros-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-zfcpdump-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-docs-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-source-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP7:kernel-default-extra-6.4.0-150700.53.34.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_34-default-1-150700.15.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_34-default-1-150700.15.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_34-default-1-150700.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-devel-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.34.1.150700.17.23.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.34.1.150700.17.23.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.34.1.150700.17.23.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-devel-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-macros-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-zfcpdump-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-docs-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-source-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP7:kernel-default-extra-6.4.0-150700.53.34.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-03-26T13:23:51Z",
"details": "moderate"
}
],
"title": "CVE-2026-23229"
},
{
"cve": "CVE-2026-23268",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2026-23268"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\napparmor: fix unprivileged local user can do privileged policy management\n\nAn unprivileged local user can load, replace, and remove profiles by\nopening the apparmorfs interfaces, via a confused deputy attack, by\npassing the opened fd to a privileged process, and getting the\nprivileged process to write to the interface.\n\nThis does require a privileged target that can be manipulated to do\nthe write for the unprivileged process, but once such access is\nachieved full policy management is possible and all the possible\nimplications that implies: removing confinement, DoS of system or\ntarget applications by denying all execution, by-passing the\nunprivileged user namespace restriction, to exploiting kernel bugs for\na local privilege escalation.\n\nThe policy management interface can not have its permissions simply\nchanged from 0666 to 0600 because non-root processes need to be able\nto load policy to different policy namespaces.\n\nInstead ensure the task writing the interface has privileges that\nare a subset of the task that opened the interface. This is already\ndone via policy for confined processes, but unconfined can delegate\naccess to the opened fd, by-passing the usual policy check.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_34-default-1-150700.15.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_34-default-1-150700.15.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_34-default-1-150700.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-devel-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.34.1.150700.17.23.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.34.1.150700.17.23.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.34.1.150700.17.23.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-devel-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-macros-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-zfcpdump-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-docs-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-source-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP7:kernel-default-extra-6.4.0-150700.53.34.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2026-23268",
"url": "https://www.suse.com/security/cve/CVE-2026-23268"
},
{
"category": "external",
"summary": "SUSE Bug 1258850 for CVE-2026-23268",
"url": "https://bugzilla.suse.com/1258850"
},
{
"category": "external",
"summary": "SUSE Bug 1259859 for CVE-2026-23268",
"url": "https://bugzilla.suse.com/1259859"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_34-default-1-150700.15.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_34-default-1-150700.15.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_34-default-1-150700.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-devel-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.34.1.150700.17.23.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.34.1.150700.17.23.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.34.1.150700.17.23.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-devel-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-macros-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-zfcpdump-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-docs-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-source-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP7:kernel-default-extra-6.4.0-150700.53.34.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_34-default-1-150700.15.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_34-default-1-150700.15.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_34-default-1-150700.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-devel-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.34.1.150700.17.23.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.34.1.150700.17.23.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.34.1.150700.17.23.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-devel-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-macros-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-zfcpdump-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-docs-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-source-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP7:kernel-default-extra-6.4.0-150700.53.34.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-03-26T13:23:51Z",
"details": "important"
}
],
"title": "CVE-2026-23268"
},
{
"cve": "CVE-2026-23269",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2026-23269"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\napparmor: validate DFA start states are in bounds in unpack_pdb\n\nStart states are read from untrusted data and used as indexes into the\nDFA state tables. The aa_dfa_next() function call in unpack_pdb() will\naccess dfa-\u003etables[YYTD_ID_BASE][start], and if the start state exceeds\nthe number of states in the DFA, this results in an out-of-bound read.\n\n==================================================================\n BUG: KASAN: slab-out-of-bounds in aa_dfa_next+0x2a1/0x360\n Read of size 4 at addr ffff88811956fb90 by task su/1097\n ...\n\nReject policies with out-of-bounds start states during unpacking\nto prevent the issue.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_34-default-1-150700.15.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_34-default-1-150700.15.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_34-default-1-150700.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-devel-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.34.1.150700.17.23.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.34.1.150700.17.23.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.34.1.150700.17.23.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-devel-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-macros-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-zfcpdump-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-docs-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-source-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP7:kernel-default-extra-6.4.0-150700.53.34.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2026-23269",
"url": "https://www.suse.com/security/cve/CVE-2026-23269"
},
{
"category": "external",
"summary": "SUSE Bug 1259857 for CVE-2026-23269",
"url": "https://bugzilla.suse.com/1259857"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_34-default-1-150700.15.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_34-default-1-150700.15.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_34-default-1-150700.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-devel-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.34.1.150700.17.23.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.34.1.150700.17.23.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.34.1.150700.17.23.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-devel-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-macros-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-zfcpdump-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-docs-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-source-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP7:kernel-default-extra-6.4.0-150700.53.34.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.1,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:cluster-md-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:dlm-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:gfs2-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP7:ocfs2-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-default-livepatch-devel-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_34-default-1-150700.15.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_34-default-1-150700.15.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_53_34-default-1-150700.15.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-64kb-devel-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.34.1.150700.17.23.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.34.1.150700.17.23.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-base-6.4.0-150700.53.34.1.150700.17.23.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-default-devel-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-devel-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-macros-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:kernel-zfcpdump-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-docs-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-obs-build-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-source-6.4.0-150700.53.34.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:kernel-syms-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP7:reiserfs-kmp-default-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.53.34.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:kernel-azure-devel-6.4.0-150700.53.34.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP7:kernel-default-extra-6.4.0-150700.53.34.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-03-26T13:23:51Z",
"details": "moderate"
}
],
"title": "CVE-2026-23269"
}
]
}
SUSE-SU-2026:0962-1
Vulnerability from csaf_suse - Published: 2026-03-23 09:09 - Updated: 2026-03-23 09:09| URL | Category | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
{
"document": {
"aggregate_severity": {
"namespace": "https://www.suse.com/support/security/rating/",
"text": "important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright 2024 SUSE LLC. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Security update for the Linux Kernel",
"title": "Title of the patch"
},
{
"category": "description",
"text": "\nThe SUSE Linux Enterprise 15 SP7 RT kernel was updated to receive various security bugfixes.\n\n\nThe following security bugs were fixed:\n\n- CVE-2023-53817: crypto: lib/mpi - avoid null pointer deref in mpi_cmp_ui() (bsc#1254992).\n- CVE-2025-39748: bpf: Forget ranges when refining tnum after JSET (bsc#1249587).\n- CVE-2025-39817: efivarfs: Fix slab-out-of-bounds in efivarfs_d_compare (bsc#1249998).\n- CVE-2025-39964: crypto: af_alg - Disallow concurrent writes in af_alg_sendmsg (bsc#1251966).\n- CVE-2025-40099: cifs: parse_dfs_referrals: prevent oob on malformed input (bsc#1252911).\n- CVE-2025-40103: smb: client: Fix refcount leak for cifs_sb_tlink (bsc#1252924).\n- CVE-2025-40201: kernel/sys.c: fix the racy usage of task_lock(tsk-\u003egroup_leader) in sys_prlimit64() paths\n- CVE-2025-40253: s390/ctcm: Fix double-kfree (bsc#1255084).\n- CVE-2025-68283: libceph: replace BUG_ON with bounds check for map-\u003emax_osd (bsc#1255379).\n- CVE-2025-68295: smb: client: fix memory leak in cifs_construct_tcon() (bsc#1255129).\n- CVE-2025-68374: md: fix rcu protection in md_wakeup_thread (bsc#1255530).\n- CVE-2025-68735: drm/panthor: Prevent potential UAF in group creation (bsc#1255811).\n- CVE-2025-68736: landlock: Fix handling of disconnected directories (bsc#1255698).\n- CVE-2025-68778: btrfs: don\u0027t log conflicting inode if it\u0027s a dir moved in the current transaction (bsc#1256683).\n- CVE-2025-68785: net: openvswitch: fix middle attribute validation in push_nsh() action (bsc#1256640).\n- CVE-2025-68810: KVM: Disallow toggling KVM_MEM_GUEST_MEMFD on an existing memslot (bsc#1256679).\n- CVE-2025-71071: iommu/mediatek: fix use-after-free on probe deferral (bsc#1256802).\n- CVE-2025-71104: KVM: x86: Fix VM hard lockup after prolonged inactivity with periodic HV timer (bsc#1256708).\n- CVE-2025-71113: crypto: af_alg - zero initialize memory allocated via sock_kmalloc (bsc#1256716).\n- CVE-2025-71125: tracing: Do not register unsupported perf events (bsc#1256784).\n- CVE-2025-71126: mptcp: reset fallback status gracefully at disconnect() time (bsc#1256755).\n- CVE-2025-71148: net/handshake: restore destructor on submit failure (bsc#1257159).\n- CVE-2025-71184: btrfs: fix NULL dereference on root when tracing inode eviction (bsc#1257635).\n- CVE-2025-71194: btrfs: fix deadlock in wait_current_trans() due to ignored transaction type (bsc#1257687).\n- CVE-2025-71225: md: suspend array while updating raid_disks via sysfs (bsc#1258411).\n- CVE-2026-22979: net: fix memory leak in skb_segment_list for GRO packets (bsc#1257228).\n- CVE-2026-22982: net: mscc: ocelot: Fix crash when adding interface under a lag (bsc#1257179).\n- CVE-2026-22998: nvme-tcp: fix NULL pointer dereferences in nvmet_tcp_build_pdu_iovec (bsc#1257209).\n- CVE-2026-23003: geneve: Fix incorrect inner network header offset when innerprotoinherit is set (bsc#1257246).\n- CVE-2026-23004: dst: fix races in rt6_uncached_list_del() and rt_del_uncached_list() (bsc#1257231).\n- CVE-2026-23010: ipv6: Fix use-after-free in inet6_addr_del() (bsc#1257332).\n- CVE-2026-23017: idpf: fix error handling in the init_task on load (bsc#1257552).\n- CVE-2026-23023: idpf: fix memory leak in idpf_vport_rel() (bsc#1257556).\n- CVE-2026-23035: net/mlx5e: Pass netdev to mlx5e_destroy_netdev instead of priv (bsc#1257559).\n- CVE-2026-23053: NFS: Fix a deadlock involving nfs_release_folio() (bsc#1257718).\n- CVE-2026-23057: vsock/virtio: Coalesce only linear skb (bsc#1257740).\n- CVE-2026-23060: crypto: authencesn - reject too-short AAD (assoclen\u003c8) to match ESP/ESN spec (bsc#1257735).\n- CVE-2026-23064: net/sched: act_ife: avoid possible NULL deref (bsc#1257765).\n- CVE-2026-23069: vsock/virtio: fix potential underflow in virtio_transport_get_credit() (bsc#1257755).\n- CVE-2026-23070: Octeontx2-af: Add proper checks for fwdata (bsc#1257709).\n- CVE-2026-23074: net/sched: Enforce that teql can only be used as root qdisc (bsc#1257749).\n- CVE-2026-23083: fou: Don\u0027t allow 0 for FOU_ATTR_IPPROTO (bsc#1257745).\n- CVE-2026-23084: be2net: Fix NULL pointer dereference in be_cmd_get_mac_from_list (bsc#1257830).\n- CVE-2026-23085: irqchip/gic-v3-its: Avoid truncating memory addresses (bsc#1257758).\n- CVE-2026-23086: vsock/virtio: cap TX credit to local buffer size (bsc#1257757).\n- CVE-2026-23088: tracing: Fix crash on synthetic stacktrace field usage (bsc#1257814).\n- CVE-2026-23089: ALSA: usb-audio: Fix use-after-free in snd_usb_mixer_free() (bsc#1257790).\n- CVE-2026-23095: gue: Fix skb memleak with inner IP protocol 0 (bsc#1257808).\n- CVE-2026-23099: bonding: limit BOND_MODE_8023AD to Ethernet devices (bsc#1257816).\n- CVE-2026-23102: arm64/fpsimd: signal: Mandate SVE payload for streaming-mode state (bsc#1257772).\n- CVE-2026-23104: ice: fix devlink reload call trace (bsc#1257763).\n- CVE-2026-23105: net/sched: qfq: Use cl_is_active to determine whether class is active in qfq_rm_from_ag (bsc#1257775).\n- CVE-2026-23107: arm64/fpsimd: signal: Allocate SSVE storage when restoring ZA (bsc#1257762).\n- CVE-2026-23110: scsi: core: Wake up the error handler when final completions race against each other (bsc#1257761).\n- CVE-2026-23111: netfilter: nf_tables: fix inverted genmask check in nft_map_catchall_activate() (bsc#1258181).\n- CVE-2026-23112: nvmet-tcp: add bounds checks in nvmet_tcp_build_pdu_iovec (bsc#1258184).\n- CVE-2026-23113: io_uring/io-wq: check IO_WQ_BIT_EXIT inside work run loop (bsc#1258278).\n- CVE-2026-23116: pmdomain: imx8m-blk-ctrl: Remove separate rst and clk mask for 8mq vpu (bsc#1258277).\n- CVE-2026-23119: bonding: provide a net pointer to __skb_flow_dissect() (bsc#1258273).\n- CVE-2026-23125: sctp: move SCTP_CMD_ASSOC_SHKEY right after SCTP_CMD_PEER_INIT (bsc#1258293).\n- CVE-2026-23139: netfilter: nf_conncount: update last_gc only when GC has been performed (bsc#1258304).\n- CVE-2026-23141: btrfs: send: check for inline extents in range_is_hole_in_parent() (bsc#1258377).\n- CVE-2026-23154: net: fix segmentation of forwarding fraglist GRO (bsc#1258286).\n- CVE-2026-23166: ice: Fix NULL pointer dereference in ice_vsi_set_napi_queues (bsc#1258272).\n- CVE-2026-23169: mptcp: fix race in mptcp_pm_nl_flush_addrs_doit() (bsc#1258389).\n- CVE-2026-23171: net: bonding: update the slave array for broadcast mode (bsc#1258349).\n- CVE-2026-23173: net/mlx5e: TC, delete flows only for existing peers (bsc#1258520).\n- CVE-2026-23179: nvmet-tcp: fixup hang in nvmet_tcp_listen_data_ready() (bsc#1258394).\n- CVE-2026-23191: ALSA: aloop: Fix racy access at PCM trigger (bsc#1258395).\n- CVE-2026-23198: KVM: Don\u0027t clobber irqfd routing type when deassigning irqfd (bsc#1258321).\n- CVE-2026-23204: net/sched: cls_u32: use skb_header_pointer_careful() (bsc#1258340).\n- CVE-2026-23208: ALSA: usb-audio: Prevent excessive number of frames (bsc#1258468).\n- CVE-2026-23209: macvlan: fix error recovery in macvlan_common_newlink() (bsc#1258518).\n- CVE-2026-23210: ice: Fix PTP NULL pointer dereference during VSI rebuild (bsc#1258517).\n- CVE-2026-23213: drm/amd/pm: Disable MMIO access during SMU Mode 1 reset (bsc#1258465).\n- CVE-2026-23214: btrfs: reject new transactions if the fs is fully read-only (bsc#1258464).\n- CVE-2026-23268: apparmor: fix unprivileged local user can do privileged policy management\n- CVE-2026-23269: apparmor: validate DFA start states are in bounds in unpack_pdb\n\nThe following non-security bugs were fixed:\n\n- ACPI: CPPC: Fix remaining for_each_possible_cpu() to use online CPUs (git-fixes).\n- ACPI: OSL: fix __iomem type on return from acpi_os_map_generic_address() (git-fixes).\n- ACPI: PM: Add unused power resource quirk for THUNDEROBOT ZERO (git-fixes).\n- ACPI: processor: Fix NULL-pointer dereference in acpi_processor_errata_piix4() (stable-fixes).\n- ACPICA: Abort AML bytecode execution when executing AML_FATAL_OP (stable-fixes).\n- ACPICA: Fix NULL pointer dereference in acpi_ev_address_space_dispatch() (git-fixes).\n- ALSA: hda/conexant: Add headset mic fix for MECHREVO Wujie 15X Pro (stable-fixes).\n- ALSA: hda/realtek - fixed speaker no sound (stable-fixes).\n- ALSA: hda/realtek: Add quirk for Inspur S14-G1 (stable-fixes).\n- ALSA: hda/realtek: Fix headset mic for TongFang X6AR55xU (stable-fixes).\n- ALSA: hda/realtek: Really fix headset mic for TongFang X6AR55xU (git-fixes).\n- ALSA: hda/realtek: add HP Laptop 15s-eq1xxx mute LED quirk (stable-fixes).\n- ALSA: hda/realtek: fix right sounds and mute/micmute LEDs for HP machine (stable-fixes).\n- ALSA: usb-audio: Add iface reset and delay quirk for AB13X USB Audio (stable-fixes).\n- ALSA: usb-audio: Add sanity check for OOB writes at silencing (stable-fixes).\n- ALSA: usb-audio: Avoid implicit feedback mode on DIYINHK USB Audio 2.0 (stable-fixes).\n- ALSA: usb-audio: Cap the packet size pre-calculations (git-fixes).\n- ALSA: usb-audio: Check max frame size for implicit feedback mode, too (stable-fixes).\n- ALSA: usb-audio: Remove VALIDATE_RATES quirk for Focusrite devices (git-fixes).\n- ALSA: usb-audio: Update the number of packets properly at receiving (stable-fixes).\n- ALSA: usb-audio: Use correct version for UAC3 header validation (git-fixes).\n- ALSA: usb-audio: Use inclusive terms (git-fixes).\n- ALSA: usb-audio: fix broken logic in snd_audigy2nx_led_update() (git-fixes).\n- ALSA: vmaster: Relax __free() variable declarations (git-fixes).\n- APEI/GHES: ensure that won\u0027t go past CPER allocated record (stable-fixes).\n- ASoC: Intel: sof_es8336: Add DMI quirk for Huawei BOD-WXX9 (stable-fixes).\n- ASoC: SOF: ipc4-control: If there is no data do not send bytes update (git-fixes).\n- ASoC: SOF: ipc4-control: Keep the payload size up to date (git-fixes).\n- ASoC: SOF: ipc4-control: Use the correct size for scontrol-\u003eipc_control_data (git-fixes).\n- ASoC: SOF: ipc4-topology: Correct the allocation size for bytes controls (git-fixes).\n- ASoC: amd: drop unused Kconfig symbols (git-fixes).\n- ASoC: amd: fix memory leak in acp3x pdm dma ops (git-fixes).\n- ASoC: amd: yc: Add ASUS ExpertBook PM1503CDA to quirks list (stable-fixes).\n- ASoC: amd: yc: Add DMI quirk for ASUS Vivobook Pro 15X M6501RR (stable-fixes).\n- ASoC: amd: yc: Add DMI quirk for Acer TravelMate P216-41-TCO (stable-fixes).\n- ASoC: amd: yc: Add quirk for HP 200 G2a 16 (stable-fixes).\n- ASoC: amd: yc: Fix microphone on ASUS M6500RE (stable-fixes).\n- ASoC: codecs: max98390: Check return value of devm_gpiod_get_optional() in max98390_i2c_probe() (stable-fixes).\n- ASoC: cs35l45: Corrects ASP_TX5 DAPM widget channel (stable-fixes).\n- ASoC: cs42l43: Correct handling of 3-pole jack load detection (stable-fixes).\n- ASoC: davinci-evm: Fix reference leak in davinci_evm_probe (stable-fixes).\n- ASoC: nau8821: Avoid unnecessary blocking in IRQ handler (stable-fixes).\n- ASoC: nau8821: Cancel delayed work on component remove (git-fixes).\n- ASoC: nau8821: Cancel pending work before suspend (git-fixes).\n- ASoC: nau8821: Consistently clear interrupts before unmasking (git-fixes).\n- ASoC: nau8821: Fixup nau8821_enable_jack_detect() (git-fixes).\n- ASoC: pxa: drop unused Kconfig symbol (git-fixes).\n- ASoC: rockchip: i2s-tdm: Use param rate if not provided by set_sysclk (git-fixes).\n- ASoC: sunxi: sun50i-dmic: Add missing check for devm_regmap_init_mmio (stable-fixes).\n- ASoC: tlv320adcx140: Propagate error codes during probe (stable-fixes).\n- ASoC: wm8962: Add WM8962_ADC_MONOMIX to \u00273D Coefficients\u0027 mask (stable-fixes).\n- ASoC: wm8962: Do not report a microphone if it\u0027s shorted to ground on plug (stable-fixes).\n- Add bugnumber to existing mana and mana_ib changes (bsc#1251135 bsc#1251971).\n- Add bugnumber to existing mana change (bsc#1251971).\n- Add bugnumber to existing mana changes (bsc#1245728 bsc#1251971 bsc#1252266 bsc#1257466)\n- Add bugnumber to existing mana changes (bsc#1259558 bsc#1259580).\n- Bluetooth: L2CAP: Fix invalid response to L2CAP_ECRED_RECONF_REQ (git-fixes).\n- Bluetooth: L2CAP: Fix missing key size check for L2CAP_LE_CONN_REQ (git-fixes).\n- Bluetooth: L2CAP: Fix not checking output MTU is acceptable on L2CAP_ECRED_CONN_REQ (git-fixes).\n- Bluetooth: L2CAP: Fix response to L2CAP_ECRED_CONN_REQ (git-fixes).\n- Bluetooth: L2CAP: Fix result of L2CAP_ECRED_CONN_RSP when MTU is too short (git-fixes).\n- Bluetooth: btintel_pcie: Use IRQF_ONESHOT and default primary handler (git-fixes).\n- Bluetooth: btusb: Add USB ID 7392:e611 for Edimax EW-7611UXB (stable-fixes).\n- Bluetooth: btusb: Add device ID for Realtek RTL8761BU (stable-fixes).\n- Bluetooth: btusb: Add new VID/PID for RTL8852CE (stable-fixes).\n- Bluetooth: hci_conn: Set link_policy on incoming ACL connections (stable-fixes).\n- Bluetooth: hci_conn: use mod_delayed_work for active mode timeout (stable-fixes).\n- Bluetooth: hci_qca: Cleanup on all setup failures (git-fixes).\n- Documentation: PCI: endpoint: Fix ntb/vntb copy \u0026 paste errors (git-fixes).\n- Documentation: mailbox: mbox_chan_ops.flush() is optional (git-fixes).\n- Drivers: hv: Allocate interrupt and monitor pages aligned to system page boundary (git-fixes).\n- Drivers: hv: Always do Hyper-V panic notification in hv_kmsg_dump() (git-fixes).\n- Drivers: hv: Fix bad pointer dereference in hv_get_partition_id (git-fixes).\n- Drivers: hv: Fix the check for HYPERVISOR_CALLBACK_VECTOR (git-fixes).\n- Drivers: hv: Fix warnings for missing export.h header inclusion (git-fixes).\n- Drivers: hv: Resolve ambiguity in hypervisor version log (git-fixes).\n- Drivers: hv: Use kmalloc_array() instead of kmalloc() (git-fixes).\n- Drivers: hv: Use kzalloc for panic page allocation (git-fixes).\n- Drivers: hv: fix missing kernel-doc description for \u0027size\u0027 in request_arr_init() (git-fixes).\n- Drivers: hv: remove stale comment (git-fixes).\n- Drivers: hv: use kmalloc_array() instead of kmalloc() (git-fixes).\n- Drivers: hv: util: Cosmetic changes for hv_utils_transport.c (git-fixes).\n- Drivers: hv: vmbus: Add comments about races with \u0027channels\u0027 sysfs dir (git-fixes).\n- Drivers: hv: vmbus: Clean up sscanf format specifier in target_cpu_store() (git-fixes).\n- Drivers: hv: vmbus: Fix sysfs output format for ring buffer index (git-fixes).\n- Drivers: hv: vmbus: Fix typos in vmbus_drv.c (git-fixes).\n- Drivers: hv: vmbus: Get the IRQ number from DeviceTree (git-fixes).\n- Drivers: hv: vmbus: Introduce hv_get_vmbus_root_device() (git-fixes).\n- HID: Apply quirk HID_QUIRK_ALWAYS_POLL to Edifier QR30 (2d99:a101) (stable-fixes).\n- HID: apple: Add \u0027SONiX KN85 Keyboard\u0027 to the list of non-apple keyboards (stable-fixes).\n- HID: elecom: Add support for ELECOM HUGE Plus M-HT1MRBK (stable-fixes).\n- HID: hid-pl: handle probe errors (git-fixes).\n- HID: i2c-hid: fix potential buffer overflow in i2c_hid_get_report() (stable-fixes).\n- HID: intel-ish-hid: Reset enum_devices_done before enumeration (stable-fixes).\n- HID: intel-ish-hid: Update ishtp bus match to support device ID table (stable-fixes).\n- HID: intel-ish-hid: fix NULL-ptr-deref in ishtp_bus_remove_all_clients (git-fixes).\n- HID: logitech-hidpp: Check maxfield in hidpp_get_report_length() (stable-fixes).\n- HID: magicmouse: Do not crash on missing msc-\u003einput (stable-fixes).\n- HID: multitouch: add MT_QUIRK_STICKY_FINGERS to MT_CLS_VTL (stable-fixes).\n- HID: multitouch: add eGalaxTouch EXC3188 support (stable-fixes).\n- HID: playstation: Add missing check for input_ff_create_memless (git-fixes).\n- HID: playstation: Center initial joystick axes to prevent spurious events (stable-fixes).\n- HID: prodikeys: Check presence of pm-\u003einput_ep82 (stable-fixes).\n- HID: quirks: Add another Chicony HP 5MP Cameras to hid_ignore_list (stable-fixes).\n- Input: stmfts - correct wording for the warning message (git-fixes).\n- Input: stmfts - make comments correct (git-fixes).\n- KABi: fix \u0027dm-snapshot: fix \u0027scheduling while atomic\u0027 on real-time kernels\u0027 (git-fixes).\n- KVM: nSVM: Clear exit_code_hi in VMCB when synthesizing nested VM-Exits (git-fixes).\n- KVM: nSVM: Set exit_code_hi to -1 when synthesizing SVM_EXIT_ERR (failed VMRUN) (git-fixes).\n- KVM: x86: Do not clear async #PF queue when CR0.PG is disabled (e.g. on #SMI) (git-fixes).\n- KVM: x86: Explicitly set new periodic hrtimer expiration in apic_timer_fn() (git-fixes).\n- KVM: x86: WARN if hrtimer callback for periodic APIC timer fires with period=0 (git-fixes).\n- Move upstreamed mm and SCSI patches into sorted section\n- NTB: ntb_transport: Fix too small buffer for debugfs_name (git-fixes).\n- PCI/ACPI: Restrict program_hpx_type2() to AER bits (git-fixes).\n- PCI/IOV: Fix race between SR-IOV enable/disable and hotplug (git-fixes).\n- PCI/MSI: Unmap MSI-X region on error (git-fixes).\n- PCI/MSI: Unmap MSI-X region on error (stable-fixes).\n- PCI/P2PDMA: Release per-CPU pgmap ref when vm_insert_page() fails (git-fixes).\n- PCI/PM: Avoid redundant delays on D3hot-\u003eD3cold (git-fixes).\n- PCI/portdrv: Fix potential resource leak (git-fixes).\n- PCI: Add ACS quirk for Pericom PI7C9X2G404 switches [12d8:b404] (git-fixes).\n- PCI: Add ACS quirk for Qualcomm Hamoa \u0026 Glymur (git-fixes).\n- PCI: Add ACS quirk for Qualcomm Hamoa \u0026 Glymur (stable-fixes).\n- PCI: Add PCIE_MSG_CODE_ASSERT_INTx message macros (stable-fixes).\n- PCI: Add defines for bridge window indexing (stable-fixes).\n- PCI: Correct PCI_CAP_EXP_ENDPOINT_SIZEOF_V2 value (git-fixes).\n- PCI: Do not attempt to set ExtTag for VFs (git-fixes).\n- PCI: Enable ACS after configuring IOMMU for OF platforms (git-fixes).\n- PCI: Enable ACS after configuring IOMMU for OF platforms (stable-fixes).\n- PCI: Fix pci_slot_lock () device locking (git-fixes).\n- PCI: Fix pci_slot_lock () device locking (stable-fixes).\n- PCI: Fix pci_slot_trylock() error handling (git-fixes).\n- PCI: Initialize RCB from pci_configure_device() (git-fixes).\n- PCI: Log bridge info when first enumerating bridge (stable-fixes).\n- PCI: Log bridge windows conditionally (stable-fixes).\n- PCI: Mark 3ware-9650SA Root Port Extended Tags as broken (git-fixes).\n- PCI: Mark ASM1164 SATA controller to avoid bus reset (git-fixes).\n- PCI: Mark ASM1164 SATA controller to avoid bus reset (stable-fixes).\n- PCI: Mark Nvidia GB10 to avoid bus reset (git-fixes).\n- PCI: Mark Nvidia GB10 to avoid bus reset (stable-fixes).\n- PCI: Move pci_read_bridge_windows() below individual window accessors (stable-fixes).\n- PCI: Supply bridge device, not secondary bus, to read window details (stable-fixes).\n- PCI: dw-rockchip: Disable BAR 0 and BAR 1 for Root Port (git-fixes).\n- PCI: dw-rockchip: Disable BAR 0 and BAR 1 for Root Port (stable-fixes).\n- PCI: endpoint: Fix swapped parameters in pci_{primary/secondary}_epc_epf_unlink() functions (git-fixes).\n- PCI: hv: Correct a comment (git-fixes).\n- PCI: hv: Fix warnings for missing export.h header inclusion (git-fixes).\n- PCI: hv: Remove unnecessary flex array in struct pci_packet (git-fixes).\n- PCI: hv: Remove unused field pci_bus in struct hv_pcibus_device (git-fixes).\n- PCI: hv: remove unnecessary module_init/exit functions (git-fixes).\n- PCI: mediatek: Fix IRQ domain leak when MSI allocation fails (git-fixes).\n- PM: sleep: wakeirq: Update outdated documentation comments (git-fixes).\n- PM: sleep: wakeirq: harden dev_pm_clear_wake_irq() against races (git-fixes).\n- PM: wakeup: Handle empty list in wakeup_sources_walk_start() (git-fixes).\n- RDMA/mana_ib: Add device-memory support (git-fixes).\n- RDMA/mana_ib: Take CQ type from the device type (git-fixes).\n- RDMA/rtrs-clt: For conn rejection use actual err number (git-fixes)\n- Revive thinkpad-lmi driver and mark as supported (jsc#PED-15553).\n- USB: serial: option: add Telit FN920C04 RNDIS compositions (stable-fixes).\n- Update \u0027drm/mgag200: fix mgag200_bmc_stop_scanout()\u0027 bug number (bsc#1258153 bsc#1258226)\n- Update \u0027drm/mgag200: fix mgag200_bmc_stop_scanout()\u0027 bug number (bsc#1258153)\n- apparmor: Fix double free of ns_name in aa_replace_profiles() (bsc#1258849).\n- apparmor: fix differential encoding verification (bsc#1258849).\n- apparmor: fix memory leak in verify_header (bsc#1258849).\n- apparmor: fix missing bounds check on DEFAULT table in verify_dfa() (bsc#1258849).\n- apparmor: fix race between freeing data and fs accessing it (bsc#1258849).\n- apparmor: fix race on rawdata dereference (bsc#1258849).\n- apparmor: fix side-effect bug in match_char() macro usage (bsc#1258849).\n- apparmor: fix unprivileged local user can do privileged policy management (bsc#1258849).\n- apparmor: fix: limit the number of levels of policy namespaces (bsc#1258849).\n- apparmor: replace recursive profile removal with iterative approach (bsc#1258849).\n- apparmor: validate DFA start states are in bounds in unpack_pdb (bsc#1258849).\n- arm64: Add support for TSV110 Spectre-BHB mitigation (git-fixes)\n- arm64: Disable branch profiling for all arm64 code (git-fixes)\n- arm64: Set __nocfi on swsusp_arch_resume() (git-fixes)\n- ata: libata: avoid long timeouts on hot-unplugged SATA DAS (stable-fixes).\n- ata: pata_ftide010: Fix some DMA timings (git-fixes).\n- atm: fore200e: fix use-after-free in tasklets during device removal (git-fixes).\n- auxdisplay: arm-charlcd: fix release_mem_region() size (git-fixes).\n- backlight: qcom-wled: Change PM8950 WLED configurations (git-fixes).\n- backlight: qcom-wled: Support ovp values for PMI8994 (git-fixes).\n- batman-adv: Avoid double-rtnl_lock ELP metric worker (git-fixes).\n- block,bfq: fix aux stat accumulation destination (git-fixes).\n- bonding: only set speed/duplex to unknown, if getting speed failed (bsc#1253691).\n- bpf: selftests: Move xfrm tunnel test to test_progs (bsc#1258860).\n- bpf: selftests: test_tunnel: Setup fresh topology for each subtest (bsc#1258860).\n- bpf: selftests: test_tunnel: Use vmlinux.h declarations (bsc#1258860).\n- bpf: verifier improvement in 32bit shift sign extension pattern (git-fixes).\n- bpf: xfrm: Add bpf_xdp_get_xfrm_state() kfunc (bsc#1258860).\n- bpf: xfrm: Add selftest for bpf_xdp_get_xfrm_state() (bsc#1258860).\n- btrfs: scrub: always update btrfs_scrub_progress::last_physical (git-fixes).\n- bus: fsl-mc: Replace snprintf and sprintf with sysfs_emit in sysfs show functions (stable-fixes).\n- bus: fsl-mc: fix an error handling in fsl_mc_device_add() (git-fixes).\n- bus: fsl-mc: fix use-after-free in driver_override_show() (git-fixes).\n- can: bcm: fix locking for bcm_op runtime updates (git-fixes).\n- can: ems_usb: ems_usb_read_bulk_callback(): check the proper length of a message (git-fixes).\n- can: hi311x: hi3110_open(): add check for hi3110_power_enable() return value (git-fixes).\n- can: mcp251x: fix deadlock in error path of mcp251x_open (git-fixes).\n- can: ucan: Fix infinite loop from zero-length messages (git-fixes).\n- can: usb: etas_es58x: correctly anchor the urb in the read bulk callback (git-fixes).\n- cgroup: Fix incorrect WARN_ON_ONCE() in css_release_work_fn() (bsc#1256564 bsc#1259130).\n- cgroup: Show # of subsystem CSSes in cgroup.stat (bsc#1256564 bsc#1259130).\n- char: tpm: cr50: Remove IRQF_ONESHOT (git-fixes).\n- char: tpm: cr50: Remove IRQF_ONESHOT (stable-fixes).\n- cifs: add xid to query server interface call (git-fixes).\n- clk: clk-apple-nco: Add \u0027apple,t8103-nco\u0027 compatible (git-fixes).\n- clk: mediatek: Fix error handling in runtime PM setup (git-fixes).\n- clk: meson: g12a: Limit the HDMI PLL OD to /4 (git-fixes).\n- clk: meson: gxbb: Limit the HDMI PLL OD to /4 on GXL/GXM SoCs (git-fixes).\n- clk: mvebu: cp110 add CLK_IGNORE_UNUSED to pcie_x10, pcie_x11 \u0026 (git-fixes)\n- clk: qcom: dispcc-sdm845: Enable parents for pixel clocks (git-fixes).\n- clk: qcom: gcc-msm8917: Remove ALWAYS_ON flag from cpp_gdsc (git-fixes).\n- clk: qcom: gcc-msm8953: Remove ALWAYS_ON flag from cpp_gdsc (git-fixes).\n- clk: qcom: gfx3d: add parent to parent request map (git-fixes).\n- clk: qcom: rcg2: compute 2d using duty fraction directly (git-fixes).\n- clk: renesas: rzg2l: Fix intin variable size (git-fixes).\n- clk: renesas: rzg2l: Select correct div round macro (git-fixes).\n- clk: tegra: tegra124-emc: Fix potential memory leak in tegra124_clk_register_emc() (git-fixes).\n- clk: tegra: tegra124-emc: fix device leak on set_rate() (git-fixes).\n- clocksource: Print durations for sync check unconditionally (bsc#1241345).\n- clocksource: Reduce watchdog readout delay limit to prevent false positives (bsc#1241345).\n- clocksource: hyper-v: Fix warnings for missing export.h header inclusion (git-fixes).\n- cpu: export lockdep_assert_cpus_held() (git-fixes).\n- cpufreq/amd-pstate: Add missing NULL ptr check in amd_pstate_update (bsc#1247180).\n- cpufreq/amd-pstate: Add the missing cpufreq_cpu_put() (bsc#1247180).\n- cpufreq/amd-pstate: Fix the clamping of perf values (bsc#1247180).\n- cpufreq/amd-pstate: Modularize perf\u0026lt;-\u003efreq conversion (bsc#1247180).\n- cpufreq/amd-pstate: Refactor max frequency calculation (bsc#1247180).\n- cpufreq/amd-pstate: fix setting policy current frequency value (bsc#1247180).\n- cpufreq/amd-pstate: store all values in cpudata struct in khz (bsc#1247180).\n- cpufreq: amd-pstate: Unify computation of {max,min,nominal,lowest_nonlinear}_freq (bsc#1247180).\n- crypto: cavium - fix dma_free_coherent() size (git-fixes).\n- crypto: ccp - Add an S4 restore flow (git-fixes).\n- crypto: hisilicon/sec2 - support skcipher/aead fallback for hardware queue unavailable (git-fixes).\n- crypto: hisilicon/trng - support tfms sharing the device (git-fixes).\n- crypto: hisilicon/zip - adjust the way to obtain the req in the callback function (git-fixes).\n- crypto: iaa - Fix out-of-bounds index in find_empty_iaa_compression_mode (git-fixes).\n- crypto: octeontx - Fix length check to avoid truncation in ucode_load_store (git-fixes).\n- crypto: octeontx - fix dma_free_coherent() size (git-fixes).\n- crypto: omap - Allocate OMAP_CRYPTO_FORCE_COPY scatterlists correctly (git-fixes).\n- crypto: qat - fix parameter order used in ICP_QAT_FW_COMN_FLAGS_BUILD (git-fixes).\n- crypto: qat - fix warning on adf_pfvf_pf_proto.c (git-fixes).\n- crypto: virtio - Add spinlock protection with virtqueue notification (git-fixes).\n- crypto: virtio - Remove duplicated virtqueue_kick in virtio_crypto_skcipher_crypt_req (git-fixes).\n- device property: Allow secondary lookup in fwnode_get_next_child_node() (git-fixes).\n- dm mpath: make pg_init_delay_msecs settable (git-fixes).\n- dm-bufio: align write boundary on physical block size (git-fixes).\n- dm-ebs: Mark full buffer dirty even on partial write (git-fixes).\n- dm-snapshot: fix \u0027scheduling while atomic\u0027 on real-time kernels (git-fixes).\n- dm: clear cloned request bio pointer when last clone bio completes (git-fixes).\n- dm: remove fake timeout to avoid leak request (git-fixes).\n- dma: dma-axi-dmac: fix SW cyclic transfers (git-fixes).\n- dmaengine: mediatek: uart-apdma: Fix above 4G addressing TX/RX (git-fixes).\n- dmaengine: sun6i: Choose appropriate burst length under maxburst (stable-fixes).\n- docs: fix WARNING document not included in any toctree (stable-fixes).\n- drivers/hv: add CPU offlining support (git-fixes).\n- drivers/hv: introduce vmbus_channel_set_cpu() (git-fixes).\n- drivers: iio: mpu3050: use dev_err_probe for regulator request (git-fixes).\n- drm/amd/display: Add USB-C DP Alt Mode lane limitation in DCN32 (stable-fixes).\n- drm/amd/display: Add signal type check for dcn401 get_phyd32clk_src (stable-fixes).\n- drm/amd/display: Avoid updating surface with the same surface under MPO (stable-fixes).\n- drm/amd/display: Disable FEC when powering down encoders (stable-fixes).\n- drm/amd/display: Fix GFX12 family constant checks (stable-fixes).\n- drm/amd/display: Fix dsc eDP issue (stable-fixes).\n- drm/amd/display: Fix out-of-bounds stream encoder index v3 (git-fixes).\n- drm/amd/display: Fix system resume lag issue (stable-fixes).\n- drm/amd/display: Fix writeback on DCN 3.2+ (stable-fixes).\n- drm/amd/display: Increase DCN35 SR enter/exit latency (stable-fixes).\n- drm/amd/display: Reject cursor plane on DCE when scaled differently than primary (git-fixes).\n- drm/amd/display: Remove conditional for shaper 3DLUT power-on (stable-fixes).\n- drm/amd/display: Use same max plane scaling limits for all 64 bpp formats (git-fixes).\n- drm/amd/display: avoid dig reg access timeout on usb4 link training fail (stable-fixes).\n- drm/amd/display: bypass post csc for additional color spaces in dal (stable-fixes).\n- drm/amd/display: extend delta clamping logic to CM3 LUT helper (stable-fixes).\n- drm/amd/display: fix wrong color value mapping on MCM shaper LUT (git-fixes).\n- drm/amd/display: only power down dig on phy endpoints (stable-fixes).\n- drm/amd/display: remove assert around dpp_base replacement (stable-fixes).\n- drm/amd/pm: Disable MMIO access during SMU Mode 1 reset (stable-fixes).\n- drm/amd: Disable MES LR compute W/A (git-fixes).\n- drm/amd: Drop \u0027amdgpu kernel modesetting enabled\u0027 message (git-fixes).\n- drm/amd: Fix hang on amdgpu unload by using pci_dev_is_disconnected() (git-fixes).\n- drm/amdgpu/gfx10: fix wptr reset in KGQ init (stable-fixes).\n- drm/amdgpu/gfx11: fix wptr reset in KGQ init (stable-fixes).\n- drm/amdgpu/gfx12: fix wptr reset in KGQ init (stable-fixes).\n- drm/amdgpu/soc21: fix xclk for APUs (stable-fixes).\n- drm/amdgpu: Add HAINAN clock adjustment (stable-fixes).\n- drm/amdgpu: Adjust usleep_range in fence wait (stable-fixes).\n- drm/amdgpu: Fix locking bugs in error paths (git-fixes).\n- drm/amdgpu: Fix memory leak in amdgpu_acpi_enumerate_xcc() (git-fixes).\n- drm/amdgpu: Fix memory leak in amdgpu_ras_init() (git-fixes).\n- drm/amdgpu: Replace kzalloc + copy_from_user with memdup_user (stable-fixes).\n- drm/amdgpu: Skip loading SDMA_RS64 in VF (stable-fixes).\n- drm/amdgpu: Unlock a mutex before destroying it (git-fixes).\n- drm/amdgpu: Use kvfree instead of kfree in amdgpu_gmc_get_nps_memranges() (git-fixes).\n- drm/amdgpu: add support for HDP IP version 6.1.1 (stable-fixes).\n- drm/amdgpu: avoid a warning in timedout job handler (stable-fixes).\n- drm/amdgpu: ensure no_hw_access is visible before MMIO (git-fixes).\n- drm/amdgpu: fix NULL pointer issue buffer funcs (stable-fixes).\n- drm/amdgpu: fix sync handling in amdgpu_dma_buf_move_notify (git-fixes).\n- drm/amdgpu: keep vga memory on MacBooks with switchable graphics (stable-fixes).\n- drm/amdgpu: remove invalid usage of sched.ready (stable-fixes).\n- drm/amdgpu: stop unmapping MQD for kernel queues v3 (stable-fixes).\n- drm/amdkfd: Fix GART PTE for non-4K pagesize in svm_migrate_gart_map() (stable-fixes).\n- drm/amdkfd: Fix out-of-bounds write in kfd_event_page_set() (stable-fixes).\n- drm/amdkfd: Fix signal_eviction_fence() bool return value (git-fixes).\n- drm/amdkfd: Fix watch_id bounds checking in debug address watch v2 (git-fixes).\n- drm/amdkfd: Handle GPU reset and drain retry fault race (stable-fixes).\n- drm/amdkfd: Relax size checking during queue buffer get (stable-fixes).\n- drm/amdkfd: fix debug watchpoints for logical devices (stable-fixes).\n- drm/atmel-hlcdc: do not reject the commit if the src rect has fractional parts (stable-fixes).\n- drm/atmel-hlcdc: fix memory leak from the atomic_destroy_state callback (stable-fixes).\n- drm/atmel-hlcdc: fix use-after-free of drm_crtc_commit after release (stable-fixes).\n- drm/bridge: anx7625: Fix invalid EDID size (git-fixes).\n- drm/bridge: samsung-dsim: Fix memory leak in error path (git-fixes).\n- drm/bridge: ti-sn65dsi86: Enable HPD polling if IRQ is not used (git-fixes).\n- drm/buddy: Prevent BUG_ON by validating rounded allocation (git-fixes).\n- drm/display/dp_mst: Add protection against 0 vcpi (stable-fixes).\n- drm/i915/acpi: free _DSM package when no connectors (git-fixes).\n- drm/i915/display: Add quirk to skip retraining of dp link (bsc#1253129).\n- drm/i915/wakeref: clean up INTEL_WAKEREF_PUT_* flag macros (stable-fixes).\n- drm/logicvc: Fix device node reference leak in logicvc_drm_config_parse() (git-fixes).\n- drm/mgag200: fix mgag200_bmc_stop_scanout() (git-fixes).\n- drm/msm/a2xx: fix pixel shader start on A225 (git-fixes).\n- drm/msm/disp: set num_planes to 1 for interleaved YUV formats (git-fixes).\n- drm/msm/dpu: Set vsync source irrespective of mdp top support (git-fixes).\n- drm/msm/dpu: drop intr_start from DPU 3.x catalog files (git-fixes).\n- drm/msm/dpu: fix CMD panels on DPU 1.x - 3.x (git-fixes).\n- drm/msm/dpu: fix WD timer handling on DPU 8.x (git-fixes).\n- drm/panel: Fix a possible null-pointer dereference in jdi_panel_dsi_remove() (stable-fixes).\n- drm/panel: sw43408: Remove manual invocation of unprepare at remove (git-fixes).\n- drm/panthor: Evict groups before VM termination (git-fixes).\n- drm/panthor: Fix immediate ticking on a disabled tick (git-fixes).\n- drm/panthor: Fix the full_tick check (git-fixes).\n- drm/panthor: Fix the group priority rotation logic (git-fixes).\n- drm/panthor: Fix the logic that decides when to stop ticking (git-fixes).\n- drm/panthor: Make sure we resume the tick when new jobs are submitted (git-fixes).\n- drm/panthor: Recover from panthor_gpu_flush_caches() failures (git-fixes).\n- drm/radeon: Add HAINAN clock adjustment (stable-fixes).\n- drm/radeon: delete radeon_fence_process in is_signaled, no deadlock (stable-fixes).\n- drm/sched: Fix kernel-doc warning for drm_sched_job_done() (git-fixes).\n- drm/solomon: Fix page start when updating rectangle in page addressing mode (git-fixes).\n- drm/tegra: dsi: fix device leak on probe (git-fixes).\n- drm/tegra: hdmi: sor: Fix error: variable \u2018j\u2019 set but not used (stable-fixes).\n- drm/tests: shmem: Swap names of export tests (git-fixes).\n- drm/v3d: Set DMA segment size to avoid debug warnings (stable-fixes).\n- drm/vmwgfx: Fix invalid kref_put callback in vmw_bo_dirty_release (git-fixes).\n- drm/vmwgfx: Return the correct value in vmw_translate_ptr functions (git-fixes).\n- drm/xe/mmio: Avoid double-adjust in 64-bit reads (git-fixes).\n- drm/xe/pm: Also avoid missing outer rpm warning on system suspend (stable-fixes).\n- drm/xe/pm: Disable D3Cold for BMG only on specific platforms (git-fixes).\n- drm/xe/ptl: Apply Wa_13011645652 (stable-fixes).\n- drm/xe/query: Fix topology query pointer advance (git-fixes).\n- drm/xe/sync: Cleanup partially initialized sync on parse failure (git-fixes).\n- drm/xe/xe2_hpg: Add set of workarounds (stable-fixes).\n- drm/xe/xe2_hpg: Fix handling of Wa_14019988906 \u0026 Wa_14019877138 (git-fixes).\n- drm/xe: Add xe_tile backpointer to xe_mmio (stable-fixes).\n- drm/xe: Adjust mmio code to pass VF substructure to SRIOV code (stable-fixes).\n- drm/xe: Clarify size of MMIO region (stable-fixes).\n- drm/xe: Create dedicated xe_mmio structure (stable-fixes).\n- drm/xe: Defer gt-\u003emmio initialization until after multi-tile setup (git-fixes).\n- drm/xe: Move GSI offset adjustment fields into \u0027struct xe_mmio\u0027 (stable-fixes).\n- drm/xe: Move forcewake to \u0027gt.pm\u0027 substructure (stable-fixes).\n- drm/xe: Only toggle scheduling in TDR if GuC is running (stable-fixes).\n- drm/xe: Populate GT\u0027s mmio iomap from tile during init (stable-fixes).\n- drm/xe: Switch MMIO interface to take xe_mmio instead of xe_gt (stable-fixes).\n- drm/xe: Switch mmio_ext to use \u0027struct xe_mmio\u0027 (stable-fixes).\n- drm/xe: Unregister drm device on probe error (git-fixes).\n- drm: Account property blob allocations to memcg (stable-fixes).\n- efi: Fix reservation of unaccepted memory table (git-fixes).\n- efivarfs: fix error propagation in efivar_entry_get() (git-fixes).\n- ext4: fix iloc.bh leak in ext4_xattr_inode_update_ref (git-fixes).\n- fbcon: check return value of con2fb_acquire_newinfo() (git-fixes).\n- fbdev: au1200fb: Fix a memory leak in au1200fb_drv_probe() (git-fixes).\n- fbdev: ffb: fix corrupted video output on Sun FFB1 (stable-fixes).\n- fbdev: of: display_timing: fix refcount leak in of_get_display_timings() (git-fixes).\n- fbdev: rivafb: fix divide error in nv3_arb() (git-fixes).\n- fbdev: smscufx: properly copy ioctl memory to kernelspace (stable-fixes).\n- fbdev: vt8500lcdfb: fix missing dma_free_coherent() (git-fixes).\n- fix it87_wdt early reboot by reporting running timer (stable-fixes).\n- fpga: dfl: use subsys_initcall to allow built-in drivers to be added (git-fixes).\n- fpga: of-fpga-region: Fail if any bridge is missing (stable-fixes).\n- genirq: Set IRQF_COND_ONESHOT in devm_request_irq() (git-fixes).\n- gpio: aspeed-sgpio: Change the macro to support deferred probe (stable-fixes).\n- gpio: pca953x: mask interrupts in irq shutdown (stable-fixes).\n- gpio: sprd: Change sprd_gpio lock to raw_spin_lock (stable-fixes).\n- gpu/panel-edp: add AUO panel entry for B140HAN06.4 (stable-fixes).\n- hwmon: (f71882fg) Add F81968 support (stable-fixes).\n- hwmon: (it87) Check the it87_lock() return value (git-fixes).\n- hwmon: (max16065) Use READ/WRITE_ONCE to avoid compiler optimization induced race (git-fixes).\n- hwmon: (nct6775) Add ASUS Pro WS WRX90E-SAGE SE (stable-fixes).\n- hwmon: (occ) Mark occ_init_attribute() as __printf (git-fixes).\n- hwmon: (pmbus/q54sj108a2) fix stack overflow in debugfs read (git-fixes).\n- hyperv: Convert hypercall statuses to linux error codes (git-fixes).\n- hyperv: Move arch/x86/hyperv/hv_proc.c to drivers/hv (git-fixes).\n- hyperv: Move hv_current_partition_id to arch-generic code (git-fixes).\n- i3c: Move device name assignment after i3c_bus_init (git-fixes).\n- i3c: dw: Initialize spinlock to avoid upsetting lockdep (git-fixes).\n- i3c: master: Update hot-join flag only on success (git-fixes).\n- i3c: master: svc: Initialize \u0027dev\u0027 to NULL in svc_i3c_master_ibi_isr() (stable-fixes).\n- iio: Use IRQF_NO_THREAD (stable-fixes).\n- iio: gyro: itg3200: Fix unchecked return value in read_raw (git-fixes).\n- iio: magnetometer: Remove IRQF_ONESHOT (stable-fixes).\n- iio: sca3000: Fix a resource leak in sca3000_probe() (git-fixes).\n- iomap: account for unaligned end offsets when truncating read range (git-fixes).\n- ipmi: ipmb: initialise event handler read bytes (git-fixes).\n- kabi: cgroup.stat fixup (bsc#1256564 bsc#1259130).\n- ktls, sockmap: Fix missing uncharge operation (bsc#1252008).\n- landlock: Optimize file path walks and prepare for audit support (bsc#1255698).\n- leds: qcom-lpg: Check the return value of regmap_bulk_write() (git-fixes).\n- media: adv7180: fix frame interval in progressive mode (stable-fixes).\n- media: amphion: Clear last_buffer_dequeued flag for DEC_CMD_START (stable-fixes).\n- media: amphion: Drop min_queued_buffers assignment (git-fixes).\n- media: ccs: Accommodate C-PHY into the calculation (git-fixes).\n- media: ccs: Avoid possible division by zero (git-fixes).\n- media: ccs: Fix setting initial sub-device state (git-fixes).\n- media: chips-media: wave5: Fix memory leak on codec_info allocation failure (git-fixes).\n- media: cx23885: Add missing unmap in snd_cx23885_hw_params() (git-fixes).\n- media: cx25821: Add missing unmap in snd_cx25821_hw_params() (git-fixes).\n- media: cx25821: Fix a resource leak in cx25821_dev_setup() (stable-fixes).\n- media: cx88: Add missing unmap in snd_cx88_hw_params() (git-fixes).\n- media: dvb-core: dmxdevfilter must always flush bufs (stable-fixes).\n- media: dvb-core: fix wrong reinitialization of ringbuffer on reopen (git-fixes).\n- media: dvb-net: fix OOB access in ULE extension header tables (git-fixes).\n- media: i2c/tw9903: Fix potential memory leak in tw9903_probe() (git-fixes).\n- media: i2c/tw9906: Fix potential memory leak in tw9906_probe() (git-fixes).\n- media: i2c: ov5647: Correct minimum VBLANK value (git-fixes).\n- media: i2c: ov5647: Correct pixel array offset (git-fixes).\n- media: i2c: ov5647: Fix PIXEL_RATE value for VGA mode (git-fixes).\n- media: i2c: ov5647: Initialize subdev before controls (git-fixes).\n- media: i2c: ov5647: Sensor should report RAW color space (git-fixes).\n- media: i2c: ov5647: use our own mutex for the ctrl lock (git-fixes).\n- media: ipu6: Fix RPM reference leak in probe error paths (git-fixes).\n- media: ipu6: Fix typo and wrong constant in ipu6-mmu.c (git-fixes).\n- media: mtk-mdp: Fix a reference leak bug in mtk_mdp_remove() (git-fixes).\n- media: mtk-mdp: Fix error handling in probe function (git-fixes).\n- media: omap3isp: isp_video_mbus_to_pix/pix_to_mbus fixes (stable-fixes).\n- media: omap3isp: isppreview: always clamp in preview_try_format() (stable-fixes).\n- media: omap3isp: set initial format (stable-fixes).\n- media: pvrusb2: fix URB leak in pvr2_send_request_ex (stable-fixes).\n- media: qcom: camss: vfe: Fix out-of-bounds access in vfe_isr_reg_update() (git-fixes).\n- media: radio-keene: fix memory leak in error path (git-fixes).\n- media: rkisp1: Fix filter mode register configuration (stable-fixes).\n- media: solo6x10: Check for out of bounds chip_id (stable-fixes).\n- media: tegra-video: Fix memory leak in __tegra_channel_try_format() (git-fixes).\n- media: uvcvideo: Fix allocation for small frame sizes (git-fixes).\n- media: v4l2-async: Fix error handling on steps after finding a match (stable-fixes).\n- media: venus: vdec: fix error state assignment for zero bytesused (git-fixes).\n- media: verisilicon: AV1: Fix enable cdef computation (git-fixes).\n- media: verisilicon: AV1: Fix tile info buffer size (git-fixes).\n- media: verisilicon: AV1: Fix tx mode bit setting (git-fixes).\n- media: verisilicon: AV1: Set IDR flag for intra_only frame type (git-fixes).\n- mfd: arizona: Fix regulator resource leak on wm5102_clear_write_sequencer() failure (git-fixes).\n- mfd: core: Add locking around \u0027mfd_of_node_list\u0027 (git-fixes).\n- mfd: tps6105x: Fix kernel-doc warnings relating to the core struct and tps6105x_mode (git-fixes).\n- mfd: wm8350-core: Use IRQF_ONESHOT (git-fixes).\n- misc: bcm_vk: Fix possible null-pointer dereferences in bcm_vk_read() (stable-fixes).\n- misc: eeprom: Fix EWEN/EWDS/ERAL commands for 93xx56 and 93xx66 (stable-fixes).\n- mmc: mmci: Fix device_node reference leak in of_get_dml_pipe_index() (git-fixes).\n- mmc: rtsx_pci_sdmmc: increase power-on settling delay to 5ms (git-fixes).\n- mtd: parsers: Fix memory leak in mtd_parser_tplink_safeloader_parse() (git-fixes).\n- mtd: parsers: ofpart: fix OF node refcount leak in parse_fixed_partitions() (git-fixes).\n- mtd: rawnand: cadence: Fix return type of CDMA send-and-wait helper (git-fixes).\n- mtd: rawnand: pl353: Fix software ECC support (git-fixes).\n- mtd: spinand: Fix kernel doc (git-fixes).\n- myri10ge: avoid uninitialized variable use (stable-fixes).\n- net: mana: Fix double destroy_workqueue on service rescan PCI path (git-fixes).\n- net: mana: Implement ndo_tx_timeout and serialize queue resets per port (bsc#1257472).\n- net: mana: Ring doorbell at 4 CQ wraparounds (git-fixes).\n- net: mana: Support HW link state events (bsc#1253049).\n- net: nfc: nci: Fix parameter validation for packet data (git-fixes).\n- net: nfc: nci: Fix zero-length proprietary notifications (git-fixes).\n- net: usb: catc: enable basic endpoint checking (git-fixes).\n- net: usb: kalmia: validate USB endpoints (git-fixes).\n- net: usb: kaweth: remove TX queue manipulation in kaweth_set_rx_mode (git-fixes).\n- net: usb: kaweth: validate USB endpoints (git-fixes).\n- net: usb: lan78xx: fix TX byte statistics for small packets (git-fixes).\n- net: usb: lan78xx: fix silent drop of packets with checksum errors (git-fixes).\n- net: usb: lan78xx: scan all MDIO addresses on LAN7801 (git-fixes).\n- net: usb: pegasus: enable basic endpoint checking (git-fixes).\n- net: usb: r8152: fix transmit queue timeout (stable-fixes).\n- net: usb: sr9700: remove code to drive nonexistent multicast filter (stable-fixes).\n- net: usb: sr9700: support devices with virtual driver CD (stable-fixes).\n- net: wan/fsl_ucc_hdlc: Fix dma_free_coherent() in uhdlc_memclean() (git-fixes).\n- net: wan: farsync: Fix use-after-free bugs caused by unfinished tasklets (git-fixes).\n- nfc: hci: shdlc: Stop timers and work before freeing context (git-fixes).\n- nfc: nci: clear NCI_DATA_EXCHANGE before calling completion callback (git-fixes).\n- nfc: nci: free skb on nci_transceive early error paths (git-fixes).\n- nfc: nxp-nci: remove interrupt trigger type (stable-fixes).\n- nfc: pn533: properly drop the usb interface reference on disconnect (git-fixes).\n- nfc: rawsock: cancel tx_work before socket teardown (git-fixes).\n- nfsd: check that server is running in unlock_filesystem (bsc#1257279).\n- nfsd: use correct loop termination in nfsd4_revoke_states() (git-fixes).\n- nouveau/dpcd: return EBUSY for aux xfer if the device is asleep (git-fixes).\n- ntb: ntb_hw_switchtec: Fix array-index-out-of-bounds access (stable-fixes).\n- ntb: ntb_hw_switchtec: Fix shift-out-of-bounds for 0 mw lut (stable-fixes).\n- nvme-fc: do not hold rport lock when putting ctrl (git-fixes).\n- nvme-fc: release admin tagset if init fails (git-fixes).\n- nvme-pci: disable secondary temp for Wodposit WPBSNM8 (git-fixes).\n- phy: fsl-imx8mq-usb: disable bind/unbind platform driver feature (stable-fixes).\n- phy: mvebu-cp110-utmi: fix dr_mode property read from dts (stable-fixes).\n- pinctrl: equilibrium: Fix device node reference leak in pinbank_init() (git-fixes).\n- pinctrl: meson: mark the GPIO controller as sleeping (git-fixes).\n- pinctrl: qcom: sm8250-lpass-lpi: Fix i2s2_data_groups definition (git-fixes).\n- pinctrl: single: fix refcount leak in pcs_add_gpio_func() (git-fixes).\n- platform/chrome: cros_ec_lightbar: Fix response size initialization (git-fixes).\n- platform/chrome: cros_typec_switch: Do not touch struct fwnode_handle::dev (git-fixes).\n- platform/x86/amd/pmc: Add quirk for MECHREVO Wujie 15X Pro (stable-fixes).\n- platform/x86: ISST: Add missing write block check (git-fixes).\n- platform/x86: classmate-laptop: Add missing NULL pointer checks (stable-fixes).\n- platform/x86: dell-wmi-sysman: Do not hex dump plaintext password data (git-fixes).\n- platform/x86: hp-bioscfg: Skip empty attribute names (git-fixes).\n- platform/x86: int0002: Remove IRQF_ONESHOT from request_irq() (git-fixes).\n- platform/x86: intel_telemetry: Fix PSS event register mask (git-fixes).\n- platform/x86: intel_telemetry: Fix swapped arrays in PSS output (git-fixes).\n- platform/x86: panasonic-laptop: Fix sysfs group leak in error path (stable-fixes).\n- platform/x86: toshiba_haps: Fix memory leaks in add/remove routines (git-fixes).\n- pmdomain: imx: gpcv2: Fix the imx8mm gpu hang due to wrong adb400 reset (git-fixes).\n- power: reset: nvmem-reboot-mode: respect cell size for nvmem_cell_write (git-fixes).\n- power: supply: ab8500: Fix use-after-free in power_supply_changed() (git-fixes).\n- power: supply: act8945a: Fix use-after-free in power_supply_changed() (git-fixes).\n- power: supply: bq256xx: Fix use-after-free in power_supply_changed() (git-fixes).\n- power: supply: bq25980: Fix use-after-free in power_supply_changed() (git-fixes).\n- power: supply: bq27xxx: fix wrong errno when bus ops are unsupported (git-fixes).\n- power: supply: cpcap-battery: Fix use-after-free in power_supply_changed() (git-fixes).\n- power: supply: goldfish: Fix use-after-free in power_supply_changed() (git-fixes).\n- power: supply: qcom_battmgr: Recognize \u0027LiP\u0027 as lithium-polymer (git-fixes).\n- power: supply: rt9455: Fix use-after-free in power_supply_changed() (git-fixes).\n- power: supply: sbs-battery: Fix use-after-free in power_supply_changed() (git-fixes).\n- power: supply: wm97xx: Fix NULL pointer dereference in power_supply_changed() (git-fixes).\n- powercap: intel_rapl_tpmi: Remove FW_BUG from invalid version check (git-fixes).\n- qmi_wwan: allow max_mtu above hard_mtu to control rx_urb_size (git-fixes).\n- rapidio: replace rio_free_net() with kfree() in rio_scan_alloc_net() (git-fixes).\n- regmap: maple: free entry on mas_store_gfp() failure (stable-fixes).\n- regulator: core: fix locking in regulator_resolve_supply() error path (git-fixes).\n- regulator: core: move supply check earlier in set_machine_constraints() (git-fixes).\n- remoteproc: sysmon: Correct subsys_name_len type in QMI request (git-fixes).\n- rpmsg: core: fix race in driver_override_show() and use core helper (git-fixes).\n- rtc: interface: Alarm race handling should not discard preceding error (git-fixes).\n- rtc: zynqmp: correct frequency value (stable-fixes).\n- s390/cio: Update purge function to unregister the unused subchannels (bsc#1254214).\n- s390/ipl: Clear SBP flag when bootprog is set (bsc#1258176).\n- s390/mm: Fix __ptep_rdp() inline assembly (bsc#1253644).\n- s390: Disable ARCH_WANT_OPTIMIZE_HUGETLB_VMEMMAP (bsc#1254306).\n- scsi: mpi3mr: Event processing debug improvement (bsc#1251186, bsc#1258832).\n- scsi: storvsc: Fix scheduling while atomic on PREEMPT_RT (git-fixes).\n- scsi: storvsc: Remove redundant ternary operators (git-fixes).\n- selftests/bpf: Add tc helpers (bsc#1258860).\n- selftests/bpf: Integrate test_tc_tunnel.sh tests into test_progs (bsc#1258860).\n- selftests/bpf: Make test_tc_tunnel.bpf.c compatible with big endian platforms (bsc#1258860).\n- selftests/bpf: Remove \u0027\u0026\u003e\u0027 usage in the selftests (bsc#1258860).\n- selftests/bpf: Remove test_tc_tunnel.sh (bsc#1258860).\n- selftests/bpf: Support when CONFIG_VXLAN=m (bsc#1258860).\n- selftests/bpf: Use connect_to_addr in test_sock_addr (bsc#1258860).\n- selftests/bpf: Use log_err in open_netns/close_netns (bsc#1258860).\n- selftests/bpf: Use make_sockaddr in test_sock_addr (bsc#1258860).\n- selftests/bpf: Use start_server_addr in test_sock_addr (bsc#1258860).\n- selftests/bpf: add verifier sign extension bound computation tests (git-fixes).\n- selftests/bpf: test_tunnel: Add generic_attach* helpers (bsc#1258860).\n- selftests/bpf: test_tunnel: Add ping helpers (bsc#1258860).\n- selftests/bpf: test_tunnel: Move erspan tunnel tests to test_progs (bsc#1258860).\n- selftests/bpf: test_tunnel: Move geneve tunnel test to test_progs (bsc#1258860).\n- selftests/bpf: test_tunnel: Move gre tunnel test to test_progs (bsc#1258860).\n- selftests/bpf: test_tunnel: Move ip6erspan tunnel test to test_progs (bsc#1258860).\n- selftests/bpf: test_tunnel: Move ip6geneve tunnel test to test_progs (bsc#1258860).\n- selftests/bpf: test_tunnel: Move ip6gre tunnel test to test_progs (bsc#1258860).\n- selftests/bpf: test_tunnel: Move ip6tnl tunnel tests to test_progs (bsc#1258860).\n- selftests/bpf: test_tunnel: Remove test_tunnel.sh (bsc#1258860).\n- serial: 8250: 8250_omap.c: Clear DMA RX running status only after DMA termination is done (git-fixes).\n- serial: 8250: 8250_omap.c: Clear DMA RX running status only after DMA termination is done (stable-fixes).\n- serial: 8250_dw: handle clock enable errors in runtime_resume (git-fixes).\n- serial: 8250_dw: handle clock enable errors in runtime_resume (stable-fixes).\n- serial: SH_SCI: improve \u0027DMA support\u0027 prompt (git-fixes).\n- serial: imx: change SERIAL_IMX_CONSOLE to bool (git-fixes).\n- shrink_slab_memcg: clear_bits of skipped shrinkers (bsc#1256564).\n- soc: mediatek: svs: Fix memory leak in svs_enable_debug_write() (git-fixes).\n- soc: qcom: cmd-db: Use devm_memremap() to fix memory leak in cmd_db_dev_probe (git-fixes).\n- soc: qcom: smem: handle ENOMEM error during probe (git-fixes).\n- soc: ti: k3-socinfo: Fix regmap leak on probe failure (git-fixes).\n- soc: ti: pruss: Fix double free in pruss_clk_mux_setup() (git-fixes).\n- soundwire: dmi-quirks: add mapping for Avell B.ON (OEM rebranded of NUC15) (stable-fixes).\n- soundwire: intel_ace2x: add SND_HDA_CORE dependency (git-fixes).\n- spi-geni-qcom: initialize mode related registers to 0 (stable-fixes).\n- spi-geni-qcom: use xfer-\u003ebits_per_word for can_dma() (stable-fixes).\n- spi: spi-mem: Limit octal DTR constraints to octal DTR situations (git-fixes)\n- spi: spi-mem: Limit octal DTR constraints to octal DTR situations (stable-fixes).\n- spi: spi-mem: Protect dirmap_create() with spi_mem_access_start/end (git-fixes)\n- spi: spi-mem: Protect dirmap_create() with spi_mem_access_start/end (stable-fixes).\n- spi: spidev: fix lock inversion between spi_lock and buf_lock (git-fixes)\n- spi: stm32: fix Overrun issue at \u0026lt; 8bpw (stable-fixes).\n- spi: tegra114: Preserve SPI mode bits in def_command1_reg (git-fixes).\n- spi: tegra210-quad: Move curr_xfer read inside spinlock (bsc#1257952)\n- spi: tegra210-quad: Move curr_xfer read inside spinlock (git-fixes).\n- spi: tegra210-quad: Protect curr_xfer assignment in (bsc#1257952)\n- spi: tegra210-quad: Protect curr_xfer assignment in tegra_qspi_setup_transfer_one (git-fixes).\n- spi: tegra210-quad: Protect curr_xfer check in IRQ handler (bsc#1257952)\n- spi: tegra210-quad: Protect curr_xfer check in IRQ handler (git-fixes).\n- spi: tegra210-quad: Protect curr_xfer clearing in (bsc#1257952)\n- spi: tegra210-quad: Protect curr_xfer clearing in tegra_qspi_non_combined_seq_xfer (git-fixes).\n- spi: tegra210-quad: Protect curr_xfer in tegra_qspi_combined_seq_xfer (bsc#1257952)\n- spi: tegra210-quad: Protect curr_xfer in tegra_qspi_combined_seq_xfer (git-fixes).\n- spi: tegra210-quad: Return IRQ_HANDLED when timeout already processed (bsc#1257952)\n- spi: tegra210-quad: Return IRQ_HANDLED when timeout already processed transfer (git-fixes).\n- spi: tegra: Fix a memory leak in tegra_slink_probe() (git-fixes).\n- spi: wpcm-fiu: Fix potential NULL pointer dereference in wpcm_fiu_probe() (git-fixes).\n- spi: wpcm-fiu: Fix uninitialized res (git-fixes).\n- spi: wpcm-fiu: Simplify with dev_err_probe() (stable-fixes).\n- spi: wpcm-fiu: Use devm_platform_ioremap_resource_byname() (stable-fixes).\n- staging: rtl8723bs: fix memory leak on failure path (stable-fixes).\n- staging: rtl8723bs: fix missing status update on sdio_alloc_irq() failure (stable-fixes).\n- staging: rtl8723bs: fix null dereference in find_network (git-fixes).\n- thermal: int340x: Fix sysfs group leak on DLVR registration failure (stable-fixes).\n- thermal: intel: x86_pkg_temp_thermal: Handle invalid temperature (git-fixes).\n- tools/hv: fcopy: Fix irregularities with size of ring buffer (git-fixes).\n- tools/power cpupower: Reset errno before strtoull() (stable-fixes).\n- tools/power/x86/intel-speed-select: Fix file descriptor leak in isolate_cpus() (git-fixes).\n- tools: hv: Enable debug logs for hv_kvp_daemon (git-fixes).\n- tpm: st33zp24: Fix missing cleanup on get_burstcount() error (git-fixes).\n- tpm: tpm_i2c_infineon: Fix locality leak on get_burstcount() failure (git-fixes).\n- uio_hv_generic: Align ring size to system page (git-fixes).\n- uio_hv_generic: Use correct size for interrupt and monitor pages (git-fixes).\n- usb: bdc: fix sleep during atomic (git-fixes).\n- usb: dwc2: fix resume failure if dr_mode is host (git-fixes).\n- usb: gadget: tegra-xudc: Add handling for BLCG_COREPLL_PWRDN (git-fixes).\n- usb: typec: ucsi: psy: Fix voltage and current max for non-Fixed PDOs (git-fixes).\n- watchdog: imx7ulp_wdt: handle the nowayout option (stable-fixes).\n- wifi: ath10k: fix lock protection in ath10k_wmi_event_peer_sta_ps_state_chg() (stable-fixes).\n- wifi: ath10k: sdio: add missing lock protection in ath10k_sdio_fw_crashed_dump() (git-fixes).\n- wifi: ath11k: Fix failure to connect to a 6 GHz AP (stable-fixes).\n- wifi: ath11k: add pm quirk for Thinkpad Z13/Z16 Gen1 (stable-fixes).\n- wifi: ath12k: fix preferred hardware mode calculation (stable-fixes).\n- wifi: ath9k: debug.h: fix kernel-doc bad lines and struct ath_tx_stats (git-fixes).\n- wifi: ath9k: fix kernel-doc warnings in common-debug.h (git-fixes).\n- wifi: cfg80211: Fix bitrate calculation overflow for HE rates (stable-fixes).\n- wifi: cfg80211: Fix use_for flag update on BSS refresh (git-fixes).\n- wifi: cfg80211: allow only one NAN interface, also in multi radio (stable-fixes).\n- wifi: cfg80211: cancel rfkill_block work in wiphy_unregister() (git-fixes).\n- wifi: cfg80211: stop NAN and P2P in cfg80211_leave (git-fixes).\n- wifi: cfg80211: wext: fix IGTK key ID off-by-one (git-fixes).\n- wifi: cw1200: Fix locking in error paths (git-fixes).\n- wifi: iwlegacy: add missing mutex protection in il3945_store_measurement() (stable-fixes).\n- wifi: iwlegacy: add missing mutex protection in il4965_store_tx_power() (stable-fixes).\n- wifi: iwlwifi: mvm: check the validity of noa_len (stable-fixes).\n- wifi: iwlwifi: mvm: pause TCM on fast resume (git-fixes).\n- wifi: libertas: fix WARNING in usb_tx_block (stable-fixes).\n- wifi: mac80211: bounds-check link_id in ieee80211_ml_reconfiguration (git-fixes).\n- wifi: mac80211: collect station statistics earlier when disconnect (stable-fixes).\n- wifi: mac80211: correctly check if CSA is active (stable-fixes).\n- wifi: mac80211: do not increment crypto_tx_tailroom_needed_cnt twice (stable-fixes).\n- wifi: mac80211: fix NULL pointer dereference in mesh_rx_csa_frame() (git-fixes).\n- wifi: mac80211: ocb: skip rx_no_sta when interface is not joined (stable-fixes).\n- wifi: mt76: Fix possible oob access in mt76_connac2_mac_write_txwi_80211() (git-fixes).\n- wifi: mt76: mt7925: Fix possible oob access in mt7925_mac_write_txwi_80211() (git-fixes).\n- wifi: mt76: mt7996: Fix possible oob access in mt7996_mac_write_txwi_80211() (git-fixes).\n- wifi: radiotap: reject radiotap with unknown bits (git-fixes).\n- wifi: rsi: Do not default to -EOPNOTSUPP in rsi_mac80211_config (git-fixes).\n- wifi: rtl8xxxu: fix slab-out-of-bounds in rtl8xxxu_sta_add (git-fixes).\n- wifi: rtw88: 8822b: Avoid WARNING in rtw8822b_config_trx_mode() (stable-fixes).\n- wifi: rtw88: Fix alignment fault in rtw_core_enable_beacon() (git-fixes).\n- wifi: rtw88: fix DTIM period handling when conf-\u003edtim_period is zero (stable-fixes).\n- wifi: rtw88: rtw8821cu: Add ID for Mercusys MU6H (stable-fixes).\n- wifi: rtw89: 8922a: set random mac if efuse contains zeroes (stable-fixes).\n- wifi: rtw89: mac: correct page number for CSI response (stable-fixes).\n- wifi: rtw89: pci: restore LDO setting after device resume (stable-fixes).\n- wifi: rtw89: ser: enable error IMR after recovering from L1 (stable-fixes).\n- wifi: rtw89: wow: add reason codes for disassociation in WoWLAN mode (stable-fixes).\n- wifi: wlcore: Fix a locking bug (git-fixes).\n- wifi: wlcore: ensure skb headroom before skb_push (stable-fixes).\n- workqueue: mark power efficient workqueue as unbounded if (bsc#1257891)\n- x86/hyperv: Fix usage of cpu_online_mask to get valid cpu (git-fixes).\n- x86/hyperv: Fix warnings for missing export.h header inclusion (git-fixes).\n- x86/hyperv: Use named operands in inline asm (git-fixes).\n- x86/hyperv: fix an indentation issue in mshyperv.h (git-fixes).\n",
"title": "Description of the patch"
},
{
"category": "details",
"text": "SUSE-2026-962,SUSE-SLE-Module-Live-Patching-15-SP7-2026-962,SUSE-SLE-Module-RT-15-SP7-2026-962",
"title": "Patchnames"
},
{
"category": "legal_disclaimer",
"text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
"title": "Terms of use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://www.suse.com/support/security/contact/",
"name": "SUSE Product Security Team",
"namespace": "https://www.suse.com/"
},
"references": [
{
"category": "external",
"summary": "SUSE ratings",
"url": "https://www.suse.com/support/security/rating/"
},
{
"category": "self",
"summary": "URL of this CSAF notice",
"url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2026_0962-1.json"
},
{
"category": "self",
"summary": "URL for SUSE-SU-2026:0962-1",
"url": "https://www.suse.com/support/update/announcement/2026/suse-su-20260962-1/"
},
{
"category": "self",
"summary": "E-Mail link for SUSE-SU-2026:0962-1",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-March/024803.html"
},
{
"category": "self",
"summary": "SUSE Bug 1241345",
"url": "https://bugzilla.suse.com/1241345"
},
{
"category": "self",
"summary": "SUSE Bug 1245728",
"url": "https://bugzilla.suse.com/1245728"
},
{
"category": "self",
"summary": "SUSE Bug 1247180",
"url": "https://bugzilla.suse.com/1247180"
},
{
"category": "self",
"summary": "SUSE Bug 1249587",
"url": "https://bugzilla.suse.com/1249587"
},
{
"category": "self",
"summary": "SUSE Bug 1249998",
"url": "https://bugzilla.suse.com/1249998"
},
{
"category": "self",
"summary": "SUSE Bug 1251135",
"url": "https://bugzilla.suse.com/1251135"
},
{
"category": "self",
"summary": "SUSE Bug 1251186",
"url": "https://bugzilla.suse.com/1251186"
},
{
"category": "self",
"summary": "SUSE Bug 1251966",
"url": "https://bugzilla.suse.com/1251966"
},
{
"category": "self",
"summary": "SUSE Bug 1251971",
"url": "https://bugzilla.suse.com/1251971"
},
{
"category": "self",
"summary": "SUSE Bug 1252008",
"url": "https://bugzilla.suse.com/1252008"
},
{
"category": "self",
"summary": "SUSE Bug 1252266",
"url": "https://bugzilla.suse.com/1252266"
},
{
"category": "self",
"summary": "SUSE Bug 1252911",
"url": "https://bugzilla.suse.com/1252911"
},
{
"category": "self",
"summary": "SUSE Bug 1252924",
"url": "https://bugzilla.suse.com/1252924"
},
{
"category": "self",
"summary": "SUSE Bug 1253049",
"url": "https://bugzilla.suse.com/1253049"
},
{
"category": "self",
"summary": "SUSE Bug 1253129",
"url": "https://bugzilla.suse.com/1253129"
},
{
"category": "self",
"summary": "SUSE Bug 1253644",
"url": "https://bugzilla.suse.com/1253644"
},
{
"category": "self",
"summary": "SUSE Bug 1253691",
"url": "https://bugzilla.suse.com/1253691"
},
{
"category": "self",
"summary": "SUSE Bug 1254214",
"url": "https://bugzilla.suse.com/1254214"
},
{
"category": "self",
"summary": "SUSE Bug 1254306",
"url": "https://bugzilla.suse.com/1254306"
},
{
"category": "self",
"summary": "SUSE Bug 1254992",
"url": "https://bugzilla.suse.com/1254992"
},
{
"category": "self",
"summary": "SUSE Bug 1255084",
"url": "https://bugzilla.suse.com/1255084"
},
{
"category": "self",
"summary": "SUSE Bug 1255129",
"url": "https://bugzilla.suse.com/1255129"
},
{
"category": "self",
"summary": "SUSE Bug 1255265",
"url": "https://bugzilla.suse.com/1255265"
},
{
"category": "self",
"summary": "SUSE Bug 1255379",
"url": "https://bugzilla.suse.com/1255379"
},
{
"category": "self",
"summary": "SUSE Bug 1255530",
"url": "https://bugzilla.suse.com/1255530"
},
{
"category": "self",
"summary": "SUSE Bug 1255698",
"url": "https://bugzilla.suse.com/1255698"
},
{
"category": "self",
"summary": "SUSE Bug 1255811",
"url": "https://bugzilla.suse.com/1255811"
},
{
"category": "self",
"summary": "SUSE Bug 1256564",
"url": "https://bugzilla.suse.com/1256564"
},
{
"category": "self",
"summary": "SUSE Bug 1256640",
"url": "https://bugzilla.suse.com/1256640"
},
{
"category": "self",
"summary": "SUSE Bug 1256679",
"url": "https://bugzilla.suse.com/1256679"
},
{
"category": "self",
"summary": "SUSE Bug 1256683",
"url": "https://bugzilla.suse.com/1256683"
},
{
"category": "self",
"summary": "SUSE Bug 1256708",
"url": "https://bugzilla.suse.com/1256708"
},
{
"category": "self",
"summary": "SUSE Bug 1256716",
"url": "https://bugzilla.suse.com/1256716"
},
{
"category": "self",
"summary": "SUSE Bug 1256755",
"url": "https://bugzilla.suse.com/1256755"
},
{
"category": "self",
"summary": "SUSE Bug 1256784",
"url": "https://bugzilla.suse.com/1256784"
},
{
"category": "self",
"summary": "SUSE Bug 1256802",
"url": "https://bugzilla.suse.com/1256802"
},
{
"category": "self",
"summary": "SUSE Bug 1256863",
"url": "https://bugzilla.suse.com/1256863"
},
{
"category": "self",
"summary": "SUSE Bug 1257159",
"url": "https://bugzilla.suse.com/1257159"
},
{
"category": "self",
"summary": "SUSE Bug 1257179",
"url": "https://bugzilla.suse.com/1257179"
},
{
"category": "self",
"summary": "SUSE Bug 1257209",
"url": "https://bugzilla.suse.com/1257209"
},
{
"category": "self",
"summary": "SUSE Bug 1257228",
"url": "https://bugzilla.suse.com/1257228"
},
{
"category": "self",
"summary": "SUSE Bug 1257231",
"url": "https://bugzilla.suse.com/1257231"
},
{
"category": "self",
"summary": "SUSE Bug 1257246",
"url": "https://bugzilla.suse.com/1257246"
},
{
"category": "self",
"summary": "SUSE Bug 1257279",
"url": "https://bugzilla.suse.com/1257279"
},
{
"category": "self",
"summary": "SUSE Bug 1257332",
"url": "https://bugzilla.suse.com/1257332"
},
{
"category": "self",
"summary": "SUSE Bug 1257466",
"url": "https://bugzilla.suse.com/1257466"
},
{
"category": "self",
"summary": "SUSE Bug 1257472",
"url": "https://bugzilla.suse.com/1257472"
},
{
"category": "self",
"summary": "SUSE Bug 1257473",
"url": "https://bugzilla.suse.com/1257473"
},
{
"category": "self",
"summary": "SUSE Bug 1257552",
"url": "https://bugzilla.suse.com/1257552"
},
{
"category": "self",
"summary": "SUSE Bug 1257553",
"url": "https://bugzilla.suse.com/1257553"
},
{
"category": "self",
"summary": "SUSE Bug 1257554",
"url": "https://bugzilla.suse.com/1257554"
},
{
"category": "self",
"summary": "SUSE Bug 1257556",
"url": "https://bugzilla.suse.com/1257556"
},
{
"category": "self",
"summary": "SUSE Bug 1257557",
"url": "https://bugzilla.suse.com/1257557"
},
{
"category": "self",
"summary": "SUSE Bug 1257559",
"url": "https://bugzilla.suse.com/1257559"
},
{
"category": "self",
"summary": "SUSE Bug 1257560",
"url": "https://bugzilla.suse.com/1257560"
},
{
"category": "self",
"summary": "SUSE Bug 1257562",
"url": "https://bugzilla.suse.com/1257562"
},
{
"category": "self",
"summary": "SUSE Bug 1257570",
"url": "https://bugzilla.suse.com/1257570"
},
{
"category": "self",
"summary": "SUSE Bug 1257573",
"url": "https://bugzilla.suse.com/1257573"
},
{
"category": "self",
"summary": "SUSE Bug 1257576",
"url": "https://bugzilla.suse.com/1257576"
},
{
"category": "self",
"summary": "SUSE Bug 1257579",
"url": "https://bugzilla.suse.com/1257579"
},
{
"category": "self",
"summary": "SUSE Bug 1257580",
"url": "https://bugzilla.suse.com/1257580"
},
{
"category": "self",
"summary": "SUSE Bug 1257586",
"url": "https://bugzilla.suse.com/1257586"
},
{
"category": "self",
"summary": "SUSE Bug 1257635",
"url": "https://bugzilla.suse.com/1257635"
},
{
"category": "self",
"summary": "SUSE Bug 1257679",
"url": "https://bugzilla.suse.com/1257679"
},
{
"category": "self",
"summary": "SUSE Bug 1257687",
"url": "https://bugzilla.suse.com/1257687"
},
{
"category": "self",
"summary": "SUSE Bug 1257704",
"url": "https://bugzilla.suse.com/1257704"
},
{
"category": "self",
"summary": "SUSE Bug 1257706",
"url": "https://bugzilla.suse.com/1257706"
},
{
"category": "self",
"summary": "SUSE Bug 1257707",
"url": "https://bugzilla.suse.com/1257707"
},
{
"category": "self",
"summary": "SUSE Bug 1257709",
"url": "https://bugzilla.suse.com/1257709"
},
{
"category": "self",
"summary": "SUSE Bug 1257714",
"url": "https://bugzilla.suse.com/1257714"
},
{
"category": "self",
"summary": "SUSE Bug 1257715",
"url": "https://bugzilla.suse.com/1257715"
},
{
"category": "self",
"summary": "SUSE Bug 1257716",
"url": "https://bugzilla.suse.com/1257716"
},
{
"category": "self",
"summary": "SUSE Bug 1257718",
"url": "https://bugzilla.suse.com/1257718"
},
{
"category": "self",
"summary": "SUSE Bug 1257722",
"url": "https://bugzilla.suse.com/1257722"
},
{
"category": "self",
"summary": "SUSE Bug 1257723",
"url": "https://bugzilla.suse.com/1257723"
},
{
"category": "self",
"summary": "SUSE Bug 1257729",
"url": "https://bugzilla.suse.com/1257729"
},
{
"category": "self",
"summary": "SUSE Bug 1257732",
"url": "https://bugzilla.suse.com/1257732"
},
{
"category": "self",
"summary": "SUSE Bug 1257734",
"url": "https://bugzilla.suse.com/1257734"
},
{
"category": "self",
"summary": "SUSE Bug 1257735",
"url": "https://bugzilla.suse.com/1257735"
},
{
"category": "self",
"summary": "SUSE Bug 1257739",
"url": "https://bugzilla.suse.com/1257739"
},
{
"category": "self",
"summary": "SUSE Bug 1257740",
"url": "https://bugzilla.suse.com/1257740"
},
{
"category": "self",
"summary": "SUSE Bug 1257741",
"url": "https://bugzilla.suse.com/1257741"
},
{
"category": "self",
"summary": "SUSE Bug 1257742",
"url": "https://bugzilla.suse.com/1257742"
},
{
"category": "self",
"summary": "SUSE Bug 1257743",
"url": "https://bugzilla.suse.com/1257743"
},
{
"category": "self",
"summary": "SUSE Bug 1257745",
"url": "https://bugzilla.suse.com/1257745"
},
{
"category": "self",
"summary": "SUSE Bug 1257749",
"url": "https://bugzilla.suse.com/1257749"
},
{
"category": "self",
"summary": "SUSE Bug 1257750",
"url": "https://bugzilla.suse.com/1257750"
},
{
"category": "self",
"summary": "SUSE Bug 1257755",
"url": "https://bugzilla.suse.com/1257755"
},
{
"category": "self",
"summary": "SUSE Bug 1257757",
"url": "https://bugzilla.suse.com/1257757"
},
{
"category": "self",
"summary": "SUSE Bug 1257758",
"url": "https://bugzilla.suse.com/1257758"
},
{
"category": "self",
"summary": "SUSE Bug 1257759",
"url": "https://bugzilla.suse.com/1257759"
},
{
"category": "self",
"summary": "SUSE Bug 1257761",
"url": "https://bugzilla.suse.com/1257761"
},
{
"category": "self",
"summary": "SUSE Bug 1257762",
"url": "https://bugzilla.suse.com/1257762"
},
{
"category": "self",
"summary": "SUSE Bug 1257763",
"url": "https://bugzilla.suse.com/1257763"
},
{
"category": "self",
"summary": "SUSE Bug 1257765",
"url": "https://bugzilla.suse.com/1257765"
},
{
"category": "self",
"summary": "SUSE Bug 1257768",
"url": "https://bugzilla.suse.com/1257768"
},
{
"category": "self",
"summary": "SUSE Bug 1257770",
"url": "https://bugzilla.suse.com/1257770"
},
{
"category": "self",
"summary": "SUSE Bug 1257772",
"url": "https://bugzilla.suse.com/1257772"
},
{
"category": "self",
"summary": "SUSE Bug 1257775",
"url": "https://bugzilla.suse.com/1257775"
},
{
"category": "self",
"summary": "SUSE Bug 1257776",
"url": "https://bugzilla.suse.com/1257776"
},
{
"category": "self",
"summary": "SUSE Bug 1257788",
"url": "https://bugzilla.suse.com/1257788"
},
{
"category": "self",
"summary": "SUSE Bug 1257789",
"url": "https://bugzilla.suse.com/1257789"
},
{
"category": "self",
"summary": "SUSE Bug 1257790",
"url": "https://bugzilla.suse.com/1257790"
},
{
"category": "self",
"summary": "SUSE Bug 1257805",
"url": "https://bugzilla.suse.com/1257805"
},
{
"category": "self",
"summary": "SUSE Bug 1257808",
"url": "https://bugzilla.suse.com/1257808"
},
{
"category": "self",
"summary": "SUSE Bug 1257809",
"url": "https://bugzilla.suse.com/1257809"
},
{
"category": "self",
"summary": "SUSE Bug 1257811",
"url": "https://bugzilla.suse.com/1257811"
},
{
"category": "self",
"summary": "SUSE Bug 1257813",
"url": "https://bugzilla.suse.com/1257813"
},
{
"category": "self",
"summary": "SUSE Bug 1257814",
"url": "https://bugzilla.suse.com/1257814"
},
{
"category": "self",
"summary": "SUSE Bug 1257816",
"url": "https://bugzilla.suse.com/1257816"
},
{
"category": "self",
"summary": "SUSE Bug 1257830",
"url": "https://bugzilla.suse.com/1257830"
},
{
"category": "self",
"summary": "SUSE Bug 1257891",
"url": "https://bugzilla.suse.com/1257891"
},
{
"category": "self",
"summary": "SUSE Bug 1257952",
"url": "https://bugzilla.suse.com/1257952"
},
{
"category": "self",
"summary": "SUSE Bug 1258037",
"url": "https://bugzilla.suse.com/1258037"
},
{
"category": "self",
"summary": "SUSE Bug 1258153",
"url": "https://bugzilla.suse.com/1258153"
},
{
"category": "self",
"summary": "SUSE Bug 1258176",
"url": "https://bugzilla.suse.com/1258176"
},
{
"category": "self",
"summary": "SUSE Bug 1258181",
"url": "https://bugzilla.suse.com/1258181"
},
{
"category": "self",
"summary": "SUSE Bug 1258184",
"url": "https://bugzilla.suse.com/1258184"
},
{
"category": "self",
"summary": "SUSE Bug 1258222",
"url": "https://bugzilla.suse.com/1258222"
},
{
"category": "self",
"summary": "SUSE Bug 1258226",
"url": "https://bugzilla.suse.com/1258226"
},
{
"category": "self",
"summary": "SUSE Bug 1258234",
"url": "https://bugzilla.suse.com/1258234"
},
{
"category": "self",
"summary": "SUSE Bug 1258237",
"url": "https://bugzilla.suse.com/1258237"
},
{
"category": "self",
"summary": "SUSE Bug 1258245",
"url": "https://bugzilla.suse.com/1258245"
},
{
"category": "self",
"summary": "SUSE Bug 1258249",
"url": "https://bugzilla.suse.com/1258249"
},
{
"category": "self",
"summary": "SUSE Bug 1258252",
"url": "https://bugzilla.suse.com/1258252"
},
{
"category": "self",
"summary": "SUSE Bug 1258256",
"url": "https://bugzilla.suse.com/1258256"
},
{
"category": "self",
"summary": "SUSE Bug 1258259",
"url": "https://bugzilla.suse.com/1258259"
},
{
"category": "self",
"summary": "SUSE Bug 1258272",
"url": "https://bugzilla.suse.com/1258272"
},
{
"category": "self",
"summary": "SUSE Bug 1258273",
"url": "https://bugzilla.suse.com/1258273"
},
{
"category": "self",
"summary": "SUSE Bug 1258277",
"url": "https://bugzilla.suse.com/1258277"
},
{
"category": "self",
"summary": "SUSE Bug 1258278",
"url": "https://bugzilla.suse.com/1258278"
},
{
"category": "self",
"summary": "SUSE Bug 1258279",
"url": "https://bugzilla.suse.com/1258279"
},
{
"category": "self",
"summary": "SUSE Bug 1258286",
"url": "https://bugzilla.suse.com/1258286"
},
{
"category": "self",
"summary": "SUSE Bug 1258293",
"url": "https://bugzilla.suse.com/1258293"
},
{
"category": "self",
"summary": "SUSE Bug 1258297",
"url": "https://bugzilla.suse.com/1258297"
},
{
"category": "self",
"summary": "SUSE Bug 1258298",
"url": "https://bugzilla.suse.com/1258298"
},
{
"category": "self",
"summary": "SUSE Bug 1258299",
"url": "https://bugzilla.suse.com/1258299"
},
{
"category": "self",
"summary": "SUSE Bug 1258304",
"url": "https://bugzilla.suse.com/1258304"
},
{
"category": "self",
"summary": "SUSE Bug 1258309",
"url": "https://bugzilla.suse.com/1258309"
},
{
"category": "self",
"summary": "SUSE Bug 1258313",
"url": "https://bugzilla.suse.com/1258313"
},
{
"category": "self",
"summary": "SUSE Bug 1258317",
"url": "https://bugzilla.suse.com/1258317"
},
{
"category": "self",
"summary": "SUSE Bug 1258321",
"url": "https://bugzilla.suse.com/1258321"
},
{
"category": "self",
"summary": "SUSE Bug 1258326",
"url": "https://bugzilla.suse.com/1258326"
},
{
"category": "self",
"summary": "SUSE Bug 1258338",
"url": "https://bugzilla.suse.com/1258338"
},
{
"category": "self",
"summary": "SUSE Bug 1258340",
"url": "https://bugzilla.suse.com/1258340"
},
{
"category": "self",
"summary": "SUSE Bug 1258349",
"url": "https://bugzilla.suse.com/1258349"
},
{
"category": "self",
"summary": "SUSE Bug 1258354",
"url": "https://bugzilla.suse.com/1258354"
},
{
"category": "self",
"summary": "SUSE Bug 1258358",
"url": "https://bugzilla.suse.com/1258358"
},
{
"category": "self",
"summary": "SUSE Bug 1258374",
"url": "https://bugzilla.suse.com/1258374"
},
{
"category": "self",
"summary": "SUSE Bug 1258376",
"url": "https://bugzilla.suse.com/1258376"
},
{
"category": "self",
"summary": "SUSE Bug 1258377",
"url": "https://bugzilla.suse.com/1258377"
},
{
"category": "self",
"summary": "SUSE Bug 1258379",
"url": "https://bugzilla.suse.com/1258379"
},
{
"category": "self",
"summary": "SUSE Bug 1258389",
"url": "https://bugzilla.suse.com/1258389"
},
{
"category": "self",
"summary": "SUSE Bug 1258394",
"url": "https://bugzilla.suse.com/1258394"
},
{
"category": "self",
"summary": "SUSE Bug 1258395",
"url": "https://bugzilla.suse.com/1258395"
},
{
"category": "self",
"summary": "SUSE Bug 1258397",
"url": "https://bugzilla.suse.com/1258397"
},
{
"category": "self",
"summary": "SUSE Bug 1258411",
"url": "https://bugzilla.suse.com/1258411"
},
{
"category": "self",
"summary": "SUSE Bug 1258415",
"url": "https://bugzilla.suse.com/1258415"
},
{
"category": "self",
"summary": "SUSE Bug 1258419",
"url": "https://bugzilla.suse.com/1258419"
},
{
"category": "self",
"summary": "SUSE Bug 1258422",
"url": "https://bugzilla.suse.com/1258422"
},
{
"category": "self",
"summary": "SUSE Bug 1258424",
"url": "https://bugzilla.suse.com/1258424"
},
{
"category": "self",
"summary": "SUSE Bug 1258429",
"url": "https://bugzilla.suse.com/1258429"
},
{
"category": "self",
"summary": "SUSE Bug 1258442",
"url": "https://bugzilla.suse.com/1258442"
},
{
"category": "self",
"summary": "SUSE Bug 1258464",
"url": "https://bugzilla.suse.com/1258464"
},
{
"category": "self",
"summary": "SUSE Bug 1258465",
"url": "https://bugzilla.suse.com/1258465"
},
{
"category": "self",
"summary": "SUSE Bug 1258468",
"url": "https://bugzilla.suse.com/1258468"
},
{
"category": "self",
"summary": "SUSE Bug 1258469",
"url": "https://bugzilla.suse.com/1258469"
},
{
"category": "self",
"summary": "SUSE Bug 1258484",
"url": "https://bugzilla.suse.com/1258484"
},
{
"category": "self",
"summary": "SUSE Bug 1258517",
"url": "https://bugzilla.suse.com/1258517"
},
{
"category": "self",
"summary": "SUSE Bug 1258518",
"url": "https://bugzilla.suse.com/1258518"
},
{
"category": "self",
"summary": "SUSE Bug 1258519",
"url": "https://bugzilla.suse.com/1258519"
},
{
"category": "self",
"summary": "SUSE Bug 1258520",
"url": "https://bugzilla.suse.com/1258520"
},
{
"category": "self",
"summary": "SUSE Bug 1258524",
"url": "https://bugzilla.suse.com/1258524"
},
{
"category": "self",
"summary": "SUSE Bug 1258544",
"url": "https://bugzilla.suse.com/1258544"
},
{
"category": "self",
"summary": "SUSE Bug 1258660",
"url": "https://bugzilla.suse.com/1258660"
},
{
"category": "self",
"summary": "SUSE Bug 1258824",
"url": "https://bugzilla.suse.com/1258824"
},
{
"category": "self",
"summary": "SUSE Bug 1258832",
"url": "https://bugzilla.suse.com/1258832"
},
{
"category": "self",
"summary": "SUSE Bug 1258849",
"url": "https://bugzilla.suse.com/1258849"
},
{
"category": "self",
"summary": "SUSE Bug 1258860",
"url": "https://bugzilla.suse.com/1258860"
},
{
"category": "self",
"summary": "SUSE Bug 1258928",
"url": "https://bugzilla.suse.com/1258928"
},
{
"category": "self",
"summary": "SUSE Bug 1259070",
"url": "https://bugzilla.suse.com/1259070"
},
{
"category": "self",
"summary": "SUSE Bug 1259130",
"url": "https://bugzilla.suse.com/1259130"
},
{
"category": "self",
"summary": "SUSE Bug 1259558",
"url": "https://bugzilla.suse.com/1259558"
},
{
"category": "self",
"summary": "SUSE Bug 1259580",
"url": "https://bugzilla.suse.com/1259580"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2023-53817 page",
"url": "https://www.suse.com/security/cve/CVE-2023-53817/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-39748 page",
"url": "https://www.suse.com/security/cve/CVE-2025-39748/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-39817 page",
"url": "https://www.suse.com/security/cve/CVE-2025-39817/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-39964 page",
"url": "https://www.suse.com/security/cve/CVE-2025-39964/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40099 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40099/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40103 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40103/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40201 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40201/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40253 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40253/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-68283 page",
"url": "https://www.suse.com/security/cve/CVE-2025-68283/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-68295 page",
"url": "https://www.suse.com/security/cve/CVE-2025-68295/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-68374 page",
"url": "https://www.suse.com/security/cve/CVE-2025-68374/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-68735 page",
"url": "https://www.suse.com/security/cve/CVE-2025-68735/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-68736 page",
"url": "https://www.suse.com/security/cve/CVE-2025-68736/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-68778 page",
"url": "https://www.suse.com/security/cve/CVE-2025-68778/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-68785 page",
"url": "https://www.suse.com/security/cve/CVE-2025-68785/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-68810 page",
"url": "https://www.suse.com/security/cve/CVE-2025-68810/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-71071 page",
"url": "https://www.suse.com/security/cve/CVE-2025-71071/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-71104 page",
"url": "https://www.suse.com/security/cve/CVE-2025-71104/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-71113 page",
"url": "https://www.suse.com/security/cve/CVE-2025-71113/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-71125 page",
"url": "https://www.suse.com/security/cve/CVE-2025-71125/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-71126 page",
"url": "https://www.suse.com/security/cve/CVE-2025-71126/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-71148 page",
"url": "https://www.suse.com/security/cve/CVE-2025-71148/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-71182 page",
"url": "https://www.suse.com/security/cve/CVE-2025-71182/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-71184 page",
"url": "https://www.suse.com/security/cve/CVE-2025-71184/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-71185 page",
"url": "https://www.suse.com/security/cve/CVE-2025-71185/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-71188 page",
"url": "https://www.suse.com/security/cve/CVE-2025-71188/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-71189 page",
"url": "https://www.suse.com/security/cve/CVE-2025-71189/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-71190 page",
"url": "https://www.suse.com/security/cve/CVE-2025-71190/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-71191 page",
"url": "https://www.suse.com/security/cve/CVE-2025-71191/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-71192 page",
"url": "https://www.suse.com/security/cve/CVE-2025-71192/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-71194 page",
"url": "https://www.suse.com/security/cve/CVE-2025-71194/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-71195 page",
"url": "https://www.suse.com/security/cve/CVE-2025-71195/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-71196 page",
"url": "https://www.suse.com/security/cve/CVE-2025-71196/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-71197 page",
"url": "https://www.suse.com/security/cve/CVE-2025-71197/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-71198 page",
"url": "https://www.suse.com/security/cve/CVE-2025-71198/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-71199 page",
"url": "https://www.suse.com/security/cve/CVE-2025-71199/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-71200 page",
"url": "https://www.suse.com/security/cve/CVE-2025-71200/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-71222 page",
"url": "https://www.suse.com/security/cve/CVE-2025-71222/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-71224 page",
"url": "https://www.suse.com/security/cve/CVE-2025-71224/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-71225 page",
"url": "https://www.suse.com/security/cve/CVE-2025-71225/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-71229 page",
"url": "https://www.suse.com/security/cve/CVE-2025-71229/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-71231 page",
"url": "https://www.suse.com/security/cve/CVE-2025-71231/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-71232 page",
"url": "https://www.suse.com/security/cve/CVE-2025-71232/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-71234 page",
"url": "https://www.suse.com/security/cve/CVE-2025-71234/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-71235 page",
"url": "https://www.suse.com/security/cve/CVE-2025-71235/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-71236 page",
"url": "https://www.suse.com/security/cve/CVE-2025-71236/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2026-22979 page",
"url": "https://www.suse.com/security/cve/CVE-2026-22979/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2026-22982 page",
"url": "https://www.suse.com/security/cve/CVE-2026-22982/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2026-22989 page",
"url": "https://www.suse.com/security/cve/CVE-2026-22989/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2026-22998 page",
"url": "https://www.suse.com/security/cve/CVE-2026-22998/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2026-23003 page",
"url": "https://www.suse.com/security/cve/CVE-2026-23003/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2026-23004 page",
"url": "https://www.suse.com/security/cve/CVE-2026-23004/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2026-23010 page",
"url": "https://www.suse.com/security/cve/CVE-2026-23010/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2026-23017 page",
"url": "https://www.suse.com/security/cve/CVE-2026-23017/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2026-23021 page",
"url": "https://www.suse.com/security/cve/CVE-2026-23021/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2026-23023 page",
"url": "https://www.suse.com/security/cve/CVE-2026-23023/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2026-23026 page",
"url": "https://www.suse.com/security/cve/CVE-2026-23026/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2026-23033 page",
"url": "https://www.suse.com/security/cve/CVE-2026-23033/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2026-23035 page",
"url": "https://www.suse.com/security/cve/CVE-2026-23035/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2026-23037 page",
"url": "https://www.suse.com/security/cve/CVE-2026-23037/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2026-23038 page",
"url": "https://www.suse.com/security/cve/CVE-2026-23038/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2026-23049 page",
"url": "https://www.suse.com/security/cve/CVE-2026-23049/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2026-23053 page",
"url": "https://www.suse.com/security/cve/CVE-2026-23053/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2026-23054 page",
"url": "https://www.suse.com/security/cve/CVE-2026-23054/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2026-23056 page",
"url": "https://www.suse.com/security/cve/CVE-2026-23056/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2026-23057 page",
"url": "https://www.suse.com/security/cve/CVE-2026-23057/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2026-23058 page",
"url": "https://www.suse.com/security/cve/CVE-2026-23058/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2026-23060 page",
"url": "https://www.suse.com/security/cve/CVE-2026-23060/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2026-23061 page",
"url": "https://www.suse.com/security/cve/CVE-2026-23061/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2026-23062 page",
"url": "https://www.suse.com/security/cve/CVE-2026-23062/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2026-23063 page",
"url": "https://www.suse.com/security/cve/CVE-2026-23063/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2026-23064 page",
"url": "https://www.suse.com/security/cve/CVE-2026-23064/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2026-23065 page",
"url": "https://www.suse.com/security/cve/CVE-2026-23065/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2026-23068 page",
"url": "https://www.suse.com/security/cve/CVE-2026-23068/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2026-23069 page",
"url": "https://www.suse.com/security/cve/CVE-2026-23069/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2026-23070 page",
"url": "https://www.suse.com/security/cve/CVE-2026-23070/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2026-23071 page",
"url": "https://www.suse.com/security/cve/CVE-2026-23071/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2026-23073 page",
"url": "https://www.suse.com/security/cve/CVE-2026-23073/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2026-23074 page",
"url": "https://www.suse.com/security/cve/CVE-2026-23074/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2026-23076 page",
"url": "https://www.suse.com/security/cve/CVE-2026-23076/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2026-23078 page",
"url": "https://www.suse.com/security/cve/CVE-2026-23078/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2026-23080 page",
"url": "https://www.suse.com/security/cve/CVE-2026-23080/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2026-23082 page",
"url": "https://www.suse.com/security/cve/CVE-2026-23082/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2026-23083 page",
"url": "https://www.suse.com/security/cve/CVE-2026-23083/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2026-23084 page",
"url": "https://www.suse.com/security/cve/CVE-2026-23084/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2026-23085 page",
"url": "https://www.suse.com/security/cve/CVE-2026-23085/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2026-23086 page",
"url": "https://www.suse.com/security/cve/CVE-2026-23086/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2026-23088 page",
"url": "https://www.suse.com/security/cve/CVE-2026-23088/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2026-23089 page",
"url": "https://www.suse.com/security/cve/CVE-2026-23089/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2026-23090 page",
"url": "https://www.suse.com/security/cve/CVE-2026-23090/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2026-23091 page",
"url": "https://www.suse.com/security/cve/CVE-2026-23091/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2026-23094 page",
"url": "https://www.suse.com/security/cve/CVE-2026-23094/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2026-23095 page",
"url": "https://www.suse.com/security/cve/CVE-2026-23095/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2026-23096 page",
"url": "https://www.suse.com/security/cve/CVE-2026-23096/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2026-23099 page",
"url": "https://www.suse.com/security/cve/CVE-2026-23099/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2026-23101 page",
"url": "https://www.suse.com/security/cve/CVE-2026-23101/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2026-23102 page",
"url": "https://www.suse.com/security/cve/CVE-2026-23102/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2026-23104 page",
"url": "https://www.suse.com/security/cve/CVE-2026-23104/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2026-23105 page",
"url": "https://www.suse.com/security/cve/CVE-2026-23105/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2026-23107 page",
"url": "https://www.suse.com/security/cve/CVE-2026-23107/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2026-23108 page",
"url": "https://www.suse.com/security/cve/CVE-2026-23108/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2026-23110 page",
"url": "https://www.suse.com/security/cve/CVE-2026-23110/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2026-23111 page",
"url": "https://www.suse.com/security/cve/CVE-2026-23111/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2026-23112 page",
"url": "https://www.suse.com/security/cve/CVE-2026-23112/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2026-23113 page",
"url": "https://www.suse.com/security/cve/CVE-2026-23113/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2026-23116 page",
"url": "https://www.suse.com/security/cve/CVE-2026-23116/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2026-23119 page",
"url": "https://www.suse.com/security/cve/CVE-2026-23119/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2026-23121 page",
"url": "https://www.suse.com/security/cve/CVE-2026-23121/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2026-23125 page",
"url": "https://www.suse.com/security/cve/CVE-2026-23125/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2026-23128 page",
"url": "https://www.suse.com/security/cve/CVE-2026-23128/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2026-23129 page",
"url": "https://www.suse.com/security/cve/CVE-2026-23129/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2026-23131 page",
"url": "https://www.suse.com/security/cve/CVE-2026-23131/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2026-23133 page",
"url": "https://www.suse.com/security/cve/CVE-2026-23133/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2026-23135 page",
"url": "https://www.suse.com/security/cve/CVE-2026-23135/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2026-23139 page",
"url": "https://www.suse.com/security/cve/CVE-2026-23139/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2026-23141 page",
"url": "https://www.suse.com/security/cve/CVE-2026-23141/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2026-23145 page",
"url": "https://www.suse.com/security/cve/CVE-2026-23145/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2026-23146 page",
"url": "https://www.suse.com/security/cve/CVE-2026-23146/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2026-23150 page",
"url": "https://www.suse.com/security/cve/CVE-2026-23150/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2026-23151 page",
"url": "https://www.suse.com/security/cve/CVE-2026-23151/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2026-23152 page",
"url": "https://www.suse.com/security/cve/CVE-2026-23152/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2026-23154 page",
"url": "https://www.suse.com/security/cve/CVE-2026-23154/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2026-23155 page",
"url": "https://www.suse.com/security/cve/CVE-2026-23155/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2026-23156 page",
"url": "https://www.suse.com/security/cve/CVE-2026-23156/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2026-23157 page",
"url": "https://www.suse.com/security/cve/CVE-2026-23157/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2026-23163 page",
"url": "https://www.suse.com/security/cve/CVE-2026-23163/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2026-23166 page",
"url": "https://www.suse.com/security/cve/CVE-2026-23166/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2026-23167 page",
"url": "https://www.suse.com/security/cve/CVE-2026-23167/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2026-23169 page",
"url": "https://www.suse.com/security/cve/CVE-2026-23169/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2026-23170 page",
"url": "https://www.suse.com/security/cve/CVE-2026-23170/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2026-23171 page",
"url": "https://www.suse.com/security/cve/CVE-2026-23171/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2026-23172 page",
"url": "https://www.suse.com/security/cve/CVE-2026-23172/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2026-23173 page",
"url": "https://www.suse.com/security/cve/CVE-2026-23173/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2026-23176 page",
"url": "https://www.suse.com/security/cve/CVE-2026-23176/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2026-23178 page",
"url": "https://www.suse.com/security/cve/CVE-2026-23178/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2026-23179 page",
"url": "https://www.suse.com/security/cve/CVE-2026-23179/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2026-23182 page",
"url": "https://www.suse.com/security/cve/CVE-2026-23182/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2026-23190 page",
"url": "https://www.suse.com/security/cve/CVE-2026-23190/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2026-23191 page",
"url": "https://www.suse.com/security/cve/CVE-2026-23191/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2026-23198 page",
"url": "https://www.suse.com/security/cve/CVE-2026-23198/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2026-23202 page",
"url": "https://www.suse.com/security/cve/CVE-2026-23202/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2026-23204 page",
"url": "https://www.suse.com/security/cve/CVE-2026-23204/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2026-23207 page",
"url": "https://www.suse.com/security/cve/CVE-2026-23207/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2026-23208 page",
"url": "https://www.suse.com/security/cve/CVE-2026-23208/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2026-23209 page",
"url": "https://www.suse.com/security/cve/CVE-2026-23209/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2026-23210 page",
"url": "https://www.suse.com/security/cve/CVE-2026-23210/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2026-23213 page",
"url": "https://www.suse.com/security/cve/CVE-2026-23213/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2026-23214 page",
"url": "https://www.suse.com/security/cve/CVE-2026-23214/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2026-23221 page",
"url": "https://www.suse.com/security/cve/CVE-2026-23221/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2026-23222 page",
"url": "https://www.suse.com/security/cve/CVE-2026-23222/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2026-23229 page",
"url": "https://www.suse.com/security/cve/CVE-2026-23229/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2026-23268 page",
"url": "https://www.suse.com/security/cve/CVE-2026-23268/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2026-23269 page",
"url": "https://www.suse.com/security/cve/CVE-2026-23269/"
}
],
"title": "Security update for the Linux Kernel",
"tracking": {
"current_release_date": "2026-03-23T09:09:02Z",
"generator": {
"date": "2026-03-23T09:09:02Z",
"engine": {
"name": "cve-database.git:bin/generate-csaf.pl",
"version": "1"
}
},
"id": "SUSE-SU-2026:0962-1",
"initial_release_date": "2026-03-23T09:09:02Z",
"revision_history": [
{
"date": "2026-03-23T09:09:02Z",
"number": "1",
"summary": "Current version"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "kernel-devel-rt-6.4.0-150700.7.34.1.noarch",
"product": {
"name": "kernel-devel-rt-6.4.0-150700.7.34.1.noarch",
"product_id": "kernel-devel-rt-6.4.0-150700.7.34.1.noarch"
}
},
{
"category": "product_version",
"name": "kernel-source-rt-6.4.0-150700.7.34.1.noarch",
"product": {
"name": "kernel-source-rt-6.4.0-150700.7.34.1.noarch",
"product_id": "kernel-source-rt-6.4.0-150700.7.34.1.noarch"
}
}
],
"category": "architecture",
"name": "noarch"
},
{
"branches": [
{
"category": "product_version",
"name": "cluster-md-kmp-rt-6.4.0-150700.7.34.1.x86_64",
"product": {
"name": "cluster-md-kmp-rt-6.4.0-150700.7.34.1.x86_64",
"product_id": "cluster-md-kmp-rt-6.4.0-150700.7.34.1.x86_64"
}
},
{
"category": "product_version",
"name": "dlm-kmp-rt-6.4.0-150700.7.34.1.x86_64",
"product": {
"name": "dlm-kmp-rt-6.4.0-150700.7.34.1.x86_64",
"product_id": "dlm-kmp-rt-6.4.0-150700.7.34.1.x86_64"
}
},
{
"category": "product_version",
"name": "gfs2-kmp-rt-6.4.0-150700.7.34.1.x86_64",
"product": {
"name": "gfs2-kmp-rt-6.4.0-150700.7.34.1.x86_64",
"product_id": "gfs2-kmp-rt-6.4.0-150700.7.34.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-livepatch-6_4_0-150700_7_34-rt-1-150700.1.3.1.x86_64",
"product": {
"name": "kernel-livepatch-6_4_0-150700_7_34-rt-1-150700.1.3.1.x86_64",
"product_id": "kernel-livepatch-6_4_0-150700_7_34-rt-1-150700.1.3.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-rt-6.4.0-150700.7.34.1.x86_64",
"product": {
"name": "kernel-rt-6.4.0-150700.7.34.1.x86_64",
"product_id": "kernel-rt-6.4.0-150700.7.34.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-rt-devel-6.4.0-150700.7.34.1.x86_64",
"product": {
"name": "kernel-rt-devel-6.4.0-150700.7.34.1.x86_64",
"product_id": "kernel-rt-devel-6.4.0-150700.7.34.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-rt-extra-6.4.0-150700.7.34.1.x86_64",
"product": {
"name": "kernel-rt-extra-6.4.0-150700.7.34.1.x86_64",
"product_id": "kernel-rt-extra-6.4.0-150700.7.34.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-rt-livepatch-6.4.0-150700.7.34.1.x86_64",
"product": {
"name": "kernel-rt-livepatch-6.4.0-150700.7.34.1.x86_64",
"product_id": "kernel-rt-livepatch-6.4.0-150700.7.34.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-rt-livepatch-devel-6.4.0-150700.7.34.1.x86_64",
"product": {
"name": "kernel-rt-livepatch-devel-6.4.0-150700.7.34.1.x86_64",
"product_id": "kernel-rt-livepatch-devel-6.4.0-150700.7.34.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-rt-optional-6.4.0-150700.7.34.1.x86_64",
"product": {
"name": "kernel-rt-optional-6.4.0-150700.7.34.1.x86_64",
"product_id": "kernel-rt-optional-6.4.0-150700.7.34.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-rt-vdso-6.4.0-150700.7.34.1.x86_64",
"product": {
"name": "kernel-rt-vdso-6.4.0-150700.7.34.1.x86_64",
"product_id": "kernel-rt-vdso-6.4.0-150700.7.34.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-syms-rt-6.4.0-150700.7.34.1.x86_64",
"product": {
"name": "kernel-syms-rt-6.4.0-150700.7.34.1.x86_64",
"product_id": "kernel-syms-rt-6.4.0-150700.7.34.1.x86_64"
}
},
{
"category": "product_version",
"name": "kselftests-kmp-rt-6.4.0-150700.7.34.1.x86_64",
"product": {
"name": "kselftests-kmp-rt-6.4.0-150700.7.34.1.x86_64",
"product_id": "kselftests-kmp-rt-6.4.0-150700.7.34.1.x86_64"
}
},
{
"category": "product_version",
"name": "ocfs2-kmp-rt-6.4.0-150700.7.34.1.x86_64",
"product": {
"name": "ocfs2-kmp-rt-6.4.0-150700.7.34.1.x86_64",
"product_id": "ocfs2-kmp-rt-6.4.0-150700.7.34.1.x86_64"
}
},
{
"category": "product_version",
"name": "reiserfs-kmp-rt-6.4.0-150700.7.34.1.x86_64",
"product": {
"name": "reiserfs-kmp-rt-6.4.0-150700.7.34.1.x86_64",
"product_id": "reiserfs-kmp-rt-6.4.0-150700.7.34.1.x86_64"
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_name",
"name": "SUSE Linux Enterprise Live Patching 15 SP7",
"product": {
"name": "SUSE Linux Enterprise Live Patching 15 SP7",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP7",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle-module-live-patching:15:sp7"
}
}
},
{
"category": "product_name",
"name": "SUSE Real Time Module 15 SP7",
"product": {
"name": "SUSE Real Time Module 15 SP7",
"product_id": "SUSE Real Time Module 15 SP7",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle-module-rt:15:sp7"
}
}
}
],
"category": "product_family",
"name": "SUSE Linux Enterprise"
}
],
"category": "vendor",
"name": "SUSE"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-6_4_0-150700_7_34-rt-1-150700.1.3.1.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP7",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_7_34-rt-1-150700.1.3.1.x86_64"
},
"product_reference": "kernel-livepatch-6_4_0-150700_7_34-rt-1-150700.1.3.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cluster-md-kmp-rt-6.4.0-150700.7.34.1.x86_64 as component of SUSE Real Time Module 15 SP7",
"product_id": "SUSE Real Time Module 15 SP7:cluster-md-kmp-rt-6.4.0-150700.7.34.1.x86_64"
},
"product_reference": "cluster-md-kmp-rt-6.4.0-150700.7.34.1.x86_64",
"relates_to_product_reference": "SUSE Real Time Module 15 SP7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dlm-kmp-rt-6.4.0-150700.7.34.1.x86_64 as component of SUSE Real Time Module 15 SP7",
"product_id": "SUSE Real Time Module 15 SP7:dlm-kmp-rt-6.4.0-150700.7.34.1.x86_64"
},
"product_reference": "dlm-kmp-rt-6.4.0-150700.7.34.1.x86_64",
"relates_to_product_reference": "SUSE Real Time Module 15 SP7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "gfs2-kmp-rt-6.4.0-150700.7.34.1.x86_64 as component of SUSE Real Time Module 15 SP7",
"product_id": "SUSE Real Time Module 15 SP7:gfs2-kmp-rt-6.4.0-150700.7.34.1.x86_64"
},
"product_reference": "gfs2-kmp-rt-6.4.0-150700.7.34.1.x86_64",
"relates_to_product_reference": "SUSE Real Time Module 15 SP7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-rt-6.4.0-150700.7.34.1.noarch as component of SUSE Real Time Module 15 SP7",
"product_id": "SUSE Real Time Module 15 SP7:kernel-devel-rt-6.4.0-150700.7.34.1.noarch"
},
"product_reference": "kernel-devel-rt-6.4.0-150700.7.34.1.noarch",
"relates_to_product_reference": "SUSE Real Time Module 15 SP7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-6.4.0-150700.7.34.1.x86_64 as component of SUSE Real Time Module 15 SP7",
"product_id": "SUSE Real Time Module 15 SP7:kernel-rt-6.4.0-150700.7.34.1.x86_64"
},
"product_reference": "kernel-rt-6.4.0-150700.7.34.1.x86_64",
"relates_to_product_reference": "SUSE Real Time Module 15 SP7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-devel-6.4.0-150700.7.34.1.x86_64 as component of SUSE Real Time Module 15 SP7",
"product_id": "SUSE Real Time Module 15 SP7:kernel-rt-devel-6.4.0-150700.7.34.1.x86_64"
},
"product_reference": "kernel-rt-devel-6.4.0-150700.7.34.1.x86_64",
"relates_to_product_reference": "SUSE Real Time Module 15 SP7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-source-rt-6.4.0-150700.7.34.1.noarch as component of SUSE Real Time Module 15 SP7",
"product_id": "SUSE Real Time Module 15 SP7:kernel-source-rt-6.4.0-150700.7.34.1.noarch"
},
"product_reference": "kernel-source-rt-6.4.0-150700.7.34.1.noarch",
"relates_to_product_reference": "SUSE Real Time Module 15 SP7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-syms-rt-6.4.0-150700.7.34.1.x86_64 as component of SUSE Real Time Module 15 SP7",
"product_id": "SUSE Real Time Module 15 SP7:kernel-syms-rt-6.4.0-150700.7.34.1.x86_64"
},
"product_reference": "kernel-syms-rt-6.4.0-150700.7.34.1.x86_64",
"relates_to_product_reference": "SUSE Real Time Module 15 SP7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ocfs2-kmp-rt-6.4.0-150700.7.34.1.x86_64 as component of SUSE Real Time Module 15 SP7",
"product_id": "SUSE Real Time Module 15 SP7:ocfs2-kmp-rt-6.4.0-150700.7.34.1.x86_64"
},
"product_reference": "ocfs2-kmp-rt-6.4.0-150700.7.34.1.x86_64",
"relates_to_product_reference": "SUSE Real Time Module 15 SP7"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2023-53817",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2023-53817"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\ncrypto: lib/mpi - avoid null pointer deref in mpi_cmp_ui()\n\nDuring NVMeTCP Authentication a controller can trigger a kernel\noops by specifying the 8192 bit Diffie Hellman group and passing\na correctly sized, but zeroed Diffie Hellamn value.\nmpi_cmp_ui() was detecting this if the second parameter was 0,\nbut 1 is passed from dh_is_pubkey_valid(). This causes the null\npointer u-\u003ed to be dereferenced towards the end of mpi_cmp_ui()",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_7_34-rt-1-150700.1.3.1.x86_64",
"SUSE Real Time Module 15 SP7:cluster-md-kmp-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:dlm-kmp-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:gfs2-kmp-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-devel-rt-6.4.0-150700.7.34.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-rt-devel-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-source-rt-6.4.0-150700.7.34.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-syms-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:ocfs2-kmp-rt-6.4.0-150700.7.34.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2023-53817",
"url": "https://www.suse.com/security/cve/CVE-2023-53817"
},
{
"category": "external",
"summary": "SUSE Bug 1254992 for CVE-2023-53817",
"url": "https://bugzilla.suse.com/1254992"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_7_34-rt-1-150700.1.3.1.x86_64",
"SUSE Real Time Module 15 SP7:cluster-md-kmp-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:dlm-kmp-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:gfs2-kmp-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-devel-rt-6.4.0-150700.7.34.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-rt-devel-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-source-rt-6.4.0-150700.7.34.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-syms-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:ocfs2-kmp-rt-6.4.0-150700.7.34.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_7_34-rt-1-150700.1.3.1.x86_64",
"SUSE Real Time Module 15 SP7:cluster-md-kmp-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:dlm-kmp-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:gfs2-kmp-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-devel-rt-6.4.0-150700.7.34.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-rt-devel-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-source-rt-6.4.0-150700.7.34.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-syms-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:ocfs2-kmp-rt-6.4.0-150700.7.34.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-03-23T09:09:02Z",
"details": "moderate"
}
],
"title": "CVE-2023-53817"
},
{
"cve": "CVE-2025-39748",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-39748"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nbpf: Forget ranges when refining tnum after JSET\n\nSyzbot reported a kernel warning due to a range invariant violation on\nthe following BPF program.\n\n 0: call bpf_get_netns_cookie\n 1: if r0 == 0 goto \u003cexit\u003e\n 2: if r0 \u0026 Oxffffffff goto \u003cexit\u003e\n\nThe issue is on the path where we fall through both jumps.\n\nThat path is unreachable at runtime: after insn 1, we know r0 != 0, but\nwith the sign extension on the jset, we would only fallthrough insn 2\nif r0 == 0. Unfortunately, is_branch_taken() isn\u0027t currently able to\nfigure this out, so the verifier walks all branches. The verifier then\nrefines the register bounds using the second condition and we end\nup with inconsistent bounds on this unreachable path:\n\n 1: if r0 == 0 goto \u003cexit\u003e\n r0: u64=[0x1, 0xffffffffffffffff] var_off=(0, 0xffffffffffffffff)\n 2: if r0 \u0026 0xffffffff goto \u003cexit\u003e\n r0 before reg_bounds_sync: u64=[0x1, 0xffffffffffffffff] var_off=(0, 0)\n r0 after reg_bounds_sync: u64=[0x1, 0] var_off=(0, 0)\n\nImproving the range refinement for JSET to cover all cases is tricky. We\nalso don\u0027t expect many users to rely on JSET given LLVM doesn\u0027t generate\nthose instructions. So instead of improving the range refinement for\nJSETs, Eduard suggested we forget the ranges whenever we\u0027re narrowing\ntnums after a JSET. This patch implements that approach.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_7_34-rt-1-150700.1.3.1.x86_64",
"SUSE Real Time Module 15 SP7:cluster-md-kmp-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:dlm-kmp-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:gfs2-kmp-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-devel-rt-6.4.0-150700.7.34.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-rt-devel-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-source-rt-6.4.0-150700.7.34.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-syms-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:ocfs2-kmp-rt-6.4.0-150700.7.34.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-39748",
"url": "https://www.suse.com/security/cve/CVE-2025-39748"
},
{
"category": "external",
"summary": "SUSE Bug 1249587 for CVE-2025-39748",
"url": "https://bugzilla.suse.com/1249587"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_7_34-rt-1-150700.1.3.1.x86_64",
"SUSE Real Time Module 15 SP7:cluster-md-kmp-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:dlm-kmp-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:gfs2-kmp-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-devel-rt-6.4.0-150700.7.34.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-rt-devel-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-source-rt-6.4.0-150700.7.34.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-syms-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:ocfs2-kmp-rt-6.4.0-150700.7.34.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_7_34-rt-1-150700.1.3.1.x86_64",
"SUSE Real Time Module 15 SP7:cluster-md-kmp-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:dlm-kmp-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:gfs2-kmp-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-devel-rt-6.4.0-150700.7.34.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-rt-devel-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-source-rt-6.4.0-150700.7.34.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-syms-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:ocfs2-kmp-rt-6.4.0-150700.7.34.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-03-23T09:09:02Z",
"details": "moderate"
}
],
"title": "CVE-2025-39748"
},
{
"cve": "CVE-2025-39817",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-39817"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nefivarfs: Fix slab-out-of-bounds in efivarfs_d_compare\n\nObserved on kernel 6.6 (present on master as well):\n\n BUG: KASAN: slab-out-of-bounds in memcmp+0x98/0xd0\n Call trace:\n kasan_check_range+0xe8/0x190\n __asan_loadN+0x1c/0x28\n memcmp+0x98/0xd0\n efivarfs_d_compare+0x68/0xd8\n __d_lookup_rcu_op_compare+0x178/0x218\n __d_lookup_rcu+0x1f8/0x228\n d_alloc_parallel+0x150/0x648\n lookup_open.isra.0+0x5f0/0x8d0\n open_last_lookups+0x264/0x828\n path_openat+0x130/0x3f8\n do_filp_open+0x114/0x248\n do_sys_openat2+0x340/0x3c0\n __arm64_sys_openat+0x120/0x1a0\n\nIf dentry-\u003ed_name.len \u003c EFI_VARIABLE_GUID_LEN , \u0027guid\u0027 can become\nnegative, leadings to oob. The issue can be triggered by parallel\nlookups using invalid filename:\n\n T1\t\t\tT2\n lookup_open\n -\u003elookup\n simple_lookup\n d_add\n // invalid dentry is added to hash list\n\n\t\t\tlookup_open\n\t\t\t d_alloc_parallel\n\t\t\t __d_lookup_rcu\n\t\t\t __d_lookup_rcu_op_compare\n\t\t\t hlist_bl_for_each_entry_rcu\n\t\t\t // invalid dentry can be retrieved\n\t\t\t -\u003ed_compare\n\t\t\t efivarfs_d_compare\n\t\t\t // oob\n\nFix it by checking \u0027guid\u0027 before cmp.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_7_34-rt-1-150700.1.3.1.x86_64",
"SUSE Real Time Module 15 SP7:cluster-md-kmp-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:dlm-kmp-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:gfs2-kmp-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-devel-rt-6.4.0-150700.7.34.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-rt-devel-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-source-rt-6.4.0-150700.7.34.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-syms-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:ocfs2-kmp-rt-6.4.0-150700.7.34.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-39817",
"url": "https://www.suse.com/security/cve/CVE-2025-39817"
},
{
"category": "external",
"summary": "SUSE Bug 1249998 for CVE-2025-39817",
"url": "https://bugzilla.suse.com/1249998"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_7_34-rt-1-150700.1.3.1.x86_64",
"SUSE Real Time Module 15 SP7:cluster-md-kmp-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:dlm-kmp-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:gfs2-kmp-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-devel-rt-6.4.0-150700.7.34.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-rt-devel-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-source-rt-6.4.0-150700.7.34.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-syms-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:ocfs2-kmp-rt-6.4.0-150700.7.34.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_7_34-rt-1-150700.1.3.1.x86_64",
"SUSE Real Time Module 15 SP7:cluster-md-kmp-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:dlm-kmp-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:gfs2-kmp-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-devel-rt-6.4.0-150700.7.34.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-rt-devel-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-source-rt-6.4.0-150700.7.34.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-syms-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:ocfs2-kmp-rt-6.4.0-150700.7.34.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-03-23T09:09:02Z",
"details": "moderate"
}
],
"title": "CVE-2025-39817"
},
{
"cve": "CVE-2025-39964",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-39964"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\ncrypto: af_alg - Disallow concurrent writes in af_alg_sendmsg\n\nIssuing two writes to the same af_alg socket is bogus as the\ndata will be interleaved in an unpredictable fashion. Furthermore,\nconcurrent writes may create inconsistencies in the internal\nsocket state.\n\nDisallow this by adding a new ctx-\u003ewrite field that indiciates\nexclusive ownership for writing.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_7_34-rt-1-150700.1.3.1.x86_64",
"SUSE Real Time Module 15 SP7:cluster-md-kmp-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:dlm-kmp-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:gfs2-kmp-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-devel-rt-6.4.0-150700.7.34.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-rt-devel-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-source-rt-6.4.0-150700.7.34.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-syms-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:ocfs2-kmp-rt-6.4.0-150700.7.34.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-39964",
"url": "https://www.suse.com/security/cve/CVE-2025-39964"
},
{
"category": "external",
"summary": "SUSE Bug 1251966 for CVE-2025-39964",
"url": "https://bugzilla.suse.com/1251966"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_7_34-rt-1-150700.1.3.1.x86_64",
"SUSE Real Time Module 15 SP7:cluster-md-kmp-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:dlm-kmp-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:gfs2-kmp-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-devel-rt-6.4.0-150700.7.34.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-rt-devel-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-source-rt-6.4.0-150700.7.34.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-syms-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:ocfs2-kmp-rt-6.4.0-150700.7.34.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_7_34-rt-1-150700.1.3.1.x86_64",
"SUSE Real Time Module 15 SP7:cluster-md-kmp-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:dlm-kmp-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:gfs2-kmp-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-devel-rt-6.4.0-150700.7.34.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-rt-devel-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-source-rt-6.4.0-150700.7.34.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-syms-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:ocfs2-kmp-rt-6.4.0-150700.7.34.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-03-23T09:09:02Z",
"details": "moderate"
}
],
"title": "CVE-2025-39964"
},
{
"cve": "CVE-2025-40099",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40099"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\ncifs: parse_dfs_referrals: prevent oob on malformed input\n\nMalicious SMB server can send invalid reply to FSCTL_DFS_GET_REFERRALS\n\n- reply smaller than sizeof(struct get_dfs_referral_rsp)\n- reply with number of referrals smaller than NumberOfReferrals in the\nheader\n\nProcessing of such replies will cause oob.\n\nReturn -EINVAL error on such replies to prevent oob-s.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_7_34-rt-1-150700.1.3.1.x86_64",
"SUSE Real Time Module 15 SP7:cluster-md-kmp-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:dlm-kmp-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:gfs2-kmp-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-devel-rt-6.4.0-150700.7.34.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-rt-devel-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-source-rt-6.4.0-150700.7.34.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-syms-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:ocfs2-kmp-rt-6.4.0-150700.7.34.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40099",
"url": "https://www.suse.com/security/cve/CVE-2025-40099"
},
{
"category": "external",
"summary": "SUSE Bug 1252911 for CVE-2025-40099",
"url": "https://bugzilla.suse.com/1252911"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_7_34-rt-1-150700.1.3.1.x86_64",
"SUSE Real Time Module 15 SP7:cluster-md-kmp-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:dlm-kmp-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:gfs2-kmp-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-devel-rt-6.4.0-150700.7.34.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-rt-devel-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-source-rt-6.4.0-150700.7.34.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-syms-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:ocfs2-kmp-rt-6.4.0-150700.7.34.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_7_34-rt-1-150700.1.3.1.x86_64",
"SUSE Real Time Module 15 SP7:cluster-md-kmp-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:dlm-kmp-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:gfs2-kmp-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-devel-rt-6.4.0-150700.7.34.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-rt-devel-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-source-rt-6.4.0-150700.7.34.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-syms-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:ocfs2-kmp-rt-6.4.0-150700.7.34.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-03-23T09:09:02Z",
"details": "moderate"
}
],
"title": "CVE-2025-40099"
},
{
"cve": "CVE-2025-40103",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40103"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nsmb: client: Fix refcount leak for cifs_sb_tlink\n\nFix three refcount inconsistency issues related to `cifs_sb_tlink`.\n\nComments for `cifs_sb_tlink` state that `cifs_put_tlink()` needs to be\ncalled after successful calls to `cifs_sb_tlink()`. Three calls fail to\nupdate refcount accordingly, leading to possible resource leaks.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_7_34-rt-1-150700.1.3.1.x86_64",
"SUSE Real Time Module 15 SP7:cluster-md-kmp-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:dlm-kmp-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:gfs2-kmp-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-devel-rt-6.4.0-150700.7.34.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-rt-devel-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-source-rt-6.4.0-150700.7.34.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-syms-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:ocfs2-kmp-rt-6.4.0-150700.7.34.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40103",
"url": "https://www.suse.com/security/cve/CVE-2025-40103"
},
{
"category": "external",
"summary": "SUSE Bug 1252924 for CVE-2025-40103",
"url": "https://bugzilla.suse.com/1252924"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_7_34-rt-1-150700.1.3.1.x86_64",
"SUSE Real Time Module 15 SP7:cluster-md-kmp-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:dlm-kmp-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:gfs2-kmp-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-devel-rt-6.4.0-150700.7.34.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-rt-devel-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-source-rt-6.4.0-150700.7.34.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-syms-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:ocfs2-kmp-rt-6.4.0-150700.7.34.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 3.3,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_7_34-rt-1-150700.1.3.1.x86_64",
"SUSE Real Time Module 15 SP7:cluster-md-kmp-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:dlm-kmp-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:gfs2-kmp-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-devel-rt-6.4.0-150700.7.34.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-rt-devel-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-source-rt-6.4.0-150700.7.34.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-syms-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:ocfs2-kmp-rt-6.4.0-150700.7.34.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-03-23T09:09:02Z",
"details": "low"
}
],
"title": "CVE-2025-40103"
},
{
"cve": "CVE-2025-40201",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40201"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nkernel/sys.c: fix the racy usage of task_lock(tsk-\u003egroup_leader) in sys_prlimit64() paths\n\nThe usage of task_lock(tsk-\u003egroup_leader) in sys_prlimit64()-\u003edo_prlimit()\npath is very broken.\n\nsys_prlimit64() does get_task_struct(tsk) but this only protects task_struct\nitself. If tsk != current and tsk is not a leader, this process can exit/exec\nand task_lock(tsk-\u003egroup_leader) may use the already freed task_struct.\n\nAnother problem is that sys_prlimit64() can race with mt-exec which changes\n-\u003egroup_leader. In this case do_prlimit() may take the wrong lock, or (worse)\n-\u003egroup_leader may change between task_lock() and task_unlock().\n\nChange sys_prlimit64() to take tasklist_lock when necessary. This is not\nnice, but I don\u0027t see a better fix for -stable.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_7_34-rt-1-150700.1.3.1.x86_64",
"SUSE Real Time Module 15 SP7:cluster-md-kmp-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:dlm-kmp-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:gfs2-kmp-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-devel-rt-6.4.0-150700.7.34.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-rt-devel-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-source-rt-6.4.0-150700.7.34.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-syms-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:ocfs2-kmp-rt-6.4.0-150700.7.34.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40201",
"url": "https://www.suse.com/security/cve/CVE-2025-40201"
},
{
"category": "external",
"summary": "SUSE Bug 1253455 for CVE-2025-40201",
"url": "https://bugzilla.suse.com/1253455"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_7_34-rt-1-150700.1.3.1.x86_64",
"SUSE Real Time Module 15 SP7:cluster-md-kmp-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:dlm-kmp-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:gfs2-kmp-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-devel-rt-6.4.0-150700.7.34.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-rt-devel-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-source-rt-6.4.0-150700.7.34.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-syms-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:ocfs2-kmp-rt-6.4.0-150700.7.34.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_7_34-rt-1-150700.1.3.1.x86_64",
"SUSE Real Time Module 15 SP7:cluster-md-kmp-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:dlm-kmp-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:gfs2-kmp-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-devel-rt-6.4.0-150700.7.34.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-rt-devel-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-source-rt-6.4.0-150700.7.34.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-syms-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:ocfs2-kmp-rt-6.4.0-150700.7.34.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-03-23T09:09:02Z",
"details": "moderate"
}
],
"title": "CVE-2025-40201"
},
{
"cve": "CVE-2025-40253",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40253"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\ns390/ctcm: Fix double-kfree\n\nThe function \u0027mpc_rcvd_sweep_req(mpcginfo)\u0027 is called conditionally\nfrom function \u0027ctcmpc_unpack_skb\u0027. It frees passed mpcginfo.\nAfter that a call to function \u0027kfree\u0027 in function \u0027ctcmpc_unpack_skb\u0027\nfrees it again.\n\nRemove \u0027kfree\u0027 call in function \u0027mpc_rcvd_sweep_req(mpcginfo)\u0027.\n\nBug detected by the clang static analyzer.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_7_34-rt-1-150700.1.3.1.x86_64",
"SUSE Real Time Module 15 SP7:cluster-md-kmp-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:dlm-kmp-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:gfs2-kmp-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-devel-rt-6.4.0-150700.7.34.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-rt-devel-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-source-rt-6.4.0-150700.7.34.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-syms-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:ocfs2-kmp-rt-6.4.0-150700.7.34.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40253",
"url": "https://www.suse.com/security/cve/CVE-2025-40253"
},
{
"category": "external",
"summary": "SUSE Bug 1255084 for CVE-2025-40253",
"url": "https://bugzilla.suse.com/1255084"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_7_34-rt-1-150700.1.3.1.x86_64",
"SUSE Real Time Module 15 SP7:cluster-md-kmp-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:dlm-kmp-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:gfs2-kmp-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-devel-rt-6.4.0-150700.7.34.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-rt-devel-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-source-rt-6.4.0-150700.7.34.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-syms-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:ocfs2-kmp-rt-6.4.0-150700.7.34.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_7_34-rt-1-150700.1.3.1.x86_64",
"SUSE Real Time Module 15 SP7:cluster-md-kmp-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:dlm-kmp-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:gfs2-kmp-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-devel-rt-6.4.0-150700.7.34.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-rt-devel-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-source-rt-6.4.0-150700.7.34.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-syms-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:ocfs2-kmp-rt-6.4.0-150700.7.34.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-03-23T09:09:02Z",
"details": "moderate"
}
],
"title": "CVE-2025-40253"
},
{
"cve": "CVE-2025-68283",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-68283"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nlibceph: replace BUG_ON with bounds check for map-\u003emax_osd\n\nOSD indexes come from untrusted network packets. Boundary checks are\nadded to validate these against map-\u003emax_osd.\n\n[ idryomov: drop BUG_ON in ceph_get_primary_affinity(), minor cosmetic\n edits ]",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_7_34-rt-1-150700.1.3.1.x86_64",
"SUSE Real Time Module 15 SP7:cluster-md-kmp-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:dlm-kmp-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:gfs2-kmp-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-devel-rt-6.4.0-150700.7.34.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-rt-devel-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-source-rt-6.4.0-150700.7.34.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-syms-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:ocfs2-kmp-rt-6.4.0-150700.7.34.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-68283",
"url": "https://www.suse.com/security/cve/CVE-2025-68283"
},
{
"category": "external",
"summary": "SUSE Bug 1255379 for CVE-2025-68283",
"url": "https://bugzilla.suse.com/1255379"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_7_34-rt-1-150700.1.3.1.x86_64",
"SUSE Real Time Module 15 SP7:cluster-md-kmp-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:dlm-kmp-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:gfs2-kmp-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-devel-rt-6.4.0-150700.7.34.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-rt-devel-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-source-rt-6.4.0-150700.7.34.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-syms-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:ocfs2-kmp-rt-6.4.0-150700.7.34.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:A/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_7_34-rt-1-150700.1.3.1.x86_64",
"SUSE Real Time Module 15 SP7:cluster-md-kmp-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:dlm-kmp-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:gfs2-kmp-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-devel-rt-6.4.0-150700.7.34.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-rt-devel-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-source-rt-6.4.0-150700.7.34.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-syms-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:ocfs2-kmp-rt-6.4.0-150700.7.34.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-03-23T09:09:02Z",
"details": "moderate"
}
],
"title": "CVE-2025-68283"
},
{
"cve": "CVE-2025-68295",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-68295"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nsmb: client: fix memory leak in cifs_construct_tcon()\n\nWhen having a multiuser mount with domain= specified and using\ncifscreds, cifs_set_cifscreds() will end up setting @ctx-\u003edomainname,\nso it needs to be freed before leaving cifs_construct_tcon().\n\nThis fixes the following memory leak reported by kmemleak:\n\n mount.cifs //srv/share /mnt -o domain=ZELDA,multiuser,...\n su - testuser\n cifscreds add -d ZELDA -u testuser\n ...\n ls /mnt/1\n ...\n umount /mnt\n echo scan \u003e /sys/kernel/debug/kmemleak\n cat /sys/kernel/debug/kmemleak\n unreferenced object 0xffff8881203c3f08 (size 8):\n comm \"ls\", pid 5060, jiffies 4307222943\n hex dump (first 8 bytes):\n 5a 45 4c 44 41 00 cc cc ZELDA...\n backtrace (crc d109a8cf):\n __kmalloc_node_track_caller_noprof+0x572/0x710\n kstrdup+0x3a/0x70\n cifs_sb_tlink+0x1209/0x1770 [cifs]\n cifs_get_fattr+0xe1/0xf50 [cifs]\n cifs_get_inode_info+0xb5/0x240 [cifs]\n cifs_revalidate_dentry_attr+0x2d1/0x470 [cifs]\n cifs_getattr+0x28e/0x450 [cifs]\n vfs_getattr_nosec+0x126/0x180\n vfs_statx+0xf6/0x220\n do_statx+0xab/0x110\n __x64_sys_statx+0xd5/0x130\n do_syscall_64+0xbb/0x380\n entry_SYSCALL_64_after_hwframe+0x77/0x7f",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_7_34-rt-1-150700.1.3.1.x86_64",
"SUSE Real Time Module 15 SP7:cluster-md-kmp-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:dlm-kmp-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:gfs2-kmp-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-devel-rt-6.4.0-150700.7.34.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-rt-devel-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-source-rt-6.4.0-150700.7.34.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-syms-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:ocfs2-kmp-rt-6.4.0-150700.7.34.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-68295",
"url": "https://www.suse.com/security/cve/CVE-2025-68295"
},
{
"category": "external",
"summary": "SUSE Bug 1255129 for CVE-2025-68295",
"url": "https://bugzilla.suse.com/1255129"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_7_34-rt-1-150700.1.3.1.x86_64",
"SUSE Real Time Module 15 SP7:cluster-md-kmp-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:dlm-kmp-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:gfs2-kmp-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-devel-rt-6.4.0-150700.7.34.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-rt-devel-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-source-rt-6.4.0-150700.7.34.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-syms-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:ocfs2-kmp-rt-6.4.0-150700.7.34.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_7_34-rt-1-150700.1.3.1.x86_64",
"SUSE Real Time Module 15 SP7:cluster-md-kmp-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:dlm-kmp-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:gfs2-kmp-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-devel-rt-6.4.0-150700.7.34.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-rt-devel-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-source-rt-6.4.0-150700.7.34.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-syms-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:ocfs2-kmp-rt-6.4.0-150700.7.34.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-03-23T09:09:02Z",
"details": "moderate"
}
],
"title": "CVE-2025-68295"
},
{
"cve": "CVE-2025-68374",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-68374"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nmd: fix rcu protection in md_wakeup_thread\n\nWe attempted to use RCU to protect the pointer \u0027thread\u0027, but directly\npassed the value when calling md_wakeup_thread(). This means that the\nRCU pointer has been acquired before rcu_read_lock(), which renders\nrcu_read_lock() ineffective and could lead to a use-after-free.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_7_34-rt-1-150700.1.3.1.x86_64",
"SUSE Real Time Module 15 SP7:cluster-md-kmp-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:dlm-kmp-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:gfs2-kmp-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-devel-rt-6.4.0-150700.7.34.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-rt-devel-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-source-rt-6.4.0-150700.7.34.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-syms-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:ocfs2-kmp-rt-6.4.0-150700.7.34.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-68374",
"url": "https://www.suse.com/security/cve/CVE-2025-68374"
},
{
"category": "external",
"summary": "SUSE Bug 1255530 for CVE-2025-68374",
"url": "https://bugzilla.suse.com/1255530"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_7_34-rt-1-150700.1.3.1.x86_64",
"SUSE Real Time Module 15 SP7:cluster-md-kmp-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:dlm-kmp-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:gfs2-kmp-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-devel-rt-6.4.0-150700.7.34.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-rt-devel-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-source-rt-6.4.0-150700.7.34.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-syms-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:ocfs2-kmp-rt-6.4.0-150700.7.34.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_7_34-rt-1-150700.1.3.1.x86_64",
"SUSE Real Time Module 15 SP7:cluster-md-kmp-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:dlm-kmp-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:gfs2-kmp-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-devel-rt-6.4.0-150700.7.34.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-rt-devel-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-source-rt-6.4.0-150700.7.34.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-syms-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:ocfs2-kmp-rt-6.4.0-150700.7.34.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-03-23T09:09:02Z",
"details": "moderate"
}
],
"title": "CVE-2025-68374"
},
{
"cve": "CVE-2025-68735",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-68735"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\ndrm/panthor: Prevent potential UAF in group creation\n\nThis commit prevents the possibility of a use after free issue in the\nGROUP_CREATE ioctl function, which arose as pointer to the group is\naccessed in that ioctl function after storing it in the Xarray.\nA malicious userspace can second guess the handle of a group and try\nto call GROUP_DESTROY ioctl from another thread around the same time\nas GROUP_CREATE ioctl.\n\nTo prevent the use after free exploit, this commit uses a mark on an\nentry of group pool Xarray which is added just before returning from\nthe GROUP_CREATE ioctl function. The mark is checked for all ioctls\nthat specify the group handle and so userspace won\u0027t be abe to delete\na group that isn\u0027t marked yet.\n\nv2: Add R-bs and fixes tags",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_7_34-rt-1-150700.1.3.1.x86_64",
"SUSE Real Time Module 15 SP7:cluster-md-kmp-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:dlm-kmp-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:gfs2-kmp-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-devel-rt-6.4.0-150700.7.34.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-rt-devel-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-source-rt-6.4.0-150700.7.34.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-syms-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:ocfs2-kmp-rt-6.4.0-150700.7.34.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-68735",
"url": "https://www.suse.com/security/cve/CVE-2025-68735"
},
{
"category": "external",
"summary": "SUSE Bug 1255811 for CVE-2025-68735",
"url": "https://bugzilla.suse.com/1255811"
},
{
"category": "external",
"summary": "SUSE Bug 1256251 for CVE-2025-68735",
"url": "https://bugzilla.suse.com/1256251"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_7_34-rt-1-150700.1.3.1.x86_64",
"SUSE Real Time Module 15 SP7:cluster-md-kmp-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:dlm-kmp-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:gfs2-kmp-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-devel-rt-6.4.0-150700.7.34.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-rt-devel-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-source-rt-6.4.0-150700.7.34.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-syms-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:ocfs2-kmp-rt-6.4.0-150700.7.34.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_7_34-rt-1-150700.1.3.1.x86_64",
"SUSE Real Time Module 15 SP7:cluster-md-kmp-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:dlm-kmp-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:gfs2-kmp-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-devel-rt-6.4.0-150700.7.34.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-rt-devel-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-source-rt-6.4.0-150700.7.34.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-syms-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:ocfs2-kmp-rt-6.4.0-150700.7.34.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-03-23T09:09:02Z",
"details": "important"
}
],
"title": "CVE-2025-68735"
},
{
"cve": "CVE-2025-68736",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-68736"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nlandlock: Fix handling of disconnected directories\n\nDisconnected files or directories can appear when they are visible and\nopened from a bind mount, but have been renamed or moved from the source\nof the bind mount in a way that makes them inaccessible from the mount\npoint (i.e. out of scope).\n\nPreviously, access rights tied to files or directories opened through a\ndisconnected directory were collected by walking the related hierarchy\ndown to the root of the filesystem, without taking into account the\nmount point because it couldn\u0027t be found. This could lead to\ninconsistent access results, potential access right widening, and\nhard-to-debug renames, especially since such paths cannot be printed.\n\nFor a sandboxed task to create a disconnected directory, it needs to\nhave write access (i.e. FS_MAKE_REG, FS_REMOVE_FILE, and FS_REFER) to\nthe underlying source of the bind mount, and read access to the related\nmount point. Because a sandboxed task cannot acquire more access\nrights than those defined by its Landlock domain, this could lead to\ninconsistent access rights due to missing permissions that should be\ninherited from the mount point hierarchy, while inheriting permissions\nfrom the filesystem hierarchy hidden by this mount point instead.\n\nLandlock now handles files and directories opened from disconnected\ndirectories by taking into account the filesystem hierarchy when the\nmount point is not found in the hierarchy walk, and also always taking\ninto account the mount point from which these disconnected directories\nwere opened. This ensures that a rename is not allowed if it would\nwiden access rights [1].\n\nThe rationale is that, even if disconnected hierarchies might not be\nvisible or accessible to a sandboxed task, relying on the collected\naccess rights from them improves the guarantee that access rights will\nnot be widened during a rename because of the access right comparison\nbetween the source and the destination (see LANDLOCK_ACCESS_FS_REFER).\nIt may look like this would grant more access on disconnected files and\ndirectories, but the security policies are always enforced for all the\nevaluated hierarchies. This new behavior should be less surprising to\nusers and safer from an access control perspective.\n\nRemove a wrong WARN_ON_ONCE() canary in collect_domain_accesses() and\nfix the related comment.\n\nBecause opened files have their access rights stored in the related file\nsecurity properties, there is no impact for disconnected or unlinked\nfiles.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_7_34-rt-1-150700.1.3.1.x86_64",
"SUSE Real Time Module 15 SP7:cluster-md-kmp-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:dlm-kmp-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:gfs2-kmp-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-devel-rt-6.4.0-150700.7.34.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-rt-devel-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-source-rt-6.4.0-150700.7.34.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-syms-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:ocfs2-kmp-rt-6.4.0-150700.7.34.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-68736",
"url": "https://www.suse.com/security/cve/CVE-2025-68736"
},
{
"category": "external",
"summary": "SUSE Bug 1255698 for CVE-2025-68736",
"url": "https://bugzilla.suse.com/1255698"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_7_34-rt-1-150700.1.3.1.x86_64",
"SUSE Real Time Module 15 SP7:cluster-md-kmp-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:dlm-kmp-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:gfs2-kmp-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-devel-rt-6.4.0-150700.7.34.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-rt-devel-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-source-rt-6.4.0-150700.7.34.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-syms-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:ocfs2-kmp-rt-6.4.0-150700.7.34.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.7,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:N",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_7_34-rt-1-150700.1.3.1.x86_64",
"SUSE Real Time Module 15 SP7:cluster-md-kmp-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:dlm-kmp-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:gfs2-kmp-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-devel-rt-6.4.0-150700.7.34.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-rt-devel-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-source-rt-6.4.0-150700.7.34.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-syms-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:ocfs2-kmp-rt-6.4.0-150700.7.34.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-03-23T09:09:02Z",
"details": "moderate"
}
],
"title": "CVE-2025-68736"
},
{
"cve": "CVE-2025-68778",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-68778"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nbtrfs: don\u0027t log conflicting inode if it\u0027s a dir moved in the current transaction\n\nWe can\u0027t log a conflicting inode if it\u0027s a directory and it was moved\nfrom one parent directory to another parent directory in the current\ntransaction, as this can result an attempt to have a directory with\ntwo hard links during log replay, one for the old parent directory and\nanother for the new parent directory.\n\nThe following scenario triggers that issue:\n\n1) We have directories \"dir1\" and \"dir2\" created in a past transaction.\n Directory \"dir1\" has inode A as its parent directory;\n\n2) We move \"dir1\" to some other directory;\n\n3) We create a file with the name \"dir1\" in directory inode A;\n\n4) We fsync the new file. This results in logging the inode of the new file\n and the inode for the directory \"dir1\" that was previously moved in the\n current transaction. So the log tree has the INODE_REF item for the\n new location of \"dir1\";\n\n5) We move the new file to some other directory. This results in updating\n the log tree to included the new INODE_REF for the new location of the\n file and removes the INODE_REF for the old location. This happens\n during the rename when we call btrfs_log_new_name();\n\n6) We fsync the file, and that persists the log tree changes done in the\n previous step (btrfs_log_new_name() only updates the log tree in\n memory);\n\n7) We have a power failure;\n\n8) Next time the fs is mounted, log replay happens and when processing\n the inode for directory \"dir1\" we find a new INODE_REF and add that\n link, but we don\u0027t remove the old link of the inode since we have\n not logged the old parent directory of the directory inode \"dir1\".\n\nAs a result after log replay finishes when we trigger writeback of the\nsubvolume tree\u0027s extent buffers, the tree check will detect that we have\na directory a hard link count of 2 and we get a mount failure.\nThe errors and stack traces reported in dmesg/syslog are like this:\n\n [ 3845.729764] BTRFS info (device dm-0): start tree-log replay\n [ 3845.730304] page: refcount:3 mapcount:0 mapping:000000005c8a3027 index:0x1d00 pfn:0x11510c\n [ 3845.731236] memcg:ffff9264c02f4e00\n [ 3845.731751] aops:btree_aops [btrfs] ino:1\n [ 3845.732300] flags: 0x17fffc00000400a(uptodate|private|writeback|node=0|zone=2|lastcpupid=0x1ffff)\n [ 3845.733346] raw: 017fffc00000400a 0000000000000000 dead000000000122 ffff9264d978aea8\n [ 3845.734265] raw: 0000000000001d00 ffff92650e6d4738 00000003ffffffff ffff9264c02f4e00\n [ 3845.735305] page dumped because: eb page dump\n [ 3845.735981] BTRFS critical (device dm-0): corrupt leaf: root=5 block=30408704 slot=6 ino=257, invalid nlink: has 2 expect no more than 1 for dir\n [ 3845.737786] BTRFS info (device dm-0): leaf 30408704 gen 10 total ptrs 17 free space 14881 owner 5\n [ 3845.737789] BTRFS info (device dm-0): refs 4 lock_owner 0 current 30701\n [ 3845.737792] \titem 0 key (256 INODE_ITEM 0) itemoff 16123 itemsize 160\n [ 3845.737794] \t\tinode generation 3 transid 9 size 16 nbytes 16384\n [ 3845.737795] \t\tblock group 0 mode 40755 links 1 uid 0 gid 0\n [ 3845.737797] \t\trdev 0 sequence 2 flags 0x0\n [ 3845.737798] \t\tatime 1764259517.0\n [ 3845.737800] \t\tctime 1764259517.572889464\n [ 3845.737801] \t\tmtime 1764259517.572889464\n [ 3845.737802] \t\totime 1764259517.0\n [ 3845.737803] \titem 1 key (256 INODE_REF 256) itemoff 16111 itemsize 12\n [ 3845.737805] \t\tindex 0 name_len 2\n [ 3845.737807] \titem 2 key (256 DIR_ITEM 2363071922) itemoff 16077 itemsize 34\n [ 3845.737808] \t\tlocation key (257 1 0) type 2\n [ 3845.737810] \t\ttransid 9 data_len 0 name_len 4\n [ 3845.737811] \titem 3 key (256 DIR_ITEM 2676584006) itemoff 16043 itemsize 34\n [ 3845.737813] \t\tlocation key (258 1 0) type 2\n [ 3845.737814] \t\ttransid 9 data_len 0 name_len 4\n [ 3845.737815] \titem 4 key (256 DIR_INDEX 2) itemoff 16009 itemsize 34\n [ 3845.737816] \t\tlocation key (257 1 0) type 2\n [\n---truncated---",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_7_34-rt-1-150700.1.3.1.x86_64",
"SUSE Real Time Module 15 SP7:cluster-md-kmp-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:dlm-kmp-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:gfs2-kmp-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-devel-rt-6.4.0-150700.7.34.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-rt-devel-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-source-rt-6.4.0-150700.7.34.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-syms-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:ocfs2-kmp-rt-6.4.0-150700.7.34.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-68778",
"url": "https://www.suse.com/security/cve/CVE-2025-68778"
},
{
"category": "external",
"summary": "SUSE Bug 1256683 for CVE-2025-68778",
"url": "https://bugzilla.suse.com/1256683"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_7_34-rt-1-150700.1.3.1.x86_64",
"SUSE Real Time Module 15 SP7:cluster-md-kmp-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:dlm-kmp-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:gfs2-kmp-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-devel-rt-6.4.0-150700.7.34.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-rt-devel-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-source-rt-6.4.0-150700.7.34.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-syms-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:ocfs2-kmp-rt-6.4.0-150700.7.34.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.7,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_7_34-rt-1-150700.1.3.1.x86_64",
"SUSE Real Time Module 15 SP7:cluster-md-kmp-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:dlm-kmp-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:gfs2-kmp-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-devel-rt-6.4.0-150700.7.34.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-rt-devel-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-source-rt-6.4.0-150700.7.34.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-syms-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:ocfs2-kmp-rt-6.4.0-150700.7.34.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-03-23T09:09:02Z",
"details": "moderate"
}
],
"title": "CVE-2025-68778"
},
{
"cve": "CVE-2025-68785",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-68785"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nnet: openvswitch: fix middle attribute validation in push_nsh() action\n\nThe push_nsh() action structure looks like this:\n\n OVS_ACTION_ATTR_PUSH_NSH(OVS_KEY_ATTR_NSH(OVS_NSH_KEY_ATTR_BASE,...))\n\nThe outermost OVS_ACTION_ATTR_PUSH_NSH attribute is OK\u0027ed by the\nnla_for_each_nested() inside __ovs_nla_copy_actions(). The innermost\nOVS_NSH_KEY_ATTR_BASE/MD1/MD2 are OK\u0027ed by the nla_for_each_nested()\ninside nsh_key_put_from_nlattr(). But nothing checks if the attribute\nin the middle is OK. We don\u0027t even check that this attribute is the\nOVS_KEY_ATTR_NSH. We just do a double unwrap with a pair of nla_data()\ncalls - first time directly while calling validate_push_nsh() and the\nsecond time as part of the nla_for_each_nested() macro, which isn\u0027t\nsafe, potentially causing invalid memory access if the size of this\nattribute is incorrect. The failure may not be noticed during\nvalidation due to larger netlink buffer, but cause trouble later during\naction execution where the buffer is allocated exactly to the size:\n\n BUG: KASAN: slab-out-of-bounds in nsh_hdr_from_nlattr+0x1dd/0x6a0 [openvswitch]\n Read of size 184 at addr ffff88816459a634 by task a.out/22624\n\n CPU: 8 UID: 0 PID: 22624 6.18.0-rc7+ #115 PREEMPT(voluntary)\n Call Trace:\n \u003cTASK\u003e\n dump_stack_lvl+0x51/0x70\n print_address_description.constprop.0+0x2c/0x390\n kasan_report+0xdd/0x110\n kasan_check_range+0x35/0x1b0\n __asan_memcpy+0x20/0x60\n nsh_hdr_from_nlattr+0x1dd/0x6a0 [openvswitch]\n push_nsh+0x82/0x120 [openvswitch]\n do_execute_actions+0x1405/0x2840 [openvswitch]\n ovs_execute_actions+0xd5/0x3b0 [openvswitch]\n ovs_packet_cmd_execute+0x949/0xdb0 [openvswitch]\n genl_family_rcv_msg_doit+0x1d6/0x2b0\n genl_family_rcv_msg+0x336/0x580\n genl_rcv_msg+0x9f/0x130\n netlink_rcv_skb+0x11f/0x370\n genl_rcv+0x24/0x40\n netlink_unicast+0x73e/0xaa0\n netlink_sendmsg+0x744/0xbf0\n __sys_sendto+0x3d6/0x450\n do_syscall_64+0x79/0x2c0\n entry_SYSCALL_64_after_hwframe+0x76/0x7e\n \u003c/TASK\u003e\n\nLet\u0027s add some checks that the attribute is properly sized and it\u0027s\nthe only one attribute inside the action. Technically, there is no\nreal reason for OVS_KEY_ATTR_NSH to be there, as we know that we\u0027re\npushing an NSH header already, it just creates extra nesting, but\nthat\u0027s how uAPI works today. So, keeping as it is.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_7_34-rt-1-150700.1.3.1.x86_64",
"SUSE Real Time Module 15 SP7:cluster-md-kmp-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:dlm-kmp-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:gfs2-kmp-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-devel-rt-6.4.0-150700.7.34.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-rt-devel-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-source-rt-6.4.0-150700.7.34.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-syms-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:ocfs2-kmp-rt-6.4.0-150700.7.34.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-68785",
"url": "https://www.suse.com/security/cve/CVE-2025-68785"
},
{
"category": "external",
"summary": "SUSE Bug 1256640 for CVE-2025-68785",
"url": "https://bugzilla.suse.com/1256640"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_7_34-rt-1-150700.1.3.1.x86_64",
"SUSE Real Time Module 15 SP7:cluster-md-kmp-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:dlm-kmp-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:gfs2-kmp-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-devel-rt-6.4.0-150700.7.34.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-rt-devel-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-source-rt-6.4.0-150700.7.34.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-syms-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:ocfs2-kmp-rt-6.4.0-150700.7.34.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.7,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_7_34-rt-1-150700.1.3.1.x86_64",
"SUSE Real Time Module 15 SP7:cluster-md-kmp-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:dlm-kmp-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:gfs2-kmp-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-devel-rt-6.4.0-150700.7.34.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-rt-devel-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-source-rt-6.4.0-150700.7.34.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-syms-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:ocfs2-kmp-rt-6.4.0-150700.7.34.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-03-23T09:09:02Z",
"details": "moderate"
}
],
"title": "CVE-2025-68785"
},
{
"cve": "CVE-2025-68810",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-68810"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nKVM: Disallow toggling KVM_MEM_GUEST_MEMFD on an existing memslot\n\nReject attempts to disable KVM_MEM_GUEST_MEMFD on a memslot that was\ninitially created with a guest_memfd binding, as KVM doesn\u0027t support\ntoggling KVM_MEM_GUEST_MEMFD on existing memslots. KVM prevents enabling\nKVM_MEM_GUEST_MEMFD, but doesn\u0027t prevent clearing the flag.\n\nFailure to reject the new memslot results in a use-after-free due to KVM\nnot unbinding from the guest_memfd instance. Unbinding on a FLAGS_ONLY\nchange is easy enough, and can/will be done as a hardening measure (in\nanticipation of KVM supporting dirty logging on guest_memfd at some point),\nbut fixing the use-after-free would only address the immediate symptom.\n\n ==================================================================\n BUG: KASAN: slab-use-after-free in kvm_gmem_release+0x362/0x400 [kvm]\n Write of size 8 at addr ffff8881111ae908 by task repro/745\n\n CPU: 7 UID: 1000 PID: 745 Comm: repro Not tainted 6.18.0-rc6-115d5de2eef3-next-kasan #3 NONE\n Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 0.0.0 02/06/2015\n Call Trace:\n \u003cTASK\u003e\n dump_stack_lvl+0x51/0x60\n print_report+0xcb/0x5c0\n kasan_report+0xb4/0xe0\n kvm_gmem_release+0x362/0x400 [kvm]\n __fput+0x2fa/0x9d0\n task_work_run+0x12c/0x200\n do_exit+0x6ae/0x2100\n do_group_exit+0xa8/0x230\n __x64_sys_exit_group+0x3a/0x50\n x64_sys_call+0x737/0x740\n do_syscall_64+0x5b/0x900\n entry_SYSCALL_64_after_hwframe+0x4b/0x53\n RIP: 0033:0x7f581f2eac31\n \u003c/TASK\u003e\n\n Allocated by task 745 on cpu 6 at 9.746971s:\n kasan_save_stack+0x20/0x40\n kasan_save_track+0x13/0x50\n __kasan_kmalloc+0x77/0x90\n kvm_set_memory_region.part.0+0x652/0x1110 [kvm]\n kvm_vm_ioctl+0x14b0/0x3290 [kvm]\n __x64_sys_ioctl+0x129/0x1a0\n do_syscall_64+0x5b/0x900\n entry_SYSCALL_64_after_hwframe+0x4b/0x53\n\n Freed by task 745 on cpu 6 at 9.747467s:\n kasan_save_stack+0x20/0x40\n kasan_save_track+0x13/0x50\n __kasan_save_free_info+0x37/0x50\n __kasan_slab_free+0x3b/0x60\n kfree+0xf5/0x440\n kvm_set_memslot+0x3c2/0x1160 [kvm]\n kvm_set_memory_region.part.0+0x86a/0x1110 [kvm]\n kvm_vm_ioctl+0x14b0/0x3290 [kvm]\n __x64_sys_ioctl+0x129/0x1a0\n do_syscall_64+0x5b/0x900\n entry_SYSCALL_64_after_hwframe+0x4b/0x53",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_7_34-rt-1-150700.1.3.1.x86_64",
"SUSE Real Time Module 15 SP7:cluster-md-kmp-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:dlm-kmp-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:gfs2-kmp-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-devel-rt-6.4.0-150700.7.34.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-rt-devel-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-source-rt-6.4.0-150700.7.34.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-syms-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:ocfs2-kmp-rt-6.4.0-150700.7.34.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-68810",
"url": "https://www.suse.com/security/cve/CVE-2025-68810"
},
{
"category": "external",
"summary": "SUSE Bug 1256679 for CVE-2025-68810",
"url": "https://bugzilla.suse.com/1256679"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_7_34-rt-1-150700.1.3.1.x86_64",
"SUSE Real Time Module 15 SP7:cluster-md-kmp-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:dlm-kmp-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:gfs2-kmp-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-devel-rt-6.4.0-150700.7.34.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-rt-devel-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-source-rt-6.4.0-150700.7.34.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-syms-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:ocfs2-kmp-rt-6.4.0-150700.7.34.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_7_34-rt-1-150700.1.3.1.x86_64",
"SUSE Real Time Module 15 SP7:cluster-md-kmp-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:dlm-kmp-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:gfs2-kmp-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-devel-rt-6.4.0-150700.7.34.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-rt-devel-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-source-rt-6.4.0-150700.7.34.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-syms-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:ocfs2-kmp-rt-6.4.0-150700.7.34.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-03-23T09:09:02Z",
"details": "moderate"
}
],
"title": "CVE-2025-68810"
},
{
"cve": "CVE-2025-71071",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-71071"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\niommu/mediatek: fix use-after-free on probe deferral\n\nThe driver is dropping the references taken to the larb devices during\nprobe after successful lookup as well as on errors. This can\npotentially lead to a use-after-free in case a larb device has not yet\nbeen bound to its driver so that the iommu driver probe defers.\n\nFix this by keeping the references as expected while the iommu driver is\nbound.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_7_34-rt-1-150700.1.3.1.x86_64",
"SUSE Real Time Module 15 SP7:cluster-md-kmp-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:dlm-kmp-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:gfs2-kmp-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-devel-rt-6.4.0-150700.7.34.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-rt-devel-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-source-rt-6.4.0-150700.7.34.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-syms-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:ocfs2-kmp-rt-6.4.0-150700.7.34.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-71071",
"url": "https://www.suse.com/security/cve/CVE-2025-71071"
},
{
"category": "external",
"summary": "SUSE Bug 1256802 for CVE-2025-71071",
"url": "https://bugzilla.suse.com/1256802"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_7_34-rt-1-150700.1.3.1.x86_64",
"SUSE Real Time Module 15 SP7:cluster-md-kmp-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:dlm-kmp-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:gfs2-kmp-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-devel-rt-6.4.0-150700.7.34.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-rt-devel-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-source-rt-6.4.0-150700.7.34.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-syms-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:ocfs2-kmp-rt-6.4.0-150700.7.34.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.7,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:L/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_7_34-rt-1-150700.1.3.1.x86_64",
"SUSE Real Time Module 15 SP7:cluster-md-kmp-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:dlm-kmp-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:gfs2-kmp-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-devel-rt-6.4.0-150700.7.34.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-rt-devel-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-source-rt-6.4.0-150700.7.34.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-syms-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:ocfs2-kmp-rt-6.4.0-150700.7.34.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-03-23T09:09:02Z",
"details": "moderate"
}
],
"title": "CVE-2025-71071"
},
{
"cve": "CVE-2025-71104",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-71104"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nKVM: x86: Fix VM hard lockup after prolonged inactivity with periodic HV timer\n\nWhen advancing the target expiration for the guest\u0027s APIC timer in periodic\nmode, set the expiration to \"now\" if the target expiration is in the past\n(similar to what is done in update_target_expiration()). Blindly adding\nthe period to the previous target expiration can result in KVM generating\na practically unbounded number of hrtimer IRQs due to programming an\nexpired timer over and over. In extreme scenarios, e.g. if userspace\npauses/suspends a VM for an extended duration, this can even cause hard\nlockups in the host.\n\nCurrently, the bug only affects Intel CPUs when using the hypervisor timer\n(HV timer), a.k.a. the VMX preemption timer. Unlike the software timer,\na.k.a. hrtimer, which KVM keeps running even on exits to userspace, the\nHV timer only runs while the guest is active. As a result, if the vCPU\ndoes not run for an extended duration, there will be a huge gap between\nthe target expiration and the current time the vCPU resumes running.\nBecause the target expiration is incremented by only one period on each\ntimer expiration, this leads to a series of timer expirations occurring\nrapidly after the vCPU/VM resumes.\n\nMore critically, when the vCPU first triggers a periodic HV timer\nexpiration after resuming, advancing the expiration by only one period\nwill result in a target expiration in the past. As a result, the delta\nmay be calculated as a negative value. When the delta is converted into\nan absolute value (tscdeadline is an unsigned u64), the resulting value\ncan overflow what the HV timer is capable of programming. I.e. the large\nvalue will exceed the VMX Preemption Timer\u0027s maximum bit width of\ncpu_preemption_timer_multi + 32, and thus cause KVM to switch from the\nHV timer to the software timer (hrtimers).\n\nAfter switching to the software timer, periodic timer expiration callbacks\nmay be executed consecutively within a single clock interrupt handler,\nbecause hrtimers honors KVM\u0027s request for an expiration in the past and\nimmediately re-invokes KVM\u0027s callback after reprogramming. And because\nthe interrupt handler runs with IRQs disabled, restarting KVM\u0027s hrtimer\nover and over until the target expiration is advanced to \"now\" can result\nin a hard lockup.\n\nE.g. the following hard lockup was triggered in the host when running a\nWindows VM (only relevant because it used the APIC timer in periodic mode)\nafter resuming the VM from a long suspend (in the host).\n\n NMI watchdog: Watchdog detected hard LOCKUP on cpu 45\n ...\n RIP: 0010:advance_periodic_target_expiration+0x4d/0x80 [kvm]\n ...\n RSP: 0018:ff4f88f5d98d8ef0 EFLAGS: 00000046\n RAX: fff0103f91be678e RBX: fff0103f91be678e RCX: 00843a7d9e127bcc\n RDX: 0000000000000002 RSI: 0052ca4003697505 RDI: ff440d5bfbdbd500\n RBP: ff440d5956f99200 R08: ff2ff2a42deb6a84 R09: 000000000002a6c0\n R10: 0122d794016332b3 R11: 0000000000000000 R12: ff440db1af39cfc0\n R13: ff440db1af39cfc0 R14: ffffffffc0d4a560 R15: ff440db1af39d0f8\n FS: 00007f04a6ffd700(0000) GS:ff440db1af380000(0000) knlGS:000000e38a3b8000\n CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033\n CR2: 000000d5651feff8 CR3: 000000684e038002 CR4: 0000000000773ee0\n PKRU: 55555554\n Call Trace:\n \u003cIRQ\u003e\n apic_timer_fn+0x31/0x50 [kvm]\n __hrtimer_run_queues+0x100/0x280\n hrtimer_interrupt+0x100/0x210\n ? ttwu_do_wakeup+0x19/0x160\n smp_apic_timer_interrupt+0x6a/0x130\n apic_timer_interrupt+0xf/0x20\n \u003c/IRQ\u003e\n\nMoreover, if the suspend duration of the virtual machine is not long enough\nto trigger a hard lockup in this scenario, since commit 98c25ead5eda\n(\"KVM: VMX: Move preemption timer \u003c=\u003e hrtimer dance to common x86\"), KVM\nwill continue using the software timer until the guest reprograms the APIC\ntimer in some way. Since the periodic timer does not require frequent APIC\ntimer register programming, the guest may continue to use the software\ntimer in \n---truncated---",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_7_34-rt-1-150700.1.3.1.x86_64",
"SUSE Real Time Module 15 SP7:cluster-md-kmp-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:dlm-kmp-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:gfs2-kmp-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-devel-rt-6.4.0-150700.7.34.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-rt-devel-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-source-rt-6.4.0-150700.7.34.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-syms-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:ocfs2-kmp-rt-6.4.0-150700.7.34.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-71104",
"url": "https://www.suse.com/security/cve/CVE-2025-71104"
},
{
"category": "external",
"summary": "SUSE Bug 1256708 for CVE-2025-71104",
"url": "https://bugzilla.suse.com/1256708"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_7_34-rt-1-150700.1.3.1.x86_64",
"SUSE Real Time Module 15 SP7:cluster-md-kmp-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:dlm-kmp-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:gfs2-kmp-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-devel-rt-6.4.0-150700.7.34.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-rt-devel-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-source-rt-6.4.0-150700.7.34.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-syms-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:ocfs2-kmp-rt-6.4.0-150700.7.34.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_7_34-rt-1-150700.1.3.1.x86_64",
"SUSE Real Time Module 15 SP7:cluster-md-kmp-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:dlm-kmp-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:gfs2-kmp-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-devel-rt-6.4.0-150700.7.34.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-rt-devel-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-source-rt-6.4.0-150700.7.34.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-syms-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:ocfs2-kmp-rt-6.4.0-150700.7.34.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-03-23T09:09:02Z",
"details": "moderate"
}
],
"title": "CVE-2025-71104"
},
{
"cve": "CVE-2025-71113",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-71113"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\ncrypto: af_alg - zero initialize memory allocated via sock_kmalloc\n\nSeveral crypto user API contexts and requests allocated with\nsock_kmalloc() were left uninitialized, relying on callers to\nset fields explicitly. This resulted in the use of uninitialized\ndata in certain error paths or when new fields are added in the\nfuture.\n\nThe ACVP patches also contain two user-space interface files:\nalgif_kpp.c and algif_akcipher.c. These too rely on proper\ninitialization of their context structures.\n\nA particular issue has been observed with the newly added\n\u0027inflight\u0027 variable introduced in af_alg_ctx by commit:\n\n 67b164a871af (\"crypto: af_alg - Disallow multiple in-flight AIO requests\")\n\nBecause the context is not memset to zero after allocation,\nthe inflight variable has contained garbage values. As a result,\naf_alg_alloc_areq() has incorrectly returned -EBUSY randomly when\nthe garbage value was interpreted as true:\n\n https://github.com/gregkh/linux/blame/master/crypto/af_alg.c#L1209\n\nThe check directly tests ctx-\u003einflight without explicitly\ncomparing against true/false. Since inflight is only ever set to\ntrue or false later, an uninitialized value has triggered\n-EBUSY failures. Zero-initializing memory allocated with\nsock_kmalloc() ensures inflight and other fields start in a known\nstate, removing random issues caused by uninitialized data.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_7_34-rt-1-150700.1.3.1.x86_64",
"SUSE Real Time Module 15 SP7:cluster-md-kmp-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:dlm-kmp-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:gfs2-kmp-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-devel-rt-6.4.0-150700.7.34.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-rt-devel-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-source-rt-6.4.0-150700.7.34.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-syms-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:ocfs2-kmp-rt-6.4.0-150700.7.34.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-71113",
"url": "https://www.suse.com/security/cve/CVE-2025-71113"
},
{
"category": "external",
"summary": "SUSE Bug 1256716 for CVE-2025-71113",
"url": "https://bugzilla.suse.com/1256716"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_7_34-rt-1-150700.1.3.1.x86_64",
"SUSE Real Time Module 15 SP7:cluster-md-kmp-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:dlm-kmp-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:gfs2-kmp-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-devel-rt-6.4.0-150700.7.34.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-rt-devel-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-source-rt-6.4.0-150700.7.34.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-syms-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:ocfs2-kmp-rt-6.4.0-150700.7.34.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.6,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_7_34-rt-1-150700.1.3.1.x86_64",
"SUSE Real Time Module 15 SP7:cluster-md-kmp-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:dlm-kmp-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:gfs2-kmp-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-devel-rt-6.4.0-150700.7.34.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-rt-devel-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-source-rt-6.4.0-150700.7.34.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-syms-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:ocfs2-kmp-rt-6.4.0-150700.7.34.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-03-23T09:09:02Z",
"details": "moderate"
}
],
"title": "CVE-2025-71113"
},
{
"cve": "CVE-2025-71125",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-71125"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\ntracing: Do not register unsupported perf events\n\nSynthetic events currently do not have a function to register perf events.\nThis leads to calling the tracepoint register functions with a NULL\nfunction pointer which triggers:\n\n ------------[ cut here ]------------\n WARNING: kernel/tracepoint.c:175 at tracepoint_add_func+0x357/0x370, CPU#2: perf/2272\n Modules linked in: kvm_intel kvm irqbypass\n CPU: 2 UID: 0 PID: 2272 Comm: perf Not tainted 6.18.0-ftest-11964-ge022764176fc-dirty #323 PREEMPTLAZY\n Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.17.0-debian-1.17.0-1 04/01/2014\n RIP: 0010:tracepoint_add_func+0x357/0x370\n Code: 28 9c e8 4c 0b f5 ff eb 0f 4c 89 f7 48 c7 c6 80 4d 28 9c e8 ab 89 f4 ff 31 c0 5b 41 5c 41 5d 41 5e 41 5f 5d c3 cc cc cc cc cc \u003c0f\u003e 0b 49 c7 c6 ea ff ff ff e9 ee fe ff ff 0f 0b e9 f9 fe ff ff 0f\n RSP: 0018:ffffabc0c44d3c40 EFLAGS: 00010246\n RAX: 0000000000000001 RBX: ffff9380aa9e4060 RCX: 0000000000000000\n RDX: 000000000000000a RSI: ffffffff9e1d4a98 RDI: ffff937fcf5fd6c8\n RBP: 0000000000000001 R08: 0000000000000007 R09: ffff937fcf5fc780\n R10: 0000000000000003 R11: ffffffff9c193910 R12: 000000000000000a\n R13: ffffffff9e1e5888 R14: 0000000000000000 R15: ffffabc0c44d3c78\n FS: 00007f6202f5f340(0000) GS:ffff93819f00f000(0000) knlGS:0000000000000000\n CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033\n CR2: 000055d3162281a8 CR3: 0000000106a56003 CR4: 0000000000172ef0\n Call Trace:\n \u003cTASK\u003e\n tracepoint_probe_register+0x5d/0x90\n synth_event_reg+0x3c/0x60\n perf_trace_event_init+0x204/0x340\n perf_trace_init+0x85/0xd0\n perf_tp_event_init+0x2e/0x50\n perf_try_init_event+0x6f/0x230\n ? perf_event_alloc+0x4bb/0xdc0\n perf_event_alloc+0x65a/0xdc0\n __se_sys_perf_event_open+0x290/0x9f0\n do_syscall_64+0x93/0x7b0\n ? entry_SYSCALL_64_after_hwframe+0x76/0x7e\n ? trace_hardirqs_off+0x53/0xc0\n entry_SYSCALL_64_after_hwframe+0x76/0x7e\n\nInstead, have the code return -ENODEV, which doesn\u0027t warn and has perf\nerror out with:\n\n # perf record -e synthetic:futex_wait\nError:\nThe sys_perf_event_open() syscall returned with 19 (No such device) for event (synthetic:futex_wait).\n\"dmesg | grep -i perf\" may provide additional information.\n\nIdeally perf should support synthetic events, but for now just fix the\nwarning. The support can come later.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_7_34-rt-1-150700.1.3.1.x86_64",
"SUSE Real Time Module 15 SP7:cluster-md-kmp-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:dlm-kmp-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:gfs2-kmp-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-devel-rt-6.4.0-150700.7.34.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-rt-devel-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-source-rt-6.4.0-150700.7.34.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-syms-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:ocfs2-kmp-rt-6.4.0-150700.7.34.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-71125",
"url": "https://www.suse.com/security/cve/CVE-2025-71125"
},
{
"category": "external",
"summary": "SUSE Bug 1256784 for CVE-2025-71125",
"url": "https://bugzilla.suse.com/1256784"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_7_34-rt-1-150700.1.3.1.x86_64",
"SUSE Real Time Module 15 SP7:cluster-md-kmp-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:dlm-kmp-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:gfs2-kmp-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-devel-rt-6.4.0-150700.7.34.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-rt-devel-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-source-rt-6.4.0-150700.7.34.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-syms-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:ocfs2-kmp-rt-6.4.0-150700.7.34.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 3.3,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_7_34-rt-1-150700.1.3.1.x86_64",
"SUSE Real Time Module 15 SP7:cluster-md-kmp-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:dlm-kmp-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:gfs2-kmp-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-devel-rt-6.4.0-150700.7.34.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-rt-devel-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-source-rt-6.4.0-150700.7.34.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-syms-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:ocfs2-kmp-rt-6.4.0-150700.7.34.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-03-23T09:09:02Z",
"details": "low"
}
],
"title": "CVE-2025-71125"
},
{
"cve": "CVE-2025-71126",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-71126"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nmptcp: avoid deadlock on fallback while reinjecting\n\nJakub reported an MPTCP deadlock at fallback time:\n\n WARNING: possible recursive locking detected\n 6.18.0-rc7-virtme #1 Not tainted\n --------------------------------------------\n mptcp_connect/20858 is trying to acquire lock:\n ff1100001da18b60 (\u0026msk-\u003efallback_lock){+.-.}-{3:3}, at: __mptcp_try_fallback+0xd8/0x280\n\n but task is already holding lock:\n ff1100001da18b60 (\u0026msk-\u003efallback_lock){+.-.}-{3:3}, at: __mptcp_retrans+0x352/0xaa0\n\n other info that might help us debug this:\n Possible unsafe locking scenario:\n\n CPU0\n ----\n lock(\u0026msk-\u003efallback_lock);\n lock(\u0026msk-\u003efallback_lock);\n\n *** DEADLOCK ***\n\n May be due to missing lock nesting notation\n\n 3 locks held by mptcp_connect/20858:\n #0: ff1100001da18290 (sk_lock-AF_INET){+.+.}-{0:0}, at: mptcp_sendmsg+0x114/0x1bc0\n #1: ff1100001db40fd0 (k-sk_lock-AF_INET#2){+.+.}-{0:0}, at: __mptcp_retrans+0x2cb/0xaa0\n #2: ff1100001da18b60 (\u0026msk-\u003efallback_lock){+.-.}-{3:3}, at: __mptcp_retrans+0x352/0xaa0\n\n stack backtrace:\n CPU: 0 UID: 0 PID: 20858 Comm: mptcp_connect Not tainted 6.18.0-rc7-virtme #1 PREEMPT(full)\n Hardware name: Bochs, BIOS Bochs 01/01/2011\n Call Trace:\n \u003cTASK\u003e\n dump_stack_lvl+0x6f/0xa0\n print_deadlock_bug.cold+0xc0/0xcd\n validate_chain+0x2ff/0x5f0\n __lock_acquire+0x34c/0x740\n lock_acquire.part.0+0xbc/0x260\n _raw_spin_lock_bh+0x38/0x50\n __mptcp_try_fallback+0xd8/0x280\n mptcp_sendmsg_frag+0x16c2/0x3050\n __mptcp_retrans+0x421/0xaa0\n mptcp_release_cb+0x5aa/0xa70\n release_sock+0xab/0x1d0\n mptcp_sendmsg+0xd5b/0x1bc0\n sock_write_iter+0x281/0x4d0\n new_sync_write+0x3c5/0x6f0\n vfs_write+0x65e/0xbb0\n ksys_write+0x17e/0x200\n do_syscall_64+0xbb/0xfd0\n entry_SYSCALL_64_after_hwframe+0x4b/0x53\n RIP: 0033:0x7fa5627cbc5e\n Code: 4d 89 d8 e8 14 bd 00 00 4c 8b 5d f8 41 8b 93 08 03 00 00 59 5e 48 83 f8 fc 74 11 c9 c3 0f 1f 80 00 00 00 00 48 8b 45 10 0f 05 \u003cc9\u003e c3 83 e2 39 83 fa 08 75 e7 e8 13 ff ff ff 0f 1f 00 f3 0f 1e fa\n RSP: 002b:00007fff1fe14700 EFLAGS: 00000202 ORIG_RAX: 0000000000000001\n RAX: ffffffffffffffda RBX: 0000000000000005 RCX: 00007fa5627cbc5e\n RDX: 0000000000001f9c RSI: 00007fff1fe16984 RDI: 0000000000000005\n RBP: 00007fff1fe14710 R08: 0000000000000000 R09: 0000000000000000\n R10: 0000000000000000 R11: 0000000000000202 R12: 00007fff1fe16920\n R13: 0000000000002000 R14: 0000000000001f9c R15: 0000000000001f9c\n\nThe packet scheduler could attempt a reinjection after receiving an\nMP_FAIL and before the infinite map has been transmitted, causing a\ndeadlock since MPTCP needs to do the reinjection atomically from WRT\nfallback.\n\nAddress the issue explicitly avoiding the reinjection in the critical\nscenario. Note that this is the only fallback critical section that\ncould potentially send packets and hit the double-lock.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_7_34-rt-1-150700.1.3.1.x86_64",
"SUSE Real Time Module 15 SP7:cluster-md-kmp-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:dlm-kmp-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:gfs2-kmp-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-devel-rt-6.4.0-150700.7.34.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-rt-devel-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-source-rt-6.4.0-150700.7.34.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-syms-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:ocfs2-kmp-rt-6.4.0-150700.7.34.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-71126",
"url": "https://www.suse.com/security/cve/CVE-2025-71126"
},
{
"category": "external",
"summary": "SUSE Bug 1256755 for CVE-2025-71126",
"url": "https://bugzilla.suse.com/1256755"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_7_34-rt-1-150700.1.3.1.x86_64",
"SUSE Real Time Module 15 SP7:cluster-md-kmp-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:dlm-kmp-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:gfs2-kmp-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-devel-rt-6.4.0-150700.7.34.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-rt-devel-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-source-rt-6.4.0-150700.7.34.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-syms-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:ocfs2-kmp-rt-6.4.0-150700.7.34.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_7_34-rt-1-150700.1.3.1.x86_64",
"SUSE Real Time Module 15 SP7:cluster-md-kmp-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:dlm-kmp-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:gfs2-kmp-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-devel-rt-6.4.0-150700.7.34.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-rt-devel-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-source-rt-6.4.0-150700.7.34.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-syms-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:ocfs2-kmp-rt-6.4.0-150700.7.34.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-03-23T09:09:02Z",
"details": "moderate"
}
],
"title": "CVE-2025-71126"
},
{
"cve": "CVE-2025-71148",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-71148"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nnet/handshake: restore destructor on submit failure\n\nhandshake_req_submit() replaces sk-\u003esk_destruct but never restores it when\nsubmission fails before the request is hashed. handshake_sk_destruct() then\nreturns early and the original destructor never runs, leaking the socket.\nRestore sk_destruct on the error path.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_7_34-rt-1-150700.1.3.1.x86_64",
"SUSE Real Time Module 15 SP7:cluster-md-kmp-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:dlm-kmp-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:gfs2-kmp-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-devel-rt-6.4.0-150700.7.34.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-rt-devel-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-source-rt-6.4.0-150700.7.34.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-syms-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:ocfs2-kmp-rt-6.4.0-150700.7.34.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-71148",
"url": "https://www.suse.com/security/cve/CVE-2025-71148"
},
{
"category": "external",
"summary": "SUSE Bug 1257159 for CVE-2025-71148",
"url": "https://bugzilla.suse.com/1257159"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_7_34-rt-1-150700.1.3.1.x86_64",
"SUSE Real Time Module 15 SP7:cluster-md-kmp-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:dlm-kmp-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:gfs2-kmp-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-devel-rt-6.4.0-150700.7.34.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-rt-devel-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-source-rt-6.4.0-150700.7.34.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-syms-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:ocfs2-kmp-rt-6.4.0-150700.7.34.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.7,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_7_34-rt-1-150700.1.3.1.x86_64",
"SUSE Real Time Module 15 SP7:cluster-md-kmp-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:dlm-kmp-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:gfs2-kmp-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-devel-rt-6.4.0-150700.7.34.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-rt-devel-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-source-rt-6.4.0-150700.7.34.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-syms-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:ocfs2-kmp-rt-6.4.0-150700.7.34.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-03-23T09:09:02Z",
"details": "moderate"
}
],
"title": "CVE-2025-71148"
},
{
"cve": "CVE-2025-71182",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-71182"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\ncan: j1939: make j1939_session_activate() fail if device is no longer registered\n\nsyzbot is still reporting\n\n unregister_netdevice: waiting for vcan0 to become free. Usage count = 2\n\neven after commit 93a27b5891b8 (\"can: j1939: add missing calls in\nNETDEV_UNREGISTER notification handler\") was added. A debug printk() patch\nfound that j1939_session_activate() can succeed even after\nj1939_cancel_active_session() from j1939_netdev_notify(NETDEV_UNREGISTER)\nhas completed.\n\nSince j1939_cancel_active_session() is processed with the session list lock\nheld, checking ndev-\u003ereg_state in j1939_session_activate() with the session\nlist lock held can reliably close the race window.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_7_34-rt-1-150700.1.3.1.x86_64",
"SUSE Real Time Module 15 SP7:cluster-md-kmp-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:dlm-kmp-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:gfs2-kmp-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-devel-rt-6.4.0-150700.7.34.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-rt-devel-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-source-rt-6.4.0-150700.7.34.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-syms-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:ocfs2-kmp-rt-6.4.0-150700.7.34.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-71182",
"url": "https://www.suse.com/security/cve/CVE-2025-71182"
},
{
"category": "external",
"summary": "SUSE Bug 1257586 for CVE-2025-71182",
"url": "https://bugzilla.suse.com/1257586"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_7_34-rt-1-150700.1.3.1.x86_64",
"SUSE Real Time Module 15 SP7:cluster-md-kmp-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:dlm-kmp-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:gfs2-kmp-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-devel-rt-6.4.0-150700.7.34.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-rt-devel-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-source-rt-6.4.0-150700.7.34.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-syms-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:ocfs2-kmp-rt-6.4.0-150700.7.34.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_7_34-rt-1-150700.1.3.1.x86_64",
"SUSE Real Time Module 15 SP7:cluster-md-kmp-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:dlm-kmp-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:gfs2-kmp-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-devel-rt-6.4.0-150700.7.34.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-rt-devel-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-source-rt-6.4.0-150700.7.34.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-syms-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:ocfs2-kmp-rt-6.4.0-150700.7.34.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-03-23T09:09:02Z",
"details": "moderate"
}
],
"title": "CVE-2025-71182"
},
{
"cve": "CVE-2025-71184",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-71184"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nbtrfs: fix NULL dereference on root when tracing inode eviction\n\nWhen evicting an inode the first thing we do is to setup tracing for it,\nwhich implies fetching the root\u0027s id. But in btrfs_evict_inode() the\nroot might be NULL, as implied in the next check that we do in\nbtrfs_evict_inode().\n\nHence, we either should set the -\u003eroot_objectid to 0 in case the root is\nNULL, or we move tracing setup after checking that the root is not\nNULL. Setting the rootid to 0 at least gives us the possibility to trace\nthis call even in the case when the root is NULL, so that\u0027s the solution\ntaken here.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_7_34-rt-1-150700.1.3.1.x86_64",
"SUSE Real Time Module 15 SP7:cluster-md-kmp-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:dlm-kmp-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:gfs2-kmp-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-devel-rt-6.4.0-150700.7.34.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-rt-devel-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-source-rt-6.4.0-150700.7.34.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-syms-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:ocfs2-kmp-rt-6.4.0-150700.7.34.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-71184",
"url": "https://www.suse.com/security/cve/CVE-2025-71184"
},
{
"category": "external",
"summary": "SUSE Bug 1257635 for CVE-2025-71184",
"url": "https://bugzilla.suse.com/1257635"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_7_34-rt-1-150700.1.3.1.x86_64",
"SUSE Real Time Module 15 SP7:cluster-md-kmp-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:dlm-kmp-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:gfs2-kmp-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-devel-rt-6.4.0-150700.7.34.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-rt-devel-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-source-rt-6.4.0-150700.7.34.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-syms-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:ocfs2-kmp-rt-6.4.0-150700.7.34.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_7_34-rt-1-150700.1.3.1.x86_64",
"SUSE Real Time Module 15 SP7:cluster-md-kmp-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:dlm-kmp-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:gfs2-kmp-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-devel-rt-6.4.0-150700.7.34.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-rt-devel-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-source-rt-6.4.0-150700.7.34.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-syms-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:ocfs2-kmp-rt-6.4.0-150700.7.34.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-03-23T09:09:02Z",
"details": "moderate"
}
],
"title": "CVE-2025-71184"
},
{
"cve": "CVE-2025-71185",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-71185"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\ndmaengine: ti: dma-crossbar: fix device leak on am335x route allocation\n\nMake sure to drop the reference taken when looking up the crossbar\nplatform device during am335x route allocation.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_7_34-rt-1-150700.1.3.1.x86_64",
"SUSE Real Time Module 15 SP7:cluster-md-kmp-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:dlm-kmp-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:gfs2-kmp-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-devel-rt-6.4.0-150700.7.34.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-rt-devel-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-source-rt-6.4.0-150700.7.34.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-syms-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:ocfs2-kmp-rt-6.4.0-150700.7.34.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-71185",
"url": "https://www.suse.com/security/cve/CVE-2025-71185"
},
{
"category": "external",
"summary": "SUSE Bug 1257560 for CVE-2025-71185",
"url": "https://bugzilla.suse.com/1257560"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_7_34-rt-1-150700.1.3.1.x86_64",
"SUSE Real Time Module 15 SP7:cluster-md-kmp-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:dlm-kmp-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:gfs2-kmp-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-devel-rt-6.4.0-150700.7.34.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-rt-devel-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-source-rt-6.4.0-150700.7.34.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-syms-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:ocfs2-kmp-rt-6.4.0-150700.7.34.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_7_34-rt-1-150700.1.3.1.x86_64",
"SUSE Real Time Module 15 SP7:cluster-md-kmp-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:dlm-kmp-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:gfs2-kmp-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-devel-rt-6.4.0-150700.7.34.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-rt-devel-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-source-rt-6.4.0-150700.7.34.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-syms-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:ocfs2-kmp-rt-6.4.0-150700.7.34.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-03-23T09:09:02Z",
"details": "moderate"
}
],
"title": "CVE-2025-71185"
},
{
"cve": "CVE-2025-71188",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-71188"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\ndmaengine: lpc18xx-dmamux: fix device leak on route allocation\n\nMake sure to drop the reference taken when looking up the DMA mux\nplatform device during route allocation.\n\nNote that holding a reference to a device does not prevent its driver\ndata from going away so there is no point in keeping the reference.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_7_34-rt-1-150700.1.3.1.x86_64",
"SUSE Real Time Module 15 SP7:cluster-md-kmp-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:dlm-kmp-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:gfs2-kmp-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-devel-rt-6.4.0-150700.7.34.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-rt-devel-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-source-rt-6.4.0-150700.7.34.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-syms-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:ocfs2-kmp-rt-6.4.0-150700.7.34.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-71188",
"url": "https://www.suse.com/security/cve/CVE-2025-71188"
},
{
"category": "external",
"summary": "SUSE Bug 1257576 for CVE-2025-71188",
"url": "https://bugzilla.suse.com/1257576"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_7_34-rt-1-150700.1.3.1.x86_64",
"SUSE Real Time Module 15 SP7:cluster-md-kmp-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:dlm-kmp-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:gfs2-kmp-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-devel-rt-6.4.0-150700.7.34.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-rt-devel-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-source-rt-6.4.0-150700.7.34.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-syms-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:ocfs2-kmp-rt-6.4.0-150700.7.34.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_7_34-rt-1-150700.1.3.1.x86_64",
"SUSE Real Time Module 15 SP7:cluster-md-kmp-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:dlm-kmp-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:gfs2-kmp-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-devel-rt-6.4.0-150700.7.34.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-rt-devel-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-source-rt-6.4.0-150700.7.34.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-syms-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:ocfs2-kmp-rt-6.4.0-150700.7.34.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-03-23T09:09:02Z",
"details": "moderate"
}
],
"title": "CVE-2025-71188"
},
{
"cve": "CVE-2025-71189",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-71189"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\ndmaengine: dw: dmamux: fix OF node leak on route allocation failure\n\nMake sure to drop the reference taken to the DMA master OF node also on\nlate route allocation failures.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_7_34-rt-1-150700.1.3.1.x86_64",
"SUSE Real Time Module 15 SP7:cluster-md-kmp-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:dlm-kmp-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:gfs2-kmp-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-devel-rt-6.4.0-150700.7.34.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-rt-devel-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-source-rt-6.4.0-150700.7.34.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-syms-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:ocfs2-kmp-rt-6.4.0-150700.7.34.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-71189",
"url": "https://www.suse.com/security/cve/CVE-2025-71189"
},
{
"category": "external",
"summary": "SUSE Bug 1257573 for CVE-2025-71189",
"url": "https://bugzilla.suse.com/1257573"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_7_34-rt-1-150700.1.3.1.x86_64",
"SUSE Real Time Module 15 SP7:cluster-md-kmp-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:dlm-kmp-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:gfs2-kmp-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-devel-rt-6.4.0-150700.7.34.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-rt-devel-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-source-rt-6.4.0-150700.7.34.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-syms-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:ocfs2-kmp-rt-6.4.0-150700.7.34.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 3.3,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_7_34-rt-1-150700.1.3.1.x86_64",
"SUSE Real Time Module 15 SP7:cluster-md-kmp-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:dlm-kmp-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:gfs2-kmp-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-devel-rt-6.4.0-150700.7.34.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-rt-devel-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-source-rt-6.4.0-150700.7.34.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-syms-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:ocfs2-kmp-rt-6.4.0-150700.7.34.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-03-23T09:09:02Z",
"details": "low"
}
],
"title": "CVE-2025-71189"
},
{
"cve": "CVE-2025-71190",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-71190"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\ndmaengine: bcm-sba-raid: fix device leak on probe\n\nMake sure to drop the reference taken when looking up the mailbox device\nduring probe on probe failures and on driver unbind.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_7_34-rt-1-150700.1.3.1.x86_64",
"SUSE Real Time Module 15 SP7:cluster-md-kmp-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:dlm-kmp-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:gfs2-kmp-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-devel-rt-6.4.0-150700.7.34.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-rt-devel-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-source-rt-6.4.0-150700.7.34.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-syms-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:ocfs2-kmp-rt-6.4.0-150700.7.34.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-71190",
"url": "https://www.suse.com/security/cve/CVE-2025-71190"
},
{
"category": "external",
"summary": "SUSE Bug 1257580 for CVE-2025-71190",
"url": "https://bugzilla.suse.com/1257580"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_7_34-rt-1-150700.1.3.1.x86_64",
"SUSE Real Time Module 15 SP7:cluster-md-kmp-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:dlm-kmp-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:gfs2-kmp-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-devel-rt-6.4.0-150700.7.34.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-rt-devel-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-source-rt-6.4.0-150700.7.34.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-syms-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:ocfs2-kmp-rt-6.4.0-150700.7.34.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 3.3,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_7_34-rt-1-150700.1.3.1.x86_64",
"SUSE Real Time Module 15 SP7:cluster-md-kmp-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:dlm-kmp-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:gfs2-kmp-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-devel-rt-6.4.0-150700.7.34.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-rt-devel-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-source-rt-6.4.0-150700.7.34.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-syms-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:ocfs2-kmp-rt-6.4.0-150700.7.34.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-03-23T09:09:02Z",
"details": "low"
}
],
"title": "CVE-2025-71190"
},
{
"cve": "CVE-2025-71191",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-71191"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\ndmaengine: at_hdmac: fix device leak on of_dma_xlate()\n\nMake sure to drop the reference taken when looking up the DMA platform\ndevice during of_dma_xlate() when releasing channel resources.\n\nNote that commit 3832b78b3ec2 (\"dmaengine: at_hdmac: add missing\nput_device() call in at_dma_xlate()\") fixed the leak in a couple of\nerror paths but the reference is still leaking on successful allocation.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_7_34-rt-1-150700.1.3.1.x86_64",
"SUSE Real Time Module 15 SP7:cluster-md-kmp-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:dlm-kmp-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:gfs2-kmp-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-devel-rt-6.4.0-150700.7.34.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-rt-devel-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-source-rt-6.4.0-150700.7.34.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-syms-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:ocfs2-kmp-rt-6.4.0-150700.7.34.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-71191",
"url": "https://www.suse.com/security/cve/CVE-2025-71191"
},
{
"category": "external",
"summary": "SUSE Bug 1257579 for CVE-2025-71191",
"url": "https://bugzilla.suse.com/1257579"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_7_34-rt-1-150700.1.3.1.x86_64",
"SUSE Real Time Module 15 SP7:cluster-md-kmp-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:dlm-kmp-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:gfs2-kmp-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-devel-rt-6.4.0-150700.7.34.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-rt-devel-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-source-rt-6.4.0-150700.7.34.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-syms-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:ocfs2-kmp-rt-6.4.0-150700.7.34.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 3.3,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_7_34-rt-1-150700.1.3.1.x86_64",
"SUSE Real Time Module 15 SP7:cluster-md-kmp-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:dlm-kmp-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:gfs2-kmp-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-devel-rt-6.4.0-150700.7.34.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-rt-devel-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-source-rt-6.4.0-150700.7.34.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-syms-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:ocfs2-kmp-rt-6.4.0-150700.7.34.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-03-23T09:09:02Z",
"details": "low"
}
],
"title": "CVE-2025-71191"
},
{
"cve": "CVE-2025-71192",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-71192"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nALSA: ac97: fix a double free in snd_ac97_controller_register()\n\nIf ac97_add_adapter() fails, put_device() is the correct way to drop\nthe device reference. kfree() is not required.\nAdd kfree() if idr_alloc() fails and in ac97_adapter_release() to do\nthe cleanup.\n\nFound by code review.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_7_34-rt-1-150700.1.3.1.x86_64",
"SUSE Real Time Module 15 SP7:cluster-md-kmp-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:dlm-kmp-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:gfs2-kmp-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-devel-rt-6.4.0-150700.7.34.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-rt-devel-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-source-rt-6.4.0-150700.7.34.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-syms-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:ocfs2-kmp-rt-6.4.0-150700.7.34.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-71192",
"url": "https://www.suse.com/security/cve/CVE-2025-71192"
},
{
"category": "external",
"summary": "SUSE Bug 1257679 for CVE-2025-71192",
"url": "https://bugzilla.suse.com/1257679"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_7_34-rt-1-150700.1.3.1.x86_64",
"SUSE Real Time Module 15 SP7:cluster-md-kmp-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:dlm-kmp-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:gfs2-kmp-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-devel-rt-6.4.0-150700.7.34.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-rt-devel-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-source-rt-6.4.0-150700.7.34.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-syms-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:ocfs2-kmp-rt-6.4.0-150700.7.34.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_7_34-rt-1-150700.1.3.1.x86_64",
"SUSE Real Time Module 15 SP7:cluster-md-kmp-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:dlm-kmp-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:gfs2-kmp-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-devel-rt-6.4.0-150700.7.34.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-rt-devel-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-source-rt-6.4.0-150700.7.34.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-syms-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:ocfs2-kmp-rt-6.4.0-150700.7.34.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-03-23T09:09:02Z",
"details": "moderate"
}
],
"title": "CVE-2025-71192"
},
{
"cve": "CVE-2025-71194",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-71194"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nbtrfs: fix deadlock in wait_current_trans() due to ignored transaction type\n\nWhen wait_current_trans() is called during start_transaction(), it\ncurrently waits for a blocked transaction without considering whether\nthe given transaction type actually needs to wait for that particular\ntransaction state. The btrfs_blocked_trans_types[] array already defines\nwhich transaction types should wait for which transaction states, but\nthis check was missing in wait_current_trans().\n\nThis can lead to a deadlock scenario involving two transactions and\npending ordered extents:\n\n 1. Transaction A is in TRANS_STATE_COMMIT_DOING state\n\n 2. A worker processing an ordered extent calls start_transaction()\n with TRANS_JOIN\n\n 3. join_transaction() returns -EBUSY because Transaction A is in\n TRANS_STATE_COMMIT_DOING\n\n 4. Transaction A moves to TRANS_STATE_UNBLOCKED and completes\n\n 5. A new Transaction B is created (TRANS_STATE_RUNNING)\n\n 6. The ordered extent from step 2 is added to Transaction B\u0027s\n pending ordered extents\n\n 7. Transaction B immediately starts commit by another task and\n enters TRANS_STATE_COMMIT_START\n\n 8. The worker finally reaches wait_current_trans(), sees Transaction B\n in TRANS_STATE_COMMIT_START (a blocked state), and waits\n unconditionally\n\n 9. However, TRANS_JOIN should NOT wait for TRANS_STATE_COMMIT_START\n according to btrfs_blocked_trans_types[]\n\n 10. Transaction B is waiting for pending ordered extents to complete\n\n 11. Deadlock: Transaction B waits for ordered extent, ordered extent\n waits for Transaction B\n\nThis can be illustrated by the following call stacks:\n CPU0 CPU1\n btrfs_finish_ordered_io()\n start_transaction(TRANS_JOIN)\n join_transaction()\n # -EBUSY (Transaction A is\n # TRANS_STATE_COMMIT_DOING)\n # Transaction A completes\n # Transaction B created\n # ordered extent added to\n # Transaction B\u0027s pending list\n btrfs_commit_transaction()\n # Transaction B enters\n # TRANS_STATE_COMMIT_START\n # waiting for pending ordered\n # extents\n wait_current_trans()\n # waits for Transaction B\n # (should not wait!)\n\nTask bstore_kv_sync in btrfs_commit_transaction waiting for ordered\nextents:\n\n __schedule+0x2e7/0x8a0\n schedule+0x64/0xe0\n btrfs_commit_transaction+0xbf7/0xda0 [btrfs]\n btrfs_sync_file+0x342/0x4d0 [btrfs]\n __x64_sys_fdatasync+0x4b/0x80\n do_syscall_64+0x33/0x40\n entry_SYSCALL_64_after_hwframe+0x44/0xa9\n\nTask kworker in wait_current_trans waiting for transaction commit:\n\n Workqueue: btrfs-syno_nocow btrfs_work_helper [btrfs]\n __schedule+0x2e7/0x8a0\n schedule+0x64/0xe0\n wait_current_trans+0xb0/0x110 [btrfs]\n start_transaction+0x346/0x5b0 [btrfs]\n btrfs_finish_ordered_io.isra.0+0x49b/0x9c0 [btrfs]\n btrfs_work_helper+0xe8/0x350 [btrfs]\n process_one_work+0x1d3/0x3c0\n worker_thread+0x4d/0x3e0\n kthread+0x12d/0x150\n ret_from_fork+0x1f/0x30\n\nFix this by passing the transaction type to wait_current_trans() and\nchecking btrfs_blocked_trans_types[cur_trans-\u003estate] against the given\ntype before deciding to wait. This ensures that transaction types which\nare allowed to join during certain blocked states will not unnecessarily\nwait and cause deadlocks.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_7_34-rt-1-150700.1.3.1.x86_64",
"SUSE Real Time Module 15 SP7:cluster-md-kmp-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:dlm-kmp-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:gfs2-kmp-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-devel-rt-6.4.0-150700.7.34.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-rt-devel-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-source-rt-6.4.0-150700.7.34.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-syms-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:ocfs2-kmp-rt-6.4.0-150700.7.34.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-71194",
"url": "https://www.suse.com/security/cve/CVE-2025-71194"
},
{
"category": "external",
"summary": "SUSE Bug 1257687 for CVE-2025-71194",
"url": "https://bugzilla.suse.com/1257687"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_7_34-rt-1-150700.1.3.1.x86_64",
"SUSE Real Time Module 15 SP7:cluster-md-kmp-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:dlm-kmp-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:gfs2-kmp-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-devel-rt-6.4.0-150700.7.34.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-rt-devel-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-source-rt-6.4.0-150700.7.34.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-syms-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:ocfs2-kmp-rt-6.4.0-150700.7.34.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.7,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_7_34-rt-1-150700.1.3.1.x86_64",
"SUSE Real Time Module 15 SP7:cluster-md-kmp-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:dlm-kmp-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:gfs2-kmp-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-devel-rt-6.4.0-150700.7.34.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-rt-devel-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-source-rt-6.4.0-150700.7.34.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-syms-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:ocfs2-kmp-rt-6.4.0-150700.7.34.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-03-23T09:09:02Z",
"details": "moderate"
}
],
"title": "CVE-2025-71194"
},
{
"cve": "CVE-2025-71195",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-71195"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\ndmaengine: xilinx: xdma: Fix regmap max_register\n\nThe max_register field is assigned the size of the register memory\nregion instead of the offset of the last register.\nThe result is that reading from the regmap via debugfs can cause\na segmentation fault:\n\ntail /sys/kernel/debug/regmap/xdma.1.auto/registers\nUnable to handle kernel paging request at virtual address ffff800082f70000\nMem abort info:\n ESR = 0x0000000096000007\n EC = 0x25: DABT (current EL), IL = 32 bits\n SET = 0, FnV = 0\n EA = 0, S1PTW = 0\n FSC = 0x07: level 3 translation fault\n[...]\nCall trace:\n regmap_mmio_read32le+0x10/0x30\n _regmap_bus_reg_read+0x74/0xc0\n _regmap_read+0x68/0x198\n regmap_read+0x54/0x88\n regmap_read_debugfs+0x140/0x380\n regmap_map_read_file+0x30/0x48\n full_proxy_read+0x68/0xc8\n vfs_read+0xcc/0x310\n ksys_read+0x7c/0x120\n __arm64_sys_read+0x24/0x40\n invoke_syscall.constprop.0+0x64/0x108\n do_el0_svc+0xb0/0xd8\n el0_svc+0x38/0x130\n el0t_64_sync_handler+0x120/0x138\n el0t_64_sync+0x194/0x198\nCode: aa1e03e9 d503201f f9400000 8b214000 (b9400000)\n---[ end trace 0000000000000000 ]---\nnote: tail[1217] exited with irqs disabled\nnote: tail[1217] exited with preempt_count 1\nSegmentation fault",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_7_34-rt-1-150700.1.3.1.x86_64",
"SUSE Real Time Module 15 SP7:cluster-md-kmp-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:dlm-kmp-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:gfs2-kmp-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-devel-rt-6.4.0-150700.7.34.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-rt-devel-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-source-rt-6.4.0-150700.7.34.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-syms-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:ocfs2-kmp-rt-6.4.0-150700.7.34.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-71195",
"url": "https://www.suse.com/security/cve/CVE-2025-71195"
},
{
"category": "external",
"summary": "SUSE Bug 1257704 for CVE-2025-71195",
"url": "https://bugzilla.suse.com/1257704"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_7_34-rt-1-150700.1.3.1.x86_64",
"SUSE Real Time Module 15 SP7:cluster-md-kmp-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:dlm-kmp-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:gfs2-kmp-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-devel-rt-6.4.0-150700.7.34.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-rt-devel-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-source-rt-6.4.0-150700.7.34.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-syms-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:ocfs2-kmp-rt-6.4.0-150700.7.34.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_7_34-rt-1-150700.1.3.1.x86_64",
"SUSE Real Time Module 15 SP7:cluster-md-kmp-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:dlm-kmp-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:gfs2-kmp-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-devel-rt-6.4.0-150700.7.34.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-rt-devel-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-source-rt-6.4.0-150700.7.34.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-syms-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:ocfs2-kmp-rt-6.4.0-150700.7.34.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-03-23T09:09:02Z",
"details": "moderate"
}
],
"title": "CVE-2025-71195"
},
{
"cve": "CVE-2025-71196",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-71196"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nphy: stm32-usphyc: Fix off by one in probe()\n\nThe \"index\" variable is used as an index into the usbphyc-\u003ephys[] array\nwhich has usbphyc-\u003enphys elements. So if it is equal to usbphyc-\u003enphys\nthen it is one element out of bounds. The \"index\" comes from the\ndevice tree so it\u0027s data that we trust and it\u0027s unlikely to be wrong,\nhowever it\u0027s obviously still worth fixing the bug. Change the \u003e to \u003e=.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_7_34-rt-1-150700.1.3.1.x86_64",
"SUSE Real Time Module 15 SP7:cluster-md-kmp-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:dlm-kmp-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:gfs2-kmp-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-devel-rt-6.4.0-150700.7.34.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-rt-devel-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-source-rt-6.4.0-150700.7.34.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-syms-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:ocfs2-kmp-rt-6.4.0-150700.7.34.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-71196",
"url": "https://www.suse.com/security/cve/CVE-2025-71196"
},
{
"category": "external",
"summary": "SUSE Bug 1257716 for CVE-2025-71196",
"url": "https://bugzilla.suse.com/1257716"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_7_34-rt-1-150700.1.3.1.x86_64",
"SUSE Real Time Module 15 SP7:cluster-md-kmp-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:dlm-kmp-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:gfs2-kmp-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-devel-rt-6.4.0-150700.7.34.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-rt-devel-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-source-rt-6.4.0-150700.7.34.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-syms-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:ocfs2-kmp-rt-6.4.0-150700.7.34.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_7_34-rt-1-150700.1.3.1.x86_64",
"SUSE Real Time Module 15 SP7:cluster-md-kmp-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:dlm-kmp-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:gfs2-kmp-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-devel-rt-6.4.0-150700.7.34.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-rt-devel-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-source-rt-6.4.0-150700.7.34.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-syms-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:ocfs2-kmp-rt-6.4.0-150700.7.34.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-03-23T09:09:02Z",
"details": "moderate"
}
],
"title": "CVE-2025-71196"
},
{
"cve": "CVE-2025-71197",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-71197"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nw1: therm: Fix off-by-one buffer overflow in alarms_store\n\nThe sysfs buffer passed to alarms_store() is allocated with \u0027size + 1\u0027\nbytes and a NUL terminator is appended. However, the \u0027size\u0027 argument\ndoes not account for this extra byte. The original code then allocated\n\u0027size\u0027 bytes and used strcpy() to copy \u0027buf\u0027, which always writes one\nbyte past the allocated buffer since strcpy() copies until the NUL\nterminator at index \u0027size\u0027.\n\nFix this by parsing the \u0027buf\u0027 parameter directly using simple_strtoll()\nwithout allocating any intermediate memory or string copying. This\nremoves the overflow while simplifying the code.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_7_34-rt-1-150700.1.3.1.x86_64",
"SUSE Real Time Module 15 SP7:cluster-md-kmp-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:dlm-kmp-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:gfs2-kmp-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-devel-rt-6.4.0-150700.7.34.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-rt-devel-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-source-rt-6.4.0-150700.7.34.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-syms-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:ocfs2-kmp-rt-6.4.0-150700.7.34.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-71197",
"url": "https://www.suse.com/security/cve/CVE-2025-71197"
},
{
"category": "external",
"summary": "SUSE Bug 1257743 for CVE-2025-71197",
"url": "https://bugzilla.suse.com/1257743"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_7_34-rt-1-150700.1.3.1.x86_64",
"SUSE Real Time Module 15 SP7:cluster-md-kmp-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:dlm-kmp-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:gfs2-kmp-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-devel-rt-6.4.0-150700.7.34.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-rt-devel-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-source-rt-6.4.0-150700.7.34.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-syms-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:ocfs2-kmp-rt-6.4.0-150700.7.34.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.1,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_7_34-rt-1-150700.1.3.1.x86_64",
"SUSE Real Time Module 15 SP7:cluster-md-kmp-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:dlm-kmp-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:gfs2-kmp-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-devel-rt-6.4.0-150700.7.34.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-rt-devel-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-source-rt-6.4.0-150700.7.34.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-syms-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:ocfs2-kmp-rt-6.4.0-150700.7.34.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-03-23T09:09:02Z",
"details": "moderate"
}
],
"title": "CVE-2025-71197"
},
{
"cve": "CVE-2025-71198",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-71198"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\niio: imu: st_lsm6dsx: fix iio_chan_spec for sensors without event detection\n\nThe st_lsm6dsx_acc_channels array of struct iio_chan_spec has a non-NULL\nevent_spec field, indicating support for IIO events. However, event\ndetection is not supported for all sensors, and if userspace tries to\nconfigure accelerometer wakeup events on a sensor device that does not\nsupport them (e.g. LSM6DS0), st_lsm6dsx_write_event() dereferences a NULL\npointer when trying to write to the wakeup register.\nDefine an additional struct iio_chan_spec array whose members have a NULL\nevent_spec field, and use this array instead of st_lsm6dsx_acc_channels for\nsensors without event detection capability.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_7_34-rt-1-150700.1.3.1.x86_64",
"SUSE Real Time Module 15 SP7:cluster-md-kmp-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:dlm-kmp-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:gfs2-kmp-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-devel-rt-6.4.0-150700.7.34.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-rt-devel-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-source-rt-6.4.0-150700.7.34.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-syms-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:ocfs2-kmp-rt-6.4.0-150700.7.34.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-71198",
"url": "https://www.suse.com/security/cve/CVE-2025-71198"
},
{
"category": "external",
"summary": "SUSE Bug 1257741 for CVE-2025-71198",
"url": "https://bugzilla.suse.com/1257741"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_7_34-rt-1-150700.1.3.1.x86_64",
"SUSE Real Time Module 15 SP7:cluster-md-kmp-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:dlm-kmp-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:gfs2-kmp-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-devel-rt-6.4.0-150700.7.34.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-rt-devel-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-source-rt-6.4.0-150700.7.34.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-syms-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:ocfs2-kmp-rt-6.4.0-150700.7.34.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_7_34-rt-1-150700.1.3.1.x86_64",
"SUSE Real Time Module 15 SP7:cluster-md-kmp-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:dlm-kmp-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:gfs2-kmp-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-devel-rt-6.4.0-150700.7.34.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-rt-devel-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-source-rt-6.4.0-150700.7.34.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-syms-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:ocfs2-kmp-rt-6.4.0-150700.7.34.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-03-23T09:09:02Z",
"details": "moderate"
}
],
"title": "CVE-2025-71198"
},
{
"cve": "CVE-2025-71199",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-71199"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\niio: adc: at91-sama5d2_adc: Fix potential use-after-free in sama5d2_adc driver\n\nat91_adc_interrupt can call at91_adc_touch_data_handler function\nto start the work by schedule_work(\u0026st-\u003etouch_st.workq).\n\nIf we remove the module which will call at91_adc_remove to\nmake cleanup, it will free indio_dev through iio_device_unregister but\nquite a bit later. While the work mentioned above will be used. The\nsequence of operations that may lead to a UAF bug is as follows:\n\nCPU0 CPU1\n\n | at91_adc_workq_handler\nat91_adc_remove |\niio_device_unregister(indio_dev) |\n//free indio_dev a bit later |\n | iio_push_to_buffers(indio_dev)\n | //use indio_dev\n\nFix it by ensuring that the work is canceled before proceeding with\nthe cleanup in at91_adc_remove.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_7_34-rt-1-150700.1.3.1.x86_64",
"SUSE Real Time Module 15 SP7:cluster-md-kmp-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:dlm-kmp-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:gfs2-kmp-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-devel-rt-6.4.0-150700.7.34.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-rt-devel-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-source-rt-6.4.0-150700.7.34.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-syms-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:ocfs2-kmp-rt-6.4.0-150700.7.34.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-71199",
"url": "https://www.suse.com/security/cve/CVE-2025-71199"
},
{
"category": "external",
"summary": "SUSE Bug 1257750 for CVE-2025-71199",
"url": "https://bugzilla.suse.com/1257750"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_7_34-rt-1-150700.1.3.1.x86_64",
"SUSE Real Time Module 15 SP7:cluster-md-kmp-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:dlm-kmp-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:gfs2-kmp-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-devel-rt-6.4.0-150700.7.34.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-rt-devel-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-source-rt-6.4.0-150700.7.34.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-syms-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:ocfs2-kmp-rt-6.4.0-150700.7.34.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_7_34-rt-1-150700.1.3.1.x86_64",
"SUSE Real Time Module 15 SP7:cluster-md-kmp-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:dlm-kmp-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:gfs2-kmp-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-devel-rt-6.4.0-150700.7.34.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-rt-devel-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-source-rt-6.4.0-150700.7.34.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-syms-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:ocfs2-kmp-rt-6.4.0-150700.7.34.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-03-23T09:09:02Z",
"details": "moderate"
}
],
"title": "CVE-2025-71199"
},
{
"cve": "CVE-2025-71200",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-71200"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nmmc: sdhci-of-dwcmshc: Prevent illegal clock reduction in HS200/HS400 mode\n\nWhen operating in HS200 or HS400 timing modes, reducing the clock frequency\nbelow 52MHz will lead to link broken as the Rockchip DWC MSHC controller\nrequires maintaining a minimum clock of 52MHz in these modes.\n\nAdd a check to prevent illegal clock reduction through debugfs:\n\nroot@debian:/# echo 50000000 \u003e /sys/kernel/debug/mmc0/clock\nroot@debian:/# [ 30.090146] mmc0: running CQE recovery\nmmc0: cqhci: Failed to halt\nmmc0: cqhci: spurious TCN for tag 0\nWARNING: drivers/mmc/host/cqhci-core.c:797 at cqhci_irq+0x254/0x818, CPU#1: kworker/1:0H/24\nModules linked in:\nCPU: 1 UID: 0 PID: 24 Comm: kworker/1:0H Not tainted 6.19.0-rc1-00001-g09db0998649d-dirty #204 PREEMPT\nHardware name: Rockchip RK3588 EVB1 V10 Board (DT)\nWorkqueue: kblockd blk_mq_run_work_fn\npstate: 604000c9 (nZCv daIF +PAN -UAO -TCO -DIT -SSBS BTYPE=--)\npc : cqhci_irq+0x254/0x818\nlr : cqhci_irq+0x254/0x818\n...",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_7_34-rt-1-150700.1.3.1.x86_64",
"SUSE Real Time Module 15 SP7:cluster-md-kmp-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:dlm-kmp-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:gfs2-kmp-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-devel-rt-6.4.0-150700.7.34.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-rt-devel-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-source-rt-6.4.0-150700.7.34.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-syms-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:ocfs2-kmp-rt-6.4.0-150700.7.34.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-71200",
"url": "https://www.suse.com/security/cve/CVE-2025-71200"
},
{
"category": "external",
"summary": "SUSE Bug 1258222 for CVE-2025-71200",
"url": "https://bugzilla.suse.com/1258222"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_7_34-rt-1-150700.1.3.1.x86_64",
"SUSE Real Time Module 15 SP7:cluster-md-kmp-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:dlm-kmp-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:gfs2-kmp-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-devel-rt-6.4.0-150700.7.34.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-rt-devel-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-source-rt-6.4.0-150700.7.34.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-syms-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:ocfs2-kmp-rt-6.4.0-150700.7.34.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_7_34-rt-1-150700.1.3.1.x86_64",
"SUSE Real Time Module 15 SP7:cluster-md-kmp-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:dlm-kmp-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:gfs2-kmp-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-devel-rt-6.4.0-150700.7.34.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-rt-devel-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-source-rt-6.4.0-150700.7.34.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-syms-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:ocfs2-kmp-rt-6.4.0-150700.7.34.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-03-23T09:09:02Z",
"details": "moderate"
}
],
"title": "CVE-2025-71200"
},
{
"cve": "CVE-2025-71222",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-71222"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nwifi: wlcore: ensure skb headroom before skb_push\n\nThis avoids occasional skb_under_panic Oops from wl1271_tx_work. In this case, headroom is\nless than needed (typically 110 - 94 = 16 bytes).",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_7_34-rt-1-150700.1.3.1.x86_64",
"SUSE Real Time Module 15 SP7:cluster-md-kmp-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:dlm-kmp-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:gfs2-kmp-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-devel-rt-6.4.0-150700.7.34.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-rt-devel-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-source-rt-6.4.0-150700.7.34.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-syms-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:ocfs2-kmp-rt-6.4.0-150700.7.34.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-71222",
"url": "https://www.suse.com/security/cve/CVE-2025-71222"
},
{
"category": "external",
"summary": "SUSE Bug 1258279 for CVE-2025-71222",
"url": "https://bugzilla.suse.com/1258279"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_7_34-rt-1-150700.1.3.1.x86_64",
"SUSE Real Time Module 15 SP7:cluster-md-kmp-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:dlm-kmp-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:gfs2-kmp-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-devel-rt-6.4.0-150700.7.34.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-rt-devel-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-source-rt-6.4.0-150700.7.34.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-syms-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:ocfs2-kmp-rt-6.4.0-150700.7.34.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_7_34-rt-1-150700.1.3.1.x86_64",
"SUSE Real Time Module 15 SP7:cluster-md-kmp-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:dlm-kmp-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:gfs2-kmp-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-devel-rt-6.4.0-150700.7.34.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-rt-devel-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-source-rt-6.4.0-150700.7.34.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-syms-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:ocfs2-kmp-rt-6.4.0-150700.7.34.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-03-23T09:09:02Z",
"details": "moderate"
}
],
"title": "CVE-2025-71222"
},
{
"cve": "CVE-2025-71224",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-71224"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nwifi: mac80211: ocb: skip rx_no_sta when interface is not joined\n\nieee80211_ocb_rx_no_sta() assumes a valid channel context, which is only\npresent after JOIN_OCB.\n\nRX may run before JOIN_OCB is executed, in which case the OCB interface\nis not operational. Skip RX peer handling when the interface is not\njoined to avoid warnings in the RX path.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_7_34-rt-1-150700.1.3.1.x86_64",
"SUSE Real Time Module 15 SP7:cluster-md-kmp-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:dlm-kmp-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:gfs2-kmp-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-devel-rt-6.4.0-150700.7.34.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-rt-devel-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-source-rt-6.4.0-150700.7.34.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-syms-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:ocfs2-kmp-rt-6.4.0-150700.7.34.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-71224",
"url": "https://www.suse.com/security/cve/CVE-2025-71224"
},
{
"category": "external",
"summary": "SUSE Bug 1258824 for CVE-2025-71224",
"url": "https://bugzilla.suse.com/1258824"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_7_34-rt-1-150700.1.3.1.x86_64",
"SUSE Real Time Module 15 SP7:cluster-md-kmp-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:dlm-kmp-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:gfs2-kmp-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-devel-rt-6.4.0-150700.7.34.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-rt-devel-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-source-rt-6.4.0-150700.7.34.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-syms-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:ocfs2-kmp-rt-6.4.0-150700.7.34.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_7_34-rt-1-150700.1.3.1.x86_64",
"SUSE Real Time Module 15 SP7:cluster-md-kmp-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:dlm-kmp-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:gfs2-kmp-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-devel-rt-6.4.0-150700.7.34.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-rt-devel-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-source-rt-6.4.0-150700.7.34.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-syms-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:ocfs2-kmp-rt-6.4.0-150700.7.34.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-03-23T09:09:02Z",
"details": "moderate"
}
],
"title": "CVE-2025-71224"
},
{
"cve": "CVE-2025-71225",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-71225"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nmd: suspend array while updating raid_disks via sysfs\n\nIn raid1_reshape(), freeze_array() is called before modifying the r1bio\nmemory pool (conf-\u003er1bio_pool) and conf-\u003eraid_disks, and\nunfreeze_array() is called after the update is completed.\n\nHowever, freeze_array() only waits until nr_sync_pending and\n(nr_pending - nr_queued) of all buckets reaches zero. When an I/O error\noccurs, nr_queued is increased and the corresponding r1bio is queued to\neither retry_list or bio_end_io_list. As a result, freeze_array() may\nunblock before these r1bios are released.\n\nThis can lead to a situation where conf-\u003eraid_disks and the mempool have\nalready been updated while queued r1bios, allocated with the old\nraid_disks value, are later released. Consequently, free_r1bio() may\naccess memory out of bounds in put_all_bios() and release r1bios of the\nwrong size to the new mempool, potentially causing issues with the\nmempool as well.\n\nSince only normal I/O might increase nr_queued while an I/O error occurs,\nsuspending the array avoids this issue.\n\nNote: Updating raid_disks via ioctl SET_ARRAY_INFO already suspends\nthe array. Therefore, we suspend the array when updating raid_disks\nvia sysfs to avoid this issue too.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_7_34-rt-1-150700.1.3.1.x86_64",
"SUSE Real Time Module 15 SP7:cluster-md-kmp-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:dlm-kmp-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:gfs2-kmp-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-devel-rt-6.4.0-150700.7.34.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-rt-devel-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-source-rt-6.4.0-150700.7.34.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-syms-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:ocfs2-kmp-rt-6.4.0-150700.7.34.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-71225",
"url": "https://www.suse.com/security/cve/CVE-2025-71225"
},
{
"category": "external",
"summary": "SUSE Bug 1258411 for CVE-2025-71225",
"url": "https://bugzilla.suse.com/1258411"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_7_34-rt-1-150700.1.3.1.x86_64",
"SUSE Real Time Module 15 SP7:cluster-md-kmp-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:dlm-kmp-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:gfs2-kmp-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-devel-rt-6.4.0-150700.7.34.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-rt-devel-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-source-rt-6.4.0-150700.7.34.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-syms-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:ocfs2-kmp-rt-6.4.0-150700.7.34.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_7_34-rt-1-150700.1.3.1.x86_64",
"SUSE Real Time Module 15 SP7:cluster-md-kmp-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:dlm-kmp-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:gfs2-kmp-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-devel-rt-6.4.0-150700.7.34.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-rt-devel-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-source-rt-6.4.0-150700.7.34.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-syms-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:ocfs2-kmp-rt-6.4.0-150700.7.34.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-03-23T09:09:02Z",
"details": "moderate"
}
],
"title": "CVE-2025-71225"
},
{
"cve": "CVE-2025-71229",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-71229"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nwifi: rtw88: Fix alignment fault in rtw_core_enable_beacon()\n\nrtw_core_enable_beacon() reads 4 bytes from an address that is not a\nmultiple of 4. This results in a crash on some systems.\n\nDo 1 byte reads/writes instead.\n\nUnable to handle kernel paging request at virtual address ffff8000827e0522\nMem abort info:\n ESR = 0x0000000096000021\n EC = 0x25: DABT (current EL), IL = 32 bits\n SET = 0, FnV = 0\n EA = 0, S1PTW = 0\n FSC = 0x21: alignment fault\nData abort info:\n ISV = 0, ISS = 0x00000021, ISS2 = 0x00000000\n CM = 0, WnR = 0, TnD = 0, TagAccess = 0\n GCS = 0, Overlay = 0, DirtyBit = 0, Xs = 0\nswapper pgtable: 4k pages, 48-bit VAs, pgdp=0000000005492000\n[ffff8000827e0522] pgd=0000000000000000, p4d=10000001021d9403, pud=10000001021da403, pmd=100000011061c403, pte=00780000f3200f13\nInternal error: Oops: 0000000096000021 [#1] SMP\nModules linked in: [...] rtw88_8822ce rtw88_8822c rtw88_pci rtw88_core [...]\nCPU: 0 UID: 0 PID: 73 Comm: kworker/u32:2 Tainted: G W 6.17.9 #1-NixOS VOLUNTARY\nTainted: [W]=WARN\nHardware name: FriendlyElec NanoPC-T6 LTS (DT)\nWorkqueue: phy0 rtw_c2h_work [rtw88_core]\npstate: 60400009 (nZCv daif +PAN -UAO -TCO -DIT -SSBS BTYPE=--)\npc : rtw_pci_read32+0x18/0x40 [rtw88_pci]\nlr : rtw_core_enable_beacon+0xe0/0x148 [rtw88_core]\nsp : ffff800080cc3ca0\nx29: ffff800080cc3ca0 x28: ffff0001031fc240 x27: ffff000102100828\nx26: ffffd2cb7c9b4088 x25: ffff0001031fc2c0 x24: ffff000112fdef00\nx23: ffff000112fdef18 x22: ffff000111c29970 x21: 0000000000000001\nx20: 0000000000000001 x19: ffff000111c22040 x18: 0000000000000000\nx17: 0000000000000000 x16: 0000000000000000 x15: 0000000000000000\nx14: 0000000000000000 x13: 0000000000000000 x12: 0000000000000000\nx11: 0000000000000000 x10: 0000000000000000 x9 : ffffd2cb6507c090\nx8 : 0000000000000000 x7 : 0000000000000000 x6 : 0000000000000000\nx5 : 0000000000000000 x4 : 0000000000000000 x3 : 0000000000000000\nx2 : 0000000000007f10 x1 : 0000000000000522 x0 : ffff8000827e0522\nCall trace:\n rtw_pci_read32+0x18/0x40 [rtw88_pci] (P)\n rtw_hw_scan_chan_switch+0x124/0x1a8 [rtw88_core]\n rtw_fw_c2h_cmd_handle+0x254/0x290 [rtw88_core]\n rtw_c2h_work+0x50/0x98 [rtw88_core]\n process_one_work+0x178/0x3f8\n worker_thread+0x208/0x418\n kthread+0x120/0x220\n ret_from_fork+0x10/0x20\nCode: d28fe202 8b020000 f9524400 8b214000 (b9400000)\n---[ end trace 0000000000000000 ]---",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_7_34-rt-1-150700.1.3.1.x86_64",
"SUSE Real Time Module 15 SP7:cluster-md-kmp-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:dlm-kmp-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:gfs2-kmp-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-devel-rt-6.4.0-150700.7.34.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-rt-devel-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-source-rt-6.4.0-150700.7.34.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-syms-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:ocfs2-kmp-rt-6.4.0-150700.7.34.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-71229",
"url": "https://www.suse.com/security/cve/CVE-2025-71229"
},
{
"category": "external",
"summary": "SUSE Bug 1258415 for CVE-2025-71229",
"url": "https://bugzilla.suse.com/1258415"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_7_34-rt-1-150700.1.3.1.x86_64",
"SUSE Real Time Module 15 SP7:cluster-md-kmp-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:dlm-kmp-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:gfs2-kmp-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-devel-rt-6.4.0-150700.7.34.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-rt-devel-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-source-rt-6.4.0-150700.7.34.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-syms-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:ocfs2-kmp-rt-6.4.0-150700.7.34.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_7_34-rt-1-150700.1.3.1.x86_64",
"SUSE Real Time Module 15 SP7:cluster-md-kmp-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:dlm-kmp-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:gfs2-kmp-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-devel-rt-6.4.0-150700.7.34.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-rt-devel-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-source-rt-6.4.0-150700.7.34.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-syms-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:ocfs2-kmp-rt-6.4.0-150700.7.34.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-03-23T09:09:02Z",
"details": "moderate"
}
],
"title": "CVE-2025-71229"
},
{
"cve": "CVE-2025-71231",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-71231"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\ncrypto: iaa - Fix out-of-bounds index in find_empty_iaa_compression_mode\n\nThe local variable \u0027i\u0027 is initialized with -EINVAL, but the for loop\nimmediately overwrites it and -EINVAL is never returned.\n\nIf no empty compression mode can be found, the function would return the\nout-of-bounds index IAA_COMP_MODES_MAX, which would cause an invalid\narray access in add_iaa_compression_mode().\n\nFix both issues by returning either a valid index or -EINVAL.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_7_34-rt-1-150700.1.3.1.x86_64",
"SUSE Real Time Module 15 SP7:cluster-md-kmp-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:dlm-kmp-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:gfs2-kmp-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-devel-rt-6.4.0-150700.7.34.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-rt-devel-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-source-rt-6.4.0-150700.7.34.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-syms-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:ocfs2-kmp-rt-6.4.0-150700.7.34.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-71231",
"url": "https://www.suse.com/security/cve/CVE-2025-71231"
},
{
"category": "external",
"summary": "SUSE Bug 1258424 for CVE-2025-71231",
"url": "https://bugzilla.suse.com/1258424"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_7_34-rt-1-150700.1.3.1.x86_64",
"SUSE Real Time Module 15 SP7:cluster-md-kmp-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:dlm-kmp-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:gfs2-kmp-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-devel-rt-6.4.0-150700.7.34.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-rt-devel-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-source-rt-6.4.0-150700.7.34.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-syms-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:ocfs2-kmp-rt-6.4.0-150700.7.34.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_7_34-rt-1-150700.1.3.1.x86_64",
"SUSE Real Time Module 15 SP7:cluster-md-kmp-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:dlm-kmp-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:gfs2-kmp-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-devel-rt-6.4.0-150700.7.34.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-rt-devel-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-source-rt-6.4.0-150700.7.34.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-syms-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:ocfs2-kmp-rt-6.4.0-150700.7.34.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-03-23T09:09:02Z",
"details": "important"
}
],
"title": "CVE-2025-71231"
},
{
"cve": "CVE-2025-71232",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-71232"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nscsi: qla2xxx: Free sp in error path to fix system crash\n\nSystem crash seen during load/unload test in a loop,\n\n[61110.449331] qla2xxx [0000:27:00.0]-0042:0: Disabled MSI-X.\n[61110.467494] =============================================================================\n[61110.467498] BUG qla2xxx_srbs (Tainted: G OE -------- --- ): Objects remaining in qla2xxx_srbs on __kmem_cache_shutdown()\n[61110.467501] -----------------------------------------------------------------------------\n\n[61110.467502] Slab 0x000000000ffc8162 objects=51 used=1 fp=0x00000000e25d3d85 flags=0x57ffffc0010200(slab|head|node=1|zone=2|lastcpupid=0x1fffff)\n[61110.467509] CPU: 53 PID: 455206 Comm: rmmod Kdump: loaded Tainted: G OE -------- --- 5.14.0-284.11.1.el9_2.x86_64 #1\n[61110.467513] Hardware name: HPE ProLiant DL385 Gen10 Plus v2/ProLiant DL385 Gen10 Plus v2, BIOS A42 08/17/2023\n[61110.467515] Call Trace:\n[61110.467516] \u003cTASK\u003e\n[61110.467519] dump_stack_lvl+0x34/0x48\n[61110.467526] slab_err.cold+0x53/0x67\n[61110.467534] __kmem_cache_shutdown+0x16e/0x320\n[61110.467540] kmem_cache_destroy+0x51/0x160\n[61110.467544] qla2x00_module_exit+0x93/0x99 [qla2xxx]\n[61110.467607] ? __do_sys_delete_module.constprop.0+0x178/0x280\n[61110.467613] ? syscall_trace_enter.constprop.0+0x145/0x1d0\n[61110.467616] ? do_syscall_64+0x5c/0x90\n[61110.467619] ? exc_page_fault+0x62/0x150\n[61110.467622] ? entry_SYSCALL_64_after_hwframe+0x63/0xcd\n[61110.467626] \u003c/TASK\u003e\n[61110.467627] Disabling lock debugging due to kernel taint\n[61110.467635] Object 0x0000000026f7e6e6 @offset=16000\n[61110.467639] ------------[ cut here ]------------\n[61110.467639] kmem_cache_destroy qla2xxx_srbs: Slab cache still has objects when called from qla2x00_module_exit+0x93/0x99 [qla2xxx]\n[61110.467659] WARNING: CPU: 53 PID: 455206 at mm/slab_common.c:520 kmem_cache_destroy+0x14d/0x160\n[61110.467718] CPU: 53 PID: 455206 Comm: rmmod Kdump: loaded Tainted: G B OE -------- --- 5.14.0-284.11.1.el9_2.x86_64 #1\n[61110.467720] Hardware name: HPE ProLiant DL385 Gen10 Plus v2/ProLiant DL385 Gen10 Plus v2, BIOS A42 08/17/2023\n[61110.467721] RIP: 0010:kmem_cache_destroy+0x14d/0x160\n[61110.467724] Code: 99 7d 07 00 48 89 ef e8 e1 6a 07 00 eb b3 48 8b 55 60 48 8b 4c 24 20 48 c7 c6 70 fc 66 90 48 c7 c7 f8 ef a1 90 e8 e1 ed 7c 00 \u003c0f\u003e 0b eb 93 c3 cc cc cc cc 66 2e 0f 1f 84 00 00 00 00 00 55 48 89\n[61110.467725] RSP: 0018:ffffa304e489fe80 EFLAGS: 00010282\n[61110.467727] RAX: 0000000000000000 RBX: ffffffffc0d9a860 RCX: 0000000000000027\n[61110.467729] RDX: ffff8fd5ff9598a8 RSI: 0000000000000001 RDI: ffff8fd5ff9598a0\n[61110.467730] RBP: ffff8fb6aaf78700 R08: 0000000000000000 R09: 0000000100d863b7\n[61110.467731] R10: ffffa304e489fd20 R11: ffffffff913bef48 R12: 0000000040002000\n[61110.467731] R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000000\n[61110.467733] FS: 00007f64c89fb740(0000) GS:ffff8fd5ff940000(0000) knlGS:0000000000000000\n[61110.467734] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033\n[61110.467735] CR2: 00007f0f02bfe000 CR3: 00000020ad6dc005 CR4: 0000000000770ee0\n[61110.467736] PKRU: 55555554\n[61110.467737] Call Trace:\n[61110.467738] \u003cTASK\u003e\n[61110.467739] qla2x00_module_exit+0x93/0x99 [qla2xxx]\n[61110.467755] ? __do_sys_delete_module.constprop.0+0x178/0x280\n\nFree sp in the error path to fix the crash.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_7_34-rt-1-150700.1.3.1.x86_64",
"SUSE Real Time Module 15 SP7:cluster-md-kmp-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:dlm-kmp-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:gfs2-kmp-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-devel-rt-6.4.0-150700.7.34.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-rt-devel-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-source-rt-6.4.0-150700.7.34.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-syms-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:ocfs2-kmp-rt-6.4.0-150700.7.34.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-71232",
"url": "https://www.suse.com/security/cve/CVE-2025-71232"
},
{
"category": "external",
"summary": "SUSE Bug 1258422 for CVE-2025-71232",
"url": "https://bugzilla.suse.com/1258422"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_7_34-rt-1-150700.1.3.1.x86_64",
"SUSE Real Time Module 15 SP7:cluster-md-kmp-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:dlm-kmp-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:gfs2-kmp-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-devel-rt-6.4.0-150700.7.34.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-rt-devel-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-source-rt-6.4.0-150700.7.34.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-syms-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:ocfs2-kmp-rt-6.4.0-150700.7.34.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_7_34-rt-1-150700.1.3.1.x86_64",
"SUSE Real Time Module 15 SP7:cluster-md-kmp-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:dlm-kmp-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:gfs2-kmp-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-devel-rt-6.4.0-150700.7.34.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-rt-devel-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-source-rt-6.4.0-150700.7.34.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-syms-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:ocfs2-kmp-rt-6.4.0-150700.7.34.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-03-23T09:09:02Z",
"details": "moderate"
}
],
"title": "CVE-2025-71232"
},
{
"cve": "CVE-2025-71234",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-71234"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nwifi: rtl8xxxu: fix slab-out-of-bounds in rtl8xxxu_sta_add\n\nThe driver does not set hw-\u003esta_data_size, which causes mac80211 to\nallocate insufficient space for driver private station data in\n__sta_info_alloc(). When rtl8xxxu_sta_add() accesses members of\nstruct rtl8xxxu_sta_info through sta-\u003edrv_priv, this results in a\nslab-out-of-bounds write.\n\nKASAN report on RISC-V (VisionFive 2) with RTL8192EU adapter:\n\n BUG: KASAN: slab-out-of-bounds in rtl8xxxu_sta_add+0x31c/0x346\n Write of size 8 at addr ffffffd6d3e9ae88 by task kworker/u16:0/12\n\nSet hw-\u003esta_data_size to sizeof(struct rtl8xxxu_sta_info) during\nprobe, similar to how hw-\u003evif_data_size is configured. This ensures\nmac80211 allocates sufficient space for the driver\u0027s per-station\nprivate data.\n\nTested on StarFive VisionFive 2 v1.2A board.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_7_34-rt-1-150700.1.3.1.x86_64",
"SUSE Real Time Module 15 SP7:cluster-md-kmp-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:dlm-kmp-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:gfs2-kmp-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-devel-rt-6.4.0-150700.7.34.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-rt-devel-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-source-rt-6.4.0-150700.7.34.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-syms-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:ocfs2-kmp-rt-6.4.0-150700.7.34.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-71234",
"url": "https://www.suse.com/security/cve/CVE-2025-71234"
},
{
"category": "external",
"summary": "SUSE Bug 1258419 for CVE-2025-71234",
"url": "https://bugzilla.suse.com/1258419"
},
{
"category": "external",
"summary": "SUSE Bug 1258420 for CVE-2025-71234",
"url": "https://bugzilla.suse.com/1258420"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_7_34-rt-1-150700.1.3.1.x86_64",
"SUSE Real Time Module 15 SP7:cluster-md-kmp-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:dlm-kmp-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:gfs2-kmp-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-devel-rt-6.4.0-150700.7.34.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-rt-devel-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-source-rt-6.4.0-150700.7.34.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-syms-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:ocfs2-kmp-rt-6.4.0-150700.7.34.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_7_34-rt-1-150700.1.3.1.x86_64",
"SUSE Real Time Module 15 SP7:cluster-md-kmp-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:dlm-kmp-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:gfs2-kmp-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-devel-rt-6.4.0-150700.7.34.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-rt-devel-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-source-rt-6.4.0-150700.7.34.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-syms-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:ocfs2-kmp-rt-6.4.0-150700.7.34.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-03-23T09:09:02Z",
"details": "important"
}
],
"title": "CVE-2025-71234"
},
{
"cve": "CVE-2025-71235",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-71235"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nscsi: qla2xxx: Delay module unload while fabric scan in progress\n\nSystem crash seen during load/unload test in a loop.\n\n[105954.384919] RBP: ffff914589838dc0 R08: 0000000000000000 R09: 0000000000000086\n[105954.384920] R10: 000000000000000f R11: ffffa31240904be5 R12: ffff914605f868e0\n[105954.384921] R13: ffff914605f86910 R14: 0000000000008010 R15: 00000000ddb7c000\n[105954.384923] FS: 0000000000000000(0000) GS:ffff9163fec40000(0000) knlGS:0000000000000000\n[105954.384925] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033\n[105954.384926] CR2: 000055d31ce1d6a0 CR3: 0000000119f5e001 CR4: 0000000000770ee0\n[105954.384928] PKRU: 55555554\n[105954.384929] Call Trace:\n[105954.384931] \u003cIRQ\u003e\n[105954.384934] qla24xx_sp_unmap+0x1f3/0x2a0 [qla2xxx]\n[105954.384962] ? qla_async_scan_sp_done+0x114/0x1f0 [qla2xxx]\n[105954.384980] ? qla24xx_els_ct_entry+0x4de/0x760 [qla2xxx]\n[105954.384999] ? __wake_up_common+0x80/0x190\n[105954.385004] ? qla24xx_process_response_queue+0xc2/0xaa0 [qla2xxx]\n[105954.385023] ? qla24xx_msix_rsp_q+0x44/0xb0 [qla2xxx]\n[105954.385040] ? __handle_irq_event_percpu+0x3d/0x190\n[105954.385044] ? handle_irq_event+0x58/0xb0\n[105954.385046] ? handle_edge_irq+0x93/0x240\n[105954.385050] ? __common_interrupt+0x41/0xa0\n[105954.385055] ? common_interrupt+0x3e/0xa0\n[105954.385060] ? asm_common_interrupt+0x22/0x40\n\nThe root cause of this was that there was a free (dma_free_attrs) in the\ninterrupt context. There was a device discovery/fabric scan in\nprogress. A module unload was issued which set the UNLOADING flag. As\npart of the discovery, after receiving an interrupt a work queue was\nscheduled (which involved a work to be queued). Since the UNLOADING\nflag is set, the work item was not allocated and the mapped memory had\nto be freed. The free occurred in interrupt context leading to system\ncrash. Delay the driver unload until the fabric scan is complete to\navoid the crash.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_7_34-rt-1-150700.1.3.1.x86_64",
"SUSE Real Time Module 15 SP7:cluster-md-kmp-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:dlm-kmp-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:gfs2-kmp-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-devel-rt-6.4.0-150700.7.34.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-rt-devel-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-source-rt-6.4.0-150700.7.34.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-syms-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:ocfs2-kmp-rt-6.4.0-150700.7.34.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-71235",
"url": "https://www.suse.com/security/cve/CVE-2025-71235"
},
{
"category": "external",
"summary": "SUSE Bug 1258469 for CVE-2025-71235",
"url": "https://bugzilla.suse.com/1258469"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_7_34-rt-1-150700.1.3.1.x86_64",
"SUSE Real Time Module 15 SP7:cluster-md-kmp-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:dlm-kmp-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:gfs2-kmp-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-devel-rt-6.4.0-150700.7.34.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-rt-devel-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-source-rt-6.4.0-150700.7.34.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-syms-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:ocfs2-kmp-rt-6.4.0-150700.7.34.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_7_34-rt-1-150700.1.3.1.x86_64",
"SUSE Real Time Module 15 SP7:cluster-md-kmp-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:dlm-kmp-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:gfs2-kmp-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-devel-rt-6.4.0-150700.7.34.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-rt-devel-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-source-rt-6.4.0-150700.7.34.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-syms-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:ocfs2-kmp-rt-6.4.0-150700.7.34.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-03-23T09:09:02Z",
"details": "moderate"
}
],
"title": "CVE-2025-71235"
},
{
"cve": "CVE-2025-71236",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-71236"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nscsi: qla2xxx: Validate sp before freeing associated memory\n\nSystem crash with the following signature\n[154563.214890] nvme nvme2: NVME-FC{1}: controller connect complete\n[154564.169363] qla2xxx [0000:b0:00.1]-3002:2: nvme: Sched: Set ZIO exchange threshold to 3.\n[154564.169405] qla2xxx [0000:b0:00.1]-ffffff:2: SET ZIO Activity exchange threshold to 5.\n[154565.539974] qla2xxx [0000:b0:00.1]-5013:2: RSCN database changed - 0078 0080 0000.\n[154565.545744] qla2xxx [0000:b0:00.1]-5013:2: RSCN database changed - 0078 00a0 0000.\n[154565.545857] qla2xxx [0000:b0:00.1]-11a2:2: FEC=enabled (data rate).\n[154565.552760] qla2xxx [0000:b0:00.1]-11a2:2: FEC=enabled (data rate).\n[154565.553079] BUG: kernel NULL pointer dereference, address: 00000000000000f8\n[154565.553080] #PF: supervisor read access in kernel mode\n[154565.553082] #PF: error_code(0x0000) - not-present page\n[154565.553084] PGD 80000010488ab067 P4D 80000010488ab067 PUD 104978a067 PMD 0\n[154565.553089] Oops: 0000 1 PREEMPT SMP PTI\n[154565.553092] CPU: 10 PID: 858 Comm: qla2xxx_2_dpc Kdump: loaded Tainted: G OE ------- --- 5.14.0-503.11.1.el9_5.x86_64 #1\n[154565.553096] Hardware name: HPE Synergy 660 Gen10/Synergy 660 Gen10 Compute Module, BIOS I43 09/30/2024\n[154565.553097] RIP: 0010:qla_fab_async_scan.part.0+0x40b/0x870 [qla2xxx]\n[154565.553141] Code: 00 00 e8 58 a3 ec d4 49 89 e9 ba 12 20 00 00 4c 89 e6 49 c7 c0 00 ee a8 c0 48 c7 c1 66 c0 a9 c0 bf 00 80 00 10 e8 15 69 00 00 \u003c4c\u003e 8b 8d f8 00 00 00 4d 85 c9 74 35 49 8b 84 24 00 19 00 00 48 8b\n[154565.553143] RSP: 0018:ffffb4dbc8aebdd0 EFLAGS: 00010286\n[154565.553145] RAX: 0000000000000000 RBX: ffff8ec2cf0908d0 RCX: 0000000000000002\n[154565.553147] RDX: 0000000000000000 RSI: ffffffffc0a9c896 RDI: ffffb4dbc8aebd47\n[154565.553148] RBP: 0000000000000000 R08: ffffb4dbc8aebd45 R09: 0000000000ffff0a\n[154565.553150] R10: 0000000000000000 R11: 000000000000000f R12: ffff8ec2cf0908d0\n[154565.553151] R13: ffff8ec2cf090900 R14: 0000000000000102 R15: ffff8ec2cf084000\n[154565.553152] FS: 0000000000000000(0000) GS:ffff8ed27f800000(0000) knlGS:0000000000000000\n[154565.553154] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033\n[154565.553155] CR2: 00000000000000f8 CR3: 000000113ae0a005 CR4: 00000000007706f0\n[154565.553157] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000\n[154565.553158] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400\n[154565.553159] PKRU: 55555554\n[154565.553160] Call Trace:\n[154565.553162] \u003cTASK\u003e\n[154565.553165] ? show_trace_log_lvl+0x1c4/0x2df\n[154565.553172] ? show_trace_log_lvl+0x1c4/0x2df\n[154565.553177] ? qla_fab_async_scan.part.0+0x40b/0x870 [qla2xxx]\n[154565.553215] ? __die_body.cold+0x8/0xd\n[154565.553218] ? page_fault_oops+0x134/0x170\n[154565.553223] ? snprintf+0x49/0x70\n[154565.553229] ? exc_page_fault+0x62/0x150\n[154565.553238] ? asm_exc_page_fault+0x22/0x30\n\nCheck for sp being non NULL before freeing any associated memory",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_7_34-rt-1-150700.1.3.1.x86_64",
"SUSE Real Time Module 15 SP7:cluster-md-kmp-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:dlm-kmp-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:gfs2-kmp-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-devel-rt-6.4.0-150700.7.34.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-rt-devel-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-source-rt-6.4.0-150700.7.34.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-syms-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:ocfs2-kmp-rt-6.4.0-150700.7.34.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-71236",
"url": "https://www.suse.com/security/cve/CVE-2025-71236"
},
{
"category": "external",
"summary": "SUSE Bug 1258442 for CVE-2025-71236",
"url": "https://bugzilla.suse.com/1258442"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_7_34-rt-1-150700.1.3.1.x86_64",
"SUSE Real Time Module 15 SP7:cluster-md-kmp-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:dlm-kmp-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:gfs2-kmp-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-devel-rt-6.4.0-150700.7.34.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-rt-devel-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-source-rt-6.4.0-150700.7.34.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-syms-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:ocfs2-kmp-rt-6.4.0-150700.7.34.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_7_34-rt-1-150700.1.3.1.x86_64",
"SUSE Real Time Module 15 SP7:cluster-md-kmp-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:dlm-kmp-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:gfs2-kmp-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-devel-rt-6.4.0-150700.7.34.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-rt-devel-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-source-rt-6.4.0-150700.7.34.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-syms-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:ocfs2-kmp-rt-6.4.0-150700.7.34.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-03-23T09:09:02Z",
"details": "moderate"
}
],
"title": "CVE-2025-71236"
},
{
"cve": "CVE-2026-22979",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2026-22979"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nnet: fix memory leak in skb_segment_list for GRO packets\n\nWhen skb_segment_list() is called during packet forwarding, it handles\npackets that were aggregated by the GRO engine.\n\nHistorically, the segmentation logic in skb_segment_list assumes that\nindividual segments are split from a parent SKB and may need to carry\ntheir own socket memory accounting. Accordingly, the code transfers\ntruesize from the parent to the newly created segments.\n\nPrior to commit ed4cccef64c1 (\"gro: fix ownership transfer\"), this\ntruesize subtraction in skb_segment_list() was valid because fragments\nstill carry a reference to the original socket.\n\nHowever, commit ed4cccef64c1 (\"gro: fix ownership transfer\") changed\nthis behavior by ensuring that fraglist entries are explicitly\norphaned (skb-\u003esk = NULL) to prevent illegal orphaning later in the\nstack. This change meant that the entire socket memory charge remained\nwith the head SKB, but the corresponding accounting logic in\nskb_segment_list() was never updated.\n\nAs a result, the current code unconditionally adds each fragment\u0027s\ntruesize to delta_truesize and subtracts it from the parent SKB. Since\nthe fragments are no longer charged to the socket, this subtraction\nresults in an effective under-count of memory when the head is freed.\nThis causes sk_wmem_alloc to remain non-zero, preventing socket\ndestruction and leading to a persistent memory leak.\n\nThe leak can be observed via KMEMLEAK when tearing down the networking\nenvironment:\n\nunreferenced object 0xffff8881e6eb9100 (size 2048):\n comm \"ping\", pid 6720, jiffies 4295492526\n backtrace:\n kmem_cache_alloc_noprof+0x5c6/0x800\n sk_prot_alloc+0x5b/0x220\n sk_alloc+0x35/0xa00\n inet6_create.part.0+0x303/0x10d0\n __sock_create+0x248/0x640\n __sys_socket+0x11b/0x1d0\n\nSince skb_segment_list() is exclusively used for SKB_GSO_FRAGLIST\npackets constructed by GRO, the truesize adjustment is removed.\n\nThe call to skb_release_head_state() must be preserved. As documented in\ncommit cf673ed0e057 (\"net: fix fraglist segmentation reference count\nleak\"), it is still required to correctly drop references to SKB\nextensions that may be overwritten during __copy_skb_header().",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_7_34-rt-1-150700.1.3.1.x86_64",
"SUSE Real Time Module 15 SP7:cluster-md-kmp-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:dlm-kmp-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:gfs2-kmp-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-devel-rt-6.4.0-150700.7.34.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-rt-devel-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-source-rt-6.4.0-150700.7.34.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-syms-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:ocfs2-kmp-rt-6.4.0-150700.7.34.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2026-22979",
"url": "https://www.suse.com/security/cve/CVE-2026-22979"
},
{
"category": "external",
"summary": "SUSE Bug 1257228 for CVE-2026-22979",
"url": "https://bugzilla.suse.com/1257228"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_7_34-rt-1-150700.1.3.1.x86_64",
"SUSE Real Time Module 15 SP7:cluster-md-kmp-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:dlm-kmp-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:gfs2-kmp-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-devel-rt-6.4.0-150700.7.34.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-rt-devel-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-source-rt-6.4.0-150700.7.34.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-syms-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:ocfs2-kmp-rt-6.4.0-150700.7.34.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_7_34-rt-1-150700.1.3.1.x86_64",
"SUSE Real Time Module 15 SP7:cluster-md-kmp-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:dlm-kmp-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:gfs2-kmp-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-devel-rt-6.4.0-150700.7.34.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-rt-devel-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-source-rt-6.4.0-150700.7.34.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-syms-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:ocfs2-kmp-rt-6.4.0-150700.7.34.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-03-23T09:09:02Z",
"details": "moderate"
}
],
"title": "CVE-2026-22979"
},
{
"cve": "CVE-2026-22982",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2026-22982"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nnet: mscc: ocelot: Fix crash when adding interface under a lag\n\nCommit 15faa1f67ab4 (\"lan966x: Fix crash when adding interface under a lag\")\nfixed a similar issue in the lan966x driver caused by a NULL pointer dereference.\nThe ocelot_set_aggr_pgids() function in the ocelot driver has similar logic\nand is susceptible to the same crash.\n\nThis issue specifically affects the ocelot_vsc7514.c frontend, which leaves\nunused ports as NULL pointers. The felix_vsc9959.c frontend is unaffected as\nit uses the DSA framework which registers all ports.\n\nFix this by checking if the port pointer is valid before accessing it.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_7_34-rt-1-150700.1.3.1.x86_64",
"SUSE Real Time Module 15 SP7:cluster-md-kmp-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:dlm-kmp-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:gfs2-kmp-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-devel-rt-6.4.0-150700.7.34.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-rt-devel-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-source-rt-6.4.0-150700.7.34.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-syms-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:ocfs2-kmp-rt-6.4.0-150700.7.34.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2026-22982",
"url": "https://www.suse.com/security/cve/CVE-2026-22982"
},
{
"category": "external",
"summary": "SUSE Bug 1257179 for CVE-2026-22982",
"url": "https://bugzilla.suse.com/1257179"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_7_34-rt-1-150700.1.3.1.x86_64",
"SUSE Real Time Module 15 SP7:cluster-md-kmp-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:dlm-kmp-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:gfs2-kmp-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-devel-rt-6.4.0-150700.7.34.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-rt-devel-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-source-rt-6.4.0-150700.7.34.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-syms-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:ocfs2-kmp-rt-6.4.0-150700.7.34.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_7_34-rt-1-150700.1.3.1.x86_64",
"SUSE Real Time Module 15 SP7:cluster-md-kmp-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:dlm-kmp-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:gfs2-kmp-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-devel-rt-6.4.0-150700.7.34.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-rt-devel-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-source-rt-6.4.0-150700.7.34.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-syms-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:ocfs2-kmp-rt-6.4.0-150700.7.34.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-03-23T09:09:02Z",
"details": "moderate"
}
],
"title": "CVE-2026-22982"
},
{
"cve": "CVE-2026-22989",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2026-22989"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nnfsd: check that server is running in unlock_filesystem\n\nIf we are trying to unlock the filesystem via an administrative\ninterface and nfsd isn\u0027t running, it crashes the server. This\nhappens currently because nfsd4_revoke_states() access state\nstructures (eg., conf_id_hashtbl) that has been freed as a part\nof the server shutdown.\n\n[ 59.465072] Call trace:\n[ 59.465308] nfsd4_revoke_states+0x1b4/0x898 [nfsd] (P)\n[ 59.465830] write_unlock_fs+0x258/0x440 [nfsd]\n[ 59.466278] nfsctl_transaction_write+0xb0/0x120 [nfsd]\n[ 59.466780] vfs_write+0x1f0/0x938\n[ 59.467088] ksys_write+0xfc/0x1f8\n[ 59.467395] __arm64_sys_write+0x74/0xb8\n[ 59.467746] invoke_syscall.constprop.0+0xdc/0x1e8\n[ 59.468177] do_el0_svc+0x154/0x1d8\n[ 59.468489] el0_svc+0x40/0xe0\n[ 59.468767] el0t_64_sync_handler+0xa0/0xe8\n[ 59.469138] el0t_64_sync+0x1ac/0x1b0\n\nEnsure this can\u0027t happen by taking the nfsd_mutex and checking that\nthe server is still up, and then holding the mutex across the call to\nnfsd4_revoke_states().",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_7_34-rt-1-150700.1.3.1.x86_64",
"SUSE Real Time Module 15 SP7:cluster-md-kmp-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:dlm-kmp-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:gfs2-kmp-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-devel-rt-6.4.0-150700.7.34.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-rt-devel-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-source-rt-6.4.0-150700.7.34.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-syms-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:ocfs2-kmp-rt-6.4.0-150700.7.34.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2026-22989",
"url": "https://www.suse.com/security/cve/CVE-2026-22989"
},
{
"category": "external",
"summary": "SUSE Bug 1257279 for CVE-2026-22989",
"url": "https://bugzilla.suse.com/1257279"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_7_34-rt-1-150700.1.3.1.x86_64",
"SUSE Real Time Module 15 SP7:cluster-md-kmp-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:dlm-kmp-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:gfs2-kmp-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-devel-rt-6.4.0-150700.7.34.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-rt-devel-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-source-rt-6.4.0-150700.7.34.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-syms-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:ocfs2-kmp-rt-6.4.0-150700.7.34.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_7_34-rt-1-150700.1.3.1.x86_64",
"SUSE Real Time Module 15 SP7:cluster-md-kmp-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:dlm-kmp-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:gfs2-kmp-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-devel-rt-6.4.0-150700.7.34.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-rt-devel-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-source-rt-6.4.0-150700.7.34.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-syms-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:ocfs2-kmp-rt-6.4.0-150700.7.34.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-03-23T09:09:02Z",
"details": "moderate"
}
],
"title": "CVE-2026-22989"
},
{
"cve": "CVE-2026-22998",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2026-22998"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nnvme-tcp: fix NULL pointer dereferences in nvmet_tcp_build_pdu_iovec\n\nCommit efa56305908b (\"nvmet-tcp: Fix a kernel panic when host sends an invalid H2C PDU length\")\nadded ttag bounds checking and data_offset\nvalidation in nvmet_tcp_handle_h2c_data_pdu(), but it did not validate\nwhether the command\u0027s data structures (cmd-\u003ereq.sg and cmd-\u003eiov) have\nbeen properly initialized before processing H2C_DATA PDUs.\n\nThe nvmet_tcp_build_pdu_iovec() function dereferences these pointers\nwithout NULL checks. This can be triggered by sending H2C_DATA PDU\nimmediately after the ICREQ/ICRESP handshake, before\nsending a CONNECT command or NVMe write command.\n\nAttack vectors that trigger NULL pointer dereferences:\n1. H2C_DATA PDU sent before CONNECT -\u003e both pointers NULL\n2. H2C_DATA PDU for READ command -\u003e cmd-\u003ereq.sg allocated, cmd-\u003eiov NULL\n3. H2C_DATA PDU for uninitialized command slot -\u003e both pointers NULL\n\nThe fix validates both cmd-\u003ereq.sg and cmd-\u003eiov before calling\nnvmet_tcp_build_pdu_iovec(). Both checks are required because:\n- Uninitialized commands: both NULL\n- READ commands: cmd-\u003ereq.sg allocated, cmd-\u003eiov NULL\n- WRITE commands: both allocated",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_7_34-rt-1-150700.1.3.1.x86_64",
"SUSE Real Time Module 15 SP7:cluster-md-kmp-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:dlm-kmp-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:gfs2-kmp-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-devel-rt-6.4.0-150700.7.34.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-rt-devel-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-source-rt-6.4.0-150700.7.34.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-syms-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:ocfs2-kmp-rt-6.4.0-150700.7.34.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2026-22998",
"url": "https://www.suse.com/security/cve/CVE-2026-22998"
},
{
"category": "external",
"summary": "SUSE Bug 1257209 for CVE-2026-22998",
"url": "https://bugzilla.suse.com/1257209"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_7_34-rt-1-150700.1.3.1.x86_64",
"SUSE Real Time Module 15 SP7:cluster-md-kmp-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:dlm-kmp-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:gfs2-kmp-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-devel-rt-6.4.0-150700.7.34.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-rt-devel-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-source-rt-6.4.0-150700.7.34.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-syms-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:ocfs2-kmp-rt-6.4.0-150700.7.34.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_7_34-rt-1-150700.1.3.1.x86_64",
"SUSE Real Time Module 15 SP7:cluster-md-kmp-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:dlm-kmp-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:gfs2-kmp-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-devel-rt-6.4.0-150700.7.34.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-rt-devel-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-source-rt-6.4.0-150700.7.34.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-syms-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:ocfs2-kmp-rt-6.4.0-150700.7.34.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-03-23T09:09:02Z",
"details": "moderate"
}
],
"title": "CVE-2026-22998"
},
{
"cve": "CVE-2026-23003",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2026-23003"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nip6_tunnel: use skb_vlan_inet_prepare() in __ip6_tnl_rcv()\n\nBlamed commit did not take care of VLAN encapsulations\nas spotted by syzbot [1].\n\nUse skb_vlan_inet_prepare() instead of pskb_inet_may_pull().\n\n[1]\n BUG: KMSAN: uninit-value in __INET_ECN_decapsulate include/net/inet_ecn.h:253 [inline]\n BUG: KMSAN: uninit-value in INET_ECN_decapsulate include/net/inet_ecn.h:275 [inline]\n BUG: KMSAN: uninit-value in IP6_ECN_decapsulate+0x7a8/0x1fa0 include/net/inet_ecn.h:321\n __INET_ECN_decapsulate include/net/inet_ecn.h:253 [inline]\n INET_ECN_decapsulate include/net/inet_ecn.h:275 [inline]\n IP6_ECN_decapsulate+0x7a8/0x1fa0 include/net/inet_ecn.h:321\n ip6ip6_dscp_ecn_decapsulate+0x16f/0x1b0 net/ipv6/ip6_tunnel.c:729\n __ip6_tnl_rcv+0xed9/0x1b50 net/ipv6/ip6_tunnel.c:860\n ip6_tnl_rcv+0xc3/0x100 net/ipv6/ip6_tunnel.c:903\n gre_rcv+0x1529/0x1b90 net/ipv6/ip6_gre.c:-1\n ip6_protocol_deliver_rcu+0x1c89/0x2c60 net/ipv6/ip6_input.c:438\n ip6_input_finish+0x1f4/0x4a0 net/ipv6/ip6_input.c:489\n NF_HOOK include/linux/netfilter.h:318 [inline]\n ip6_input+0x9c/0x330 net/ipv6/ip6_input.c:500\n ip6_mc_input+0x7ca/0xc10 net/ipv6/ip6_input.c:590\n dst_input include/net/dst.h:474 [inline]\n ip6_rcv_finish+0x958/0x990 net/ipv6/ip6_input.c:79\n NF_HOOK include/linux/netfilter.h:318 [inline]\n ipv6_rcv+0xf1/0x3c0 net/ipv6/ip6_input.c:311\n __netif_receive_skb_one_core net/core/dev.c:6139 [inline]\n __netif_receive_skb+0x1df/0xac0 net/core/dev.c:6252\n netif_receive_skb_internal net/core/dev.c:6338 [inline]\n netif_receive_skb+0x57/0x630 net/core/dev.c:6397\n tun_rx_batched+0x1df/0x980 drivers/net/tun.c:1485\n tun_get_user+0x5c0e/0x6c60 drivers/net/tun.c:1953\n tun_chr_write_iter+0x3e9/0x5c0 drivers/net/tun.c:1999\n new_sync_write fs/read_write.c:593 [inline]\n vfs_write+0xbe2/0x15d0 fs/read_write.c:686\n ksys_write fs/read_write.c:738 [inline]\n __do_sys_write fs/read_write.c:749 [inline]\n __se_sys_write fs/read_write.c:746 [inline]\n __x64_sys_write+0x1fb/0x4d0 fs/read_write.c:746\n x64_sys_call+0x30ab/0x3e70 arch/x86/include/generated/asm/syscalls_64.h:2\n do_syscall_x64 arch/x86/entry/syscall_64.c:63 [inline]\n do_syscall_64+0xd3/0xf80 arch/x86/entry/syscall_64.c:94\n entry_SYSCALL_64_after_hwframe+0x77/0x7f\n\nUninit was created at:\n slab_post_alloc_hook mm/slub.c:4960 [inline]\n slab_alloc_node mm/slub.c:5263 [inline]\n kmem_cache_alloc_node_noprof+0x9e7/0x17a0 mm/slub.c:5315\n kmalloc_reserve+0x13c/0x4b0 net/core/skbuff.c:586\n __alloc_skb+0x805/0x1040 net/core/skbuff.c:690\n alloc_skb include/linux/skbuff.h:1383 [inline]\n alloc_skb_with_frags+0xc5/0xa60 net/core/skbuff.c:6712\n sock_alloc_send_pskb+0xacc/0xc60 net/core/sock.c:2995\n tun_alloc_skb drivers/net/tun.c:1461 [inline]\n tun_get_user+0x1142/0x6c60 drivers/net/tun.c:1794\n tun_chr_write_iter+0x3e9/0x5c0 drivers/net/tun.c:1999\n new_sync_write fs/read_write.c:593 [inline]\n vfs_write+0xbe2/0x15d0 fs/read_write.c:686\n ksys_write fs/read_write.c:738 [inline]\n __do_sys_write fs/read_write.c:749 [inline]\n __se_sys_write fs/read_write.c:746 [inline]\n __x64_sys_write+0x1fb/0x4d0 fs/read_write.c:746\n x64_sys_call+0x30ab/0x3e70 arch/x86/include/generated/asm/syscalls_64.h:2\n do_syscall_x64 arch/x86/entry/syscall_64.c:63 [inline]\n do_syscall_64+0xd3/0xf80 arch/x86/entry/syscall_64.c:94\n entry_SYSCALL_64_after_hwframe+0x77/0x7f\n\nCPU: 0 UID: 0 PID: 6465 Comm: syz.0.17 Not tainted syzkaller #0 PREEMPT(none)\nHardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/25/2025",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_7_34-rt-1-150700.1.3.1.x86_64",
"SUSE Real Time Module 15 SP7:cluster-md-kmp-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:dlm-kmp-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:gfs2-kmp-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-devel-rt-6.4.0-150700.7.34.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-rt-devel-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-source-rt-6.4.0-150700.7.34.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-syms-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:ocfs2-kmp-rt-6.4.0-150700.7.34.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2026-23003",
"url": "https://www.suse.com/security/cve/CVE-2026-23003"
},
{
"category": "external",
"summary": "SUSE Bug 1257246 for CVE-2026-23003",
"url": "https://bugzilla.suse.com/1257246"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_7_34-rt-1-150700.1.3.1.x86_64",
"SUSE Real Time Module 15 SP7:cluster-md-kmp-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:dlm-kmp-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:gfs2-kmp-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-devel-rt-6.4.0-150700.7.34.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-rt-devel-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-source-rt-6.4.0-150700.7.34.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-syms-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:ocfs2-kmp-rt-6.4.0-150700.7.34.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.6,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_7_34-rt-1-150700.1.3.1.x86_64",
"SUSE Real Time Module 15 SP7:cluster-md-kmp-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:dlm-kmp-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:gfs2-kmp-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-devel-rt-6.4.0-150700.7.34.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-rt-devel-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-source-rt-6.4.0-150700.7.34.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-syms-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:ocfs2-kmp-rt-6.4.0-150700.7.34.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-03-23T09:09:02Z",
"details": "moderate"
}
],
"title": "CVE-2026-23003"
},
{
"cve": "CVE-2026-23004",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2026-23004"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\ndst: fix races in rt6_uncached_list_del() and rt_del_uncached_list()\n\nsyzbot was able to crash the kernel in rt6_uncached_list_flush_dev()\nin an interesting way [1]\n\nCrash happens in list_del_init()/INIT_LIST_HEAD() while writing\nlist-\u003eprev, while the prior write on list-\u003enext went well.\n\nstatic inline void INIT_LIST_HEAD(struct list_head *list)\n{\n\tWRITE_ONCE(list-\u003enext, list); // This went well\n\tWRITE_ONCE(list-\u003eprev, list); // Crash, @list has been freed.\n}\n\nIssue here is that rt6_uncached_list_del() did not attempt to lock\nul-\u003elock, as list_empty(\u0026rt-\u003edst.rt_uncached) returned\ntrue because the WRITE_ONCE(list-\u003enext, list) happened on the other CPU.\n\nWe might use list_del_init_careful() and list_empty_careful(),\nor make sure rt6_uncached_list_del() always grabs the spinlock\nwhenever rt-\u003edst.rt_uncached_list has been set.\n\nA similar fix is neeed for IPv4.\n\n[1]\n\n BUG: KASAN: slab-use-after-free in INIT_LIST_HEAD include/linux/list.h:46 [inline]\n BUG: KASAN: slab-use-after-free in list_del_init include/linux/list.h:296 [inline]\n BUG: KASAN: slab-use-after-free in rt6_uncached_list_flush_dev net/ipv6/route.c:191 [inline]\n BUG: KASAN: slab-use-after-free in rt6_disable_ip+0x633/0x730 net/ipv6/route.c:5020\nWrite of size 8 at addr ffff8880294cfa78 by task kworker/u8:14/3450\n\nCPU: 0 UID: 0 PID: 3450 Comm: kworker/u8:14 Tainted: G L syzkaller #0 PREEMPT_{RT,(full)}\nTainted: [L]=SOFTLOCKUP\nHardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/25/2025\nWorkqueue: netns cleanup_net\nCall Trace:\n \u003cTASK\u003e\n dump_stack_lvl+0xe8/0x150 lib/dump_stack.c:120\n print_address_description mm/kasan/report.c:378 [inline]\n print_report+0xca/0x240 mm/kasan/report.c:482\n kasan_report+0x118/0x150 mm/kasan/report.c:595\n INIT_LIST_HEAD include/linux/list.h:46 [inline]\n list_del_init include/linux/list.h:296 [inline]\n rt6_uncached_list_flush_dev net/ipv6/route.c:191 [inline]\n rt6_disable_ip+0x633/0x730 net/ipv6/route.c:5020\n addrconf_ifdown+0x143/0x18a0 net/ipv6/addrconf.c:3853\n addrconf_notify+0x1bc/0x1050 net/ipv6/addrconf.c:-1\n notifier_call_chain+0x19d/0x3a0 kernel/notifier.c:85\n call_netdevice_notifiers_extack net/core/dev.c:2268 [inline]\n call_netdevice_notifiers net/core/dev.c:2282 [inline]\n netif_close_many+0x29c/0x410 net/core/dev.c:1785\n unregister_netdevice_many_notify+0xb50/0x2330 net/core/dev.c:12353\n ops_exit_rtnl_list net/core/net_namespace.c:187 [inline]\n ops_undo_list+0x3dc/0x990 net/core/net_namespace.c:248\n cleanup_net+0x4de/0x7b0 net/core/net_namespace.c:696\n process_one_work kernel/workqueue.c:3257 [inline]\n process_scheduled_works+0xad1/0x1770 kernel/workqueue.c:3340\n worker_thread+0x8a0/0xda0 kernel/workqueue.c:3421\n kthread+0x711/0x8a0 kernel/kthread.c:463\n ret_from_fork+0x510/0xa50 arch/x86/kernel/process.c:158\n ret_from_fork_asm+0x1a/0x30 arch/x86/entry/entry_64.S:246\n \u003c/TASK\u003e\n\nAllocated by task 803:\n kasan_save_stack mm/kasan/common.c:57 [inline]\n kasan_save_track+0x3e/0x80 mm/kasan/common.c:78\n unpoison_slab_object mm/kasan/common.c:340 [inline]\n __kasan_slab_alloc+0x6c/0x80 mm/kasan/common.c:366\n kasan_slab_alloc include/linux/kasan.h:253 [inline]\n slab_post_alloc_hook mm/slub.c:4953 [inline]\n slab_alloc_node mm/slub.c:5263 [inline]\n kmem_cache_alloc_noprof+0x18d/0x6c0 mm/slub.c:5270\n dst_alloc+0x105/0x170 net/core/dst.c:89\n ip6_dst_alloc net/ipv6/route.c:342 [inline]\n icmp6_dst_alloc+0x75/0x460 net/ipv6/route.c:3333\n mld_sendpack+0x683/0xe60 net/ipv6/mcast.c:1844\n mld_send_cr net/ipv6/mcast.c:2154 [inline]\n mld_ifc_work+0x83e/0xd60 net/ipv6/mcast.c:2693\n process_one_work kernel/workqueue.c:3257 [inline]\n process_scheduled_works+0xad1/0x1770 kernel/workqueue.c:3340\n worker_thread+0x8a0/0xda0 kernel/workqueue.c:3421\n kthread+0x711/0x8a0 kernel/kthread.c:463\n ret_from_fork+0x510/0xa50 arch/x86/kernel/process.c:158\n ret_from_fork_asm+0x1a/0x30 arch/x86/entry/entr\n---truncated---",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_7_34-rt-1-150700.1.3.1.x86_64",
"SUSE Real Time Module 15 SP7:cluster-md-kmp-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:dlm-kmp-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:gfs2-kmp-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-devel-rt-6.4.0-150700.7.34.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-rt-devel-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-source-rt-6.4.0-150700.7.34.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-syms-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:ocfs2-kmp-rt-6.4.0-150700.7.34.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2026-23004",
"url": "https://www.suse.com/security/cve/CVE-2026-23004"
},
{
"category": "external",
"summary": "SUSE Bug 1257231 for CVE-2026-23004",
"url": "https://bugzilla.suse.com/1257231"
},
{
"category": "external",
"summary": "SUSE Bug 1258655 for CVE-2026-23004",
"url": "https://bugzilla.suse.com/1258655"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_7_34-rt-1-150700.1.3.1.x86_64",
"SUSE Real Time Module 15 SP7:cluster-md-kmp-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:dlm-kmp-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:gfs2-kmp-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-devel-rt-6.4.0-150700.7.34.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-rt-devel-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-source-rt-6.4.0-150700.7.34.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-syms-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:ocfs2-kmp-rt-6.4.0-150700.7.34.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_7_34-rt-1-150700.1.3.1.x86_64",
"SUSE Real Time Module 15 SP7:cluster-md-kmp-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:dlm-kmp-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:gfs2-kmp-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-devel-rt-6.4.0-150700.7.34.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-rt-devel-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-source-rt-6.4.0-150700.7.34.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-syms-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:ocfs2-kmp-rt-6.4.0-150700.7.34.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-03-23T09:09:02Z",
"details": "important"
}
],
"title": "CVE-2026-23004"
},
{
"cve": "CVE-2026-23010",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2026-23010"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nipv6: Fix use-after-free in inet6_addr_del().\n\nsyzbot reported use-after-free of inet6_ifaddr in\ninet6_addr_del(). [0]\n\nThe cited commit accidentally moved ipv6_del_addr() for\nmngtmpaddr before reading its ifp-\u003eflags for temporary\naddresses in inet6_addr_del().\n\nLet\u0027s move ipv6_del_addr() down to fix the UAF.\n\n[0]:\nBUG: KASAN: slab-use-after-free in inet6_addr_del.constprop.0+0x67a/0x6b0 net/ipv6/addrconf.c:3117\nRead of size 4 at addr ffff88807b89c86c by task syz.3.1618/9593\n\nCPU: 0 UID: 0 PID: 9593 Comm: syz.3.1618 Not tainted syzkaller #0 PREEMPT(full)\nHardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/25/2025\nCall Trace:\n \u003cTASK\u003e\n __dump_stack lib/dump_stack.c:94 [inline]\n dump_stack_lvl+0x116/0x1f0 lib/dump_stack.c:120\n print_address_description mm/kasan/report.c:378 [inline]\n print_report+0xcd/0x630 mm/kasan/report.c:482\n kasan_report+0xe0/0x110 mm/kasan/report.c:595\n inet6_addr_del.constprop.0+0x67a/0x6b0 net/ipv6/addrconf.c:3117\n addrconf_del_ifaddr+0x11e/0x190 net/ipv6/addrconf.c:3181\n inet6_ioctl+0x1e5/0x2b0 net/ipv6/af_inet6.c:582\n sock_do_ioctl+0x118/0x280 net/socket.c:1254\n sock_ioctl+0x227/0x6b0 net/socket.c:1375\n vfs_ioctl fs/ioctl.c:51 [inline]\n __do_sys_ioctl fs/ioctl.c:597 [inline]\n __se_sys_ioctl fs/ioctl.c:583 [inline]\n __x64_sys_ioctl+0x18e/0x210 fs/ioctl.c:583\n do_syscall_x64 arch/x86/entry/syscall_64.c:63 [inline]\n do_syscall_64+0xcd/0xf80 arch/x86/entry/syscall_64.c:94\n entry_SYSCALL_64_after_hwframe+0x77/0x7f\nRIP: 0033:0x7f164cf8f749\nCode: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 \u003c48\u003e 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48\nRSP: 002b:00007f164de64038 EFLAGS: 00000246 ORIG_RAX: 0000000000000010\nRAX: ffffffffffffffda RBX: 00007f164d1e5fa0 RCX: 00007f164cf8f749\nRDX: 0000200000000000 RSI: 0000000000008936 RDI: 0000000000000003\nRBP: 00007f164d013f91 R08: 0000000000000000 R09: 0000000000000000\nR10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000\nR13: 00007f164d1e6038 R14: 00007f164d1e5fa0 R15: 00007ffde15c8288\n \u003c/TASK\u003e\n\nAllocated by task 9593:\n kasan_save_stack+0x33/0x60 mm/kasan/common.c:56\n kasan_save_track+0x14/0x30 mm/kasan/common.c:77\n poison_kmalloc_redzone mm/kasan/common.c:397 [inline]\n __kasan_kmalloc+0xaa/0xb0 mm/kasan/common.c:414\n kmalloc_noprof include/linux/slab.h:957 [inline]\n kzalloc_noprof include/linux/slab.h:1094 [inline]\n ipv6_add_addr+0x4e3/0x2010 net/ipv6/addrconf.c:1120\n inet6_addr_add+0x256/0x9b0 net/ipv6/addrconf.c:3050\n addrconf_add_ifaddr+0x1fc/0x450 net/ipv6/addrconf.c:3160\n inet6_ioctl+0x103/0x2b0 net/ipv6/af_inet6.c:580\n sock_do_ioctl+0x118/0x280 net/socket.c:1254\n sock_ioctl+0x227/0x6b0 net/socket.c:1375\n vfs_ioctl fs/ioctl.c:51 [inline]\n __do_sys_ioctl fs/ioctl.c:597 [inline]\n __se_sys_ioctl fs/ioctl.c:583 [inline]\n __x64_sys_ioctl+0x18e/0x210 fs/ioctl.c:583\n do_syscall_x64 arch/x86/entry/syscall_64.c:63 [inline]\n do_syscall_64+0xcd/0xf80 arch/x86/entry/syscall_64.c:94\n entry_SYSCALL_64_after_hwframe+0x77/0x7f\n\nFreed by task 6099:\n kasan_save_stack+0x33/0x60 mm/kasan/common.c:56\n kasan_save_track+0x14/0x30 mm/kasan/common.c:77\n kasan_save_free_info+0x3b/0x60 mm/kasan/generic.c:584\n poison_slab_object mm/kasan/common.c:252 [inline]\n __kasan_slab_free+0x5f/0x80 mm/kasan/common.c:284\n kasan_slab_free include/linux/kasan.h:234 [inline]\n slab_free_hook mm/slub.c:2540 [inline]\n slab_free_freelist_hook mm/slub.c:2569 [inline]\n slab_free_bulk mm/slub.c:6696 [inline]\n kmem_cache_free_bulk mm/slub.c:7383 [inline]\n kmem_cache_free_bulk+0x2bf/0x680 mm/slub.c:7362\n kfree_bulk include/linux/slab.h:830 [inline]\n kvfree_rcu_bulk+0x1b7/0x1e0 mm/slab_common.c:1523\n kvfree_rcu_drain_ready mm/slab_common.c:1728 [inline]\n kfree_rcu_monitor+0x1d0/0x2f0 mm/slab_common.c:1801\n process_one_work+0x9ba/0x1b20 kernel/workqueue.c:3257\n process_scheduled_works kernel/workqu\n---truncated---",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_7_34-rt-1-150700.1.3.1.x86_64",
"SUSE Real Time Module 15 SP7:cluster-md-kmp-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:dlm-kmp-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:gfs2-kmp-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-devel-rt-6.4.0-150700.7.34.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-rt-devel-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-source-rt-6.4.0-150700.7.34.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-syms-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:ocfs2-kmp-rt-6.4.0-150700.7.34.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2026-23010",
"url": "https://www.suse.com/security/cve/CVE-2026-23010"
},
{
"category": "external",
"summary": "SUSE Bug 1257332 for CVE-2026-23010",
"url": "https://bugzilla.suse.com/1257332"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_7_34-rt-1-150700.1.3.1.x86_64",
"SUSE Real Time Module 15 SP7:cluster-md-kmp-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:dlm-kmp-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:gfs2-kmp-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-devel-rt-6.4.0-150700.7.34.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-rt-devel-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-source-rt-6.4.0-150700.7.34.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-syms-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:ocfs2-kmp-rt-6.4.0-150700.7.34.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.1,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_7_34-rt-1-150700.1.3.1.x86_64",
"SUSE Real Time Module 15 SP7:cluster-md-kmp-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:dlm-kmp-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:gfs2-kmp-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-devel-rt-6.4.0-150700.7.34.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-rt-devel-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-source-rt-6.4.0-150700.7.34.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-syms-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:ocfs2-kmp-rt-6.4.0-150700.7.34.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-03-23T09:09:02Z",
"details": "moderate"
}
],
"title": "CVE-2026-23010"
},
{
"cve": "CVE-2026-23017",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2026-23017"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nidpf: fix error handling in the init_task on load\n\nIf the init_task fails during a driver load, we end up without vports and\nnetdevs, effectively failing the entire process. In that state a\nsubsequent reset will result in a crash as the service task attempts to\naccess uninitialized resources. Following trace is from an error in the\ninit_task where the CREATE_VPORT (op 501) is rejected by the FW:\n\n[40922.763136] idpf 0000:83:00.0: Device HW Reset initiated\n[40924.449797] idpf 0000:83:00.0: Transaction failed (op 501)\n[40958.148190] idpf 0000:83:00.0: HW reset detected\n[40958.161202] BUG: kernel NULL pointer dereference, address: 00000000000000a8\n...\n[40958.168094] Workqueue: idpf-0000:83:00.0-vc_event idpf_vc_event_task [idpf]\n[40958.168865] RIP: 0010:idpf_vc_event_task+0x9b/0x350 [idpf]\n...\n[40958.177932] Call Trace:\n[40958.178491] \u003cTASK\u003e\n[40958.179040] process_one_work+0x226/0x6d0\n[40958.179609] worker_thread+0x19e/0x340\n[40958.180158] ? __pfx_worker_thread+0x10/0x10\n[40958.180702] kthread+0x10f/0x250\n[40958.181238] ? __pfx_kthread+0x10/0x10\n[40958.181774] ret_from_fork+0x251/0x2b0\n[40958.182307] ? __pfx_kthread+0x10/0x10\n[40958.182834] ret_from_fork_asm+0x1a/0x30\n[40958.183370] \u003c/TASK\u003e\n\nFix the error handling in the init_task to make sure the service and\nmailbox tasks are disabled if the error happens during load. These are\nstarted in idpf_vc_core_init(), which spawns the init_task and has no way\nof knowing if it failed. If the error happens on reset, following\nsuccessful driver load, the tasks can still run, as that will allow the\nnetdevs to attempt recovery through another reset. Stop the PTP callbacks\neither way as those will be restarted by the call to idpf_vc_core_init()\nduring a successful reset.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_7_34-rt-1-150700.1.3.1.x86_64",
"SUSE Real Time Module 15 SP7:cluster-md-kmp-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:dlm-kmp-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:gfs2-kmp-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-devel-rt-6.4.0-150700.7.34.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-rt-devel-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-source-rt-6.4.0-150700.7.34.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-syms-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:ocfs2-kmp-rt-6.4.0-150700.7.34.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2026-23017",
"url": "https://www.suse.com/security/cve/CVE-2026-23017"
},
{
"category": "external",
"summary": "SUSE Bug 1257552 for CVE-2026-23017",
"url": "https://bugzilla.suse.com/1257552"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_7_34-rt-1-150700.1.3.1.x86_64",
"SUSE Real Time Module 15 SP7:cluster-md-kmp-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:dlm-kmp-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:gfs2-kmp-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-devel-rt-6.4.0-150700.7.34.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-rt-devel-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-source-rt-6.4.0-150700.7.34.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-syms-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:ocfs2-kmp-rt-6.4.0-150700.7.34.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_7_34-rt-1-150700.1.3.1.x86_64",
"SUSE Real Time Module 15 SP7:cluster-md-kmp-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:dlm-kmp-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:gfs2-kmp-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-devel-rt-6.4.0-150700.7.34.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-rt-devel-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-source-rt-6.4.0-150700.7.34.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-syms-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:ocfs2-kmp-rt-6.4.0-150700.7.34.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-03-23T09:09:02Z",
"details": "moderate"
}
],
"title": "CVE-2026-23017"
},
{
"cve": "CVE-2026-23021",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2026-23021"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nnet: usb: pegasus: fix memory leak in update_eth_regs_async()\n\nWhen asynchronously writing to the device registers and if usb_submit_urb()\nfail, the code fail to release allocated to this point resources.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_7_34-rt-1-150700.1.3.1.x86_64",
"SUSE Real Time Module 15 SP7:cluster-md-kmp-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:dlm-kmp-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:gfs2-kmp-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-devel-rt-6.4.0-150700.7.34.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-rt-devel-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-source-rt-6.4.0-150700.7.34.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-syms-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:ocfs2-kmp-rt-6.4.0-150700.7.34.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2026-23021",
"url": "https://www.suse.com/security/cve/CVE-2026-23021"
},
{
"category": "external",
"summary": "SUSE Bug 1257557 for CVE-2026-23021",
"url": "https://bugzilla.suse.com/1257557"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_7_34-rt-1-150700.1.3.1.x86_64",
"SUSE Real Time Module 15 SP7:cluster-md-kmp-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:dlm-kmp-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:gfs2-kmp-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-devel-rt-6.4.0-150700.7.34.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-rt-devel-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-source-rt-6.4.0-150700.7.34.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-syms-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:ocfs2-kmp-rt-6.4.0-150700.7.34.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 3.3,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_7_34-rt-1-150700.1.3.1.x86_64",
"SUSE Real Time Module 15 SP7:cluster-md-kmp-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:dlm-kmp-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:gfs2-kmp-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-devel-rt-6.4.0-150700.7.34.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-rt-devel-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-source-rt-6.4.0-150700.7.34.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-syms-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:ocfs2-kmp-rt-6.4.0-150700.7.34.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-03-23T09:09:02Z",
"details": "moderate"
}
],
"title": "CVE-2026-23021"
},
{
"cve": "CVE-2026-23023",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2026-23023"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nidpf: fix memory leak in idpf_vport_rel()\n\nFree vport-\u003erx_ptype_lkup in idpf_vport_rel() to avoid leaking memory\nduring a reset. Reported by kmemleak:\n\nunreferenced object 0xff450acac838a000 (size 4096):\n comm \"kworker/u258:5\", pid 7732, jiffies 4296830044\n hex dump (first 32 bytes):\n 00 00 00 00 00 10 00 00 00 10 00 00 00 00 00 00 ................\n 00 00 00 00 00 00 00 00 00 10 00 00 00 00 00 00 ................\n backtrace (crc 3da81902):\n __kmalloc_cache_noprof+0x469/0x7a0\n idpf_send_get_rx_ptype_msg+0x90/0x570 [idpf]\n idpf_init_task+0x1ec/0x8d0 [idpf]\n process_one_work+0x226/0x6d0\n worker_thread+0x19e/0x340\n kthread+0x10f/0x250\n ret_from_fork+0x251/0x2b0\n ret_from_fork_asm+0x1a/0x30",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_7_34-rt-1-150700.1.3.1.x86_64",
"SUSE Real Time Module 15 SP7:cluster-md-kmp-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:dlm-kmp-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:gfs2-kmp-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-devel-rt-6.4.0-150700.7.34.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-rt-devel-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-source-rt-6.4.0-150700.7.34.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-syms-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:ocfs2-kmp-rt-6.4.0-150700.7.34.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2026-23023",
"url": "https://www.suse.com/security/cve/CVE-2026-23023"
},
{
"category": "external",
"summary": "SUSE Bug 1257556 for CVE-2026-23023",
"url": "https://bugzilla.suse.com/1257556"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_7_34-rt-1-150700.1.3.1.x86_64",
"SUSE Real Time Module 15 SP7:cluster-md-kmp-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:dlm-kmp-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:gfs2-kmp-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-devel-rt-6.4.0-150700.7.34.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-rt-devel-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-source-rt-6.4.0-150700.7.34.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-syms-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:ocfs2-kmp-rt-6.4.0-150700.7.34.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 3.3,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_7_34-rt-1-150700.1.3.1.x86_64",
"SUSE Real Time Module 15 SP7:cluster-md-kmp-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:dlm-kmp-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:gfs2-kmp-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-devel-rt-6.4.0-150700.7.34.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-rt-devel-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-source-rt-6.4.0-150700.7.34.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-syms-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:ocfs2-kmp-rt-6.4.0-150700.7.34.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-03-23T09:09:02Z",
"details": "low"
}
],
"title": "CVE-2026-23023"
},
{
"cve": "CVE-2026-23026",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2026-23026"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\ndmaengine: qcom: gpi: Fix memory leak in gpi_peripheral_config()\n\nFix a memory leak in gpi_peripheral_config() where the original memory\npointed to by gchan-\u003econfig could be lost if krealloc() fails.\n\nThe issue occurs when:\n1. gchan-\u003econfig points to previously allocated memory\n2. krealloc() fails and returns NULL\n3. The function directly assigns NULL to gchan-\u003econfig, losing the\n reference to the original memory\n4. The original memory becomes unreachable and cannot be freed\n\nFix this by using a temporary variable to hold the krealloc() result\nand only updating gchan-\u003econfig when the allocation succeeds.\n\nFound via static analysis and code review.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_7_34-rt-1-150700.1.3.1.x86_64",
"SUSE Real Time Module 15 SP7:cluster-md-kmp-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:dlm-kmp-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:gfs2-kmp-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-devel-rt-6.4.0-150700.7.34.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-rt-devel-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-source-rt-6.4.0-150700.7.34.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-syms-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:ocfs2-kmp-rt-6.4.0-150700.7.34.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2026-23026",
"url": "https://www.suse.com/security/cve/CVE-2026-23026"
},
{
"category": "external",
"summary": "SUSE Bug 1257562 for CVE-2026-23026",
"url": "https://bugzilla.suse.com/1257562"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_7_34-rt-1-150700.1.3.1.x86_64",
"SUSE Real Time Module 15 SP7:cluster-md-kmp-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:dlm-kmp-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:gfs2-kmp-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-devel-rt-6.4.0-150700.7.34.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-rt-devel-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-source-rt-6.4.0-150700.7.34.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-syms-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:ocfs2-kmp-rt-6.4.0-150700.7.34.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 2.5,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_7_34-rt-1-150700.1.3.1.x86_64",
"SUSE Real Time Module 15 SP7:cluster-md-kmp-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:dlm-kmp-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:gfs2-kmp-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-devel-rt-6.4.0-150700.7.34.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-rt-devel-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-source-rt-6.4.0-150700.7.34.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-syms-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:ocfs2-kmp-rt-6.4.0-150700.7.34.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-03-23T09:09:02Z",
"details": "moderate"
}
],
"title": "CVE-2026-23026"
},
{
"cve": "CVE-2026-23033",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2026-23033"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\ndmaengine: omap-dma: fix dma_pool resource leak in error paths\n\nThe dma_pool created by dma_pool_create() is not destroyed when\ndma_async_device_register() or of_dma_controller_register() fails,\ncausing a resource leak in the probe error paths.\n\nAdd dma_pool_destroy() in both error paths to properly release the\nallocated dma_pool resource.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_7_34-rt-1-150700.1.3.1.x86_64",
"SUSE Real Time Module 15 SP7:cluster-md-kmp-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:dlm-kmp-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:gfs2-kmp-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-devel-rt-6.4.0-150700.7.34.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-rt-devel-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-source-rt-6.4.0-150700.7.34.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-syms-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:ocfs2-kmp-rt-6.4.0-150700.7.34.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2026-23033",
"url": "https://www.suse.com/security/cve/CVE-2026-23033"
},
{
"category": "external",
"summary": "SUSE Bug 1257570 for CVE-2026-23033",
"url": "https://bugzilla.suse.com/1257570"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_7_34-rt-1-150700.1.3.1.x86_64",
"SUSE Real Time Module 15 SP7:cluster-md-kmp-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:dlm-kmp-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:gfs2-kmp-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-devel-rt-6.4.0-150700.7.34.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-rt-devel-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-source-rt-6.4.0-150700.7.34.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-syms-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:ocfs2-kmp-rt-6.4.0-150700.7.34.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 3.3,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_7_34-rt-1-150700.1.3.1.x86_64",
"SUSE Real Time Module 15 SP7:cluster-md-kmp-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:dlm-kmp-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:gfs2-kmp-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-devel-rt-6.4.0-150700.7.34.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-rt-devel-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-source-rt-6.4.0-150700.7.34.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-syms-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:ocfs2-kmp-rt-6.4.0-150700.7.34.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-03-23T09:09:02Z",
"details": "low"
}
],
"title": "CVE-2026-23033"
},
{
"cve": "CVE-2026-23035",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2026-23035"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nnet/mlx5e: Pass netdev to mlx5e_destroy_netdev instead of priv\n\nmlx5e_priv is an unstable structure that can be memset(0) if profile\nattaching fails.\n\nPass netdev to mlx5e_destroy_netdev() to guarantee it will work on a\nvalid netdev.\n\nOn mlx5e_remove: Check validity of priv-\u003eprofile, before attempting\nto cleanup any resources that might be not there.\n\nThis fixes a kernel oops in mlx5e_remove when switchdev mode fails due\nto change profile failure.\n\n$ devlink dev eswitch set pci/0000:00:03.0 mode switchdev\nError: mlx5_core: Failed setting eswitch to offloads.\ndmesg:\nworkqueue: Failed to create a rescuer kthread for wq \"mlx5e\": -EINTR\nmlx5_core 0012:03:00.1: mlx5e_netdev_init_profile:6214:(pid 37199): mlx5e_priv_init failed, err=-12\nmlx5_core 0012:03:00.1 gpu3rdma1: mlx5e_netdev_change_profile: new profile init failed, -12\nworkqueue: Failed to create a rescuer kthread for wq \"mlx5e\": -EINTR\nmlx5_core 0012:03:00.1: mlx5e_netdev_init_profile:6214:(pid 37199): mlx5e_priv_init failed, err=-12\nmlx5_core 0012:03:00.1 gpu3rdma1: mlx5e_netdev_change_profile: failed to rollback to orig profile, -12\n\n$ devlink dev reload pci/0000:00:03.0 ==\u003e oops\n\nBUG: kernel NULL pointer dereference, address: 0000000000000370\nPGD 0 P4D 0\nOops: Oops: 0000 [#1] SMP NOPTI\nCPU: 15 UID: 0 PID: 520 Comm: devlink Not tainted 6.18.0-rc5+ #115 PREEMPT(voluntary)\nHardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-2.fc40 04/01/2014\nRIP: 0010:mlx5e_dcbnl_dscp_app+0x23/0x100\nRSP: 0018:ffffc9000083f8b8 EFLAGS: 00010286\nRAX: ffff8881126fc380 RBX: ffff8881015ac400 RCX: ffffffff826ffc45\nRDX: 0000000000000000 RSI: 0000000000000001 RDI: ffff8881035109c0\nRBP: ffff8881035109c0 R08: ffff888101e3e838 R09: ffff888100264e10\nR10: ffffc9000083f898 R11: ffffc9000083f8a0 R12: ffff888101b921a0\nR13: ffff888101b921a0 R14: ffff8881015ac9a0 R15: ffff8881015ac400\nFS: 00007f789a3c8740(0000) GS:ffff88856aa59000(0000) knlGS:0000000000000000\nCS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033\nCR2: 0000000000000370 CR3: 000000010b6c0001 CR4: 0000000000370ef0\nCall Trace:\n \u003cTASK\u003e\n mlx5e_remove+0x57/0x110\n device_release_driver_internal+0x19c/0x200\n bus_remove_device+0xc6/0x130\n device_del+0x160/0x3d0\n ? devl_param_driverinit_value_get+0x2d/0x90\n mlx5_detach_device+0x89/0xe0\n mlx5_unload_one_devl_locked+0x3a/0x70\n mlx5_devlink_reload_down+0xc8/0x220\n devlink_reload+0x7d/0x260\n devlink_nl_reload_doit+0x45b/0x5a0\n genl_family_rcv_msg_doit+0xe8/0x140",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_7_34-rt-1-150700.1.3.1.x86_64",
"SUSE Real Time Module 15 SP7:cluster-md-kmp-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:dlm-kmp-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:gfs2-kmp-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-devel-rt-6.4.0-150700.7.34.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-rt-devel-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-source-rt-6.4.0-150700.7.34.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-syms-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:ocfs2-kmp-rt-6.4.0-150700.7.34.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2026-23035",
"url": "https://www.suse.com/security/cve/CVE-2026-23035"
},
{
"category": "external",
"summary": "SUSE Bug 1257559 for CVE-2026-23035",
"url": "https://bugzilla.suse.com/1257559"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_7_34-rt-1-150700.1.3.1.x86_64",
"SUSE Real Time Module 15 SP7:cluster-md-kmp-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:dlm-kmp-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:gfs2-kmp-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-devel-rt-6.4.0-150700.7.34.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-rt-devel-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-source-rt-6.4.0-150700.7.34.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-syms-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:ocfs2-kmp-rt-6.4.0-150700.7.34.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_7_34-rt-1-150700.1.3.1.x86_64",
"SUSE Real Time Module 15 SP7:cluster-md-kmp-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:dlm-kmp-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:gfs2-kmp-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-devel-rt-6.4.0-150700.7.34.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-rt-devel-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-source-rt-6.4.0-150700.7.34.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-syms-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:ocfs2-kmp-rt-6.4.0-150700.7.34.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-03-23T09:09:02Z",
"details": "moderate"
}
],
"title": "CVE-2026-23035"
},
{
"cve": "CVE-2026-23037",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2026-23037"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\ncan: etas_es58x: allow partial RX URB allocation to succeed\n\nWhen es58x_alloc_rx_urbs() fails to allocate the requested number of\nURBs but succeeds in allocating some, it returns an error code.\nThis causes es58x_open() to return early, skipping the cleanup label\n\u0027free_urbs\u0027, which leads to the anchored URBs being leaked.\n\nAs pointed out by maintainer Vincent Mailhol, the driver is designed\nto handle partial URB allocation gracefully. Therefore, partial\nallocation should not be treated as a fatal error.\n\nModify es58x_alloc_rx_urbs() to return 0 if at least one URB has been\nallocated, restoring the intended behavior and preventing the leak\nin es58x_open().",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_7_34-rt-1-150700.1.3.1.x86_64",
"SUSE Real Time Module 15 SP7:cluster-md-kmp-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:dlm-kmp-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:gfs2-kmp-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-devel-rt-6.4.0-150700.7.34.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-rt-devel-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-source-rt-6.4.0-150700.7.34.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-syms-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:ocfs2-kmp-rt-6.4.0-150700.7.34.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2026-23037",
"url": "https://www.suse.com/security/cve/CVE-2026-23037"
},
{
"category": "external",
"summary": "SUSE Bug 1257554 for CVE-2026-23037",
"url": "https://bugzilla.suse.com/1257554"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_7_34-rt-1-150700.1.3.1.x86_64",
"SUSE Real Time Module 15 SP7:cluster-md-kmp-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:dlm-kmp-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:gfs2-kmp-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-devel-rt-6.4.0-150700.7.34.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-rt-devel-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-source-rt-6.4.0-150700.7.34.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-syms-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:ocfs2-kmp-rt-6.4.0-150700.7.34.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 3.3,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_7_34-rt-1-150700.1.3.1.x86_64",
"SUSE Real Time Module 15 SP7:cluster-md-kmp-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:dlm-kmp-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:gfs2-kmp-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-devel-rt-6.4.0-150700.7.34.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-rt-devel-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-source-rt-6.4.0-150700.7.34.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-syms-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:ocfs2-kmp-rt-6.4.0-150700.7.34.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-03-23T09:09:02Z",
"details": "low"
}
],
"title": "CVE-2026-23037"
},
{
"cve": "CVE-2026-23038",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2026-23038"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\npnfs/flexfiles: Fix memory leak in nfs4_ff_alloc_deviceid_node()\n\nIn nfs4_ff_alloc_deviceid_node(), if the allocation for ds_versions fails,\nthe function jumps to the out_scratch label without freeing the already\nallocated dsaddrs list, leading to a memory leak.\n\nFix this by jumping to the out_err_drain_dsaddrs label, which properly\nfrees the dsaddrs list before cleaning up other resources.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_7_34-rt-1-150700.1.3.1.x86_64",
"SUSE Real Time Module 15 SP7:cluster-md-kmp-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:dlm-kmp-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:gfs2-kmp-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-devel-rt-6.4.0-150700.7.34.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-rt-devel-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-source-rt-6.4.0-150700.7.34.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-syms-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:ocfs2-kmp-rt-6.4.0-150700.7.34.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2026-23038",
"url": "https://www.suse.com/security/cve/CVE-2026-23038"
},
{
"category": "external",
"summary": "SUSE Bug 1257553 for CVE-2026-23038",
"url": "https://bugzilla.suse.com/1257553"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_7_34-rt-1-150700.1.3.1.x86_64",
"SUSE Real Time Module 15 SP7:cluster-md-kmp-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:dlm-kmp-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:gfs2-kmp-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-devel-rt-6.4.0-150700.7.34.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-rt-devel-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-source-rt-6.4.0-150700.7.34.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-syms-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:ocfs2-kmp-rt-6.4.0-150700.7.34.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 3.3,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_7_34-rt-1-150700.1.3.1.x86_64",
"SUSE Real Time Module 15 SP7:cluster-md-kmp-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:dlm-kmp-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:gfs2-kmp-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-devel-rt-6.4.0-150700.7.34.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-rt-devel-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-source-rt-6.4.0-150700.7.34.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-syms-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:ocfs2-kmp-rt-6.4.0-150700.7.34.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-03-23T09:09:02Z",
"details": "low"
}
],
"title": "CVE-2026-23038"
},
{
"cve": "CVE-2026-23049",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2026-23049"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\ndrm/panel-simple: fix connector type for DataImage SCF0700C48GGU18 panel\n\nThe connector type for the DataImage SCF0700C48GGU18 panel is missing and\ndevm_drm_panel_bridge_add() requires connector type to be set. This leads\nto a warning and a backtrace in the kernel log and panel does not work:\n\"\nWARNING: CPU: 3 PID: 38 at drivers/gpu/drm/bridge/panel.c:379 devm_drm_of_get_bridge+0xac/0xb8\n\"\nThe warning is triggered by a check for valid connector type in\ndevm_drm_panel_bridge_add(). If there is no valid connector type\nset for a panel, the warning is printed and panel is not added.\nFill in the missing connector type to fix the warning and make\nthe panel operational once again.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_7_34-rt-1-150700.1.3.1.x86_64",
"SUSE Real Time Module 15 SP7:cluster-md-kmp-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:dlm-kmp-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:gfs2-kmp-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-devel-rt-6.4.0-150700.7.34.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-rt-devel-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-source-rt-6.4.0-150700.7.34.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-syms-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:ocfs2-kmp-rt-6.4.0-150700.7.34.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2026-23049",
"url": "https://www.suse.com/security/cve/CVE-2026-23049"
},
{
"category": "external",
"summary": "SUSE Bug 1257723 for CVE-2026-23049",
"url": "https://bugzilla.suse.com/1257723"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_7_34-rt-1-150700.1.3.1.x86_64",
"SUSE Real Time Module 15 SP7:cluster-md-kmp-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:dlm-kmp-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:gfs2-kmp-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-devel-rt-6.4.0-150700.7.34.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-rt-devel-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-source-rt-6.4.0-150700.7.34.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-syms-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:ocfs2-kmp-rt-6.4.0-150700.7.34.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_7_34-rt-1-150700.1.3.1.x86_64",
"SUSE Real Time Module 15 SP7:cluster-md-kmp-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:dlm-kmp-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:gfs2-kmp-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-devel-rt-6.4.0-150700.7.34.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-rt-devel-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-source-rt-6.4.0-150700.7.34.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-syms-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:ocfs2-kmp-rt-6.4.0-150700.7.34.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-03-23T09:09:02Z",
"details": "moderate"
}
],
"title": "CVE-2026-23049"
},
{
"cve": "CVE-2026-23053",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2026-23053"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nNFS: Fix a deadlock involving nfs_release_folio()\n\nWang Zhaolong reports a deadlock involving NFSv4.1 state recovery\nwaiting on kthreadd, which is attempting to reclaim memory by calling\nnfs_release_folio(). The latter cannot make progress due to state\nrecovery being needed.\n\nIt seems that the only safe thing to do here is to kick off a writeback\nof the folio, without waiting for completion, or else kicking off an\nasynchronous commit.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_7_34-rt-1-150700.1.3.1.x86_64",
"SUSE Real Time Module 15 SP7:cluster-md-kmp-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:dlm-kmp-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:gfs2-kmp-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-devel-rt-6.4.0-150700.7.34.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-rt-devel-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-source-rt-6.4.0-150700.7.34.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-syms-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:ocfs2-kmp-rt-6.4.0-150700.7.34.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2026-23053",
"url": "https://www.suse.com/security/cve/CVE-2026-23053"
},
{
"category": "external",
"summary": "SUSE Bug 1257718 for CVE-2026-23053",
"url": "https://bugzilla.suse.com/1257718"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_7_34-rt-1-150700.1.3.1.x86_64",
"SUSE Real Time Module 15 SP7:cluster-md-kmp-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:dlm-kmp-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:gfs2-kmp-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-devel-rt-6.4.0-150700.7.34.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-rt-devel-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-source-rt-6.4.0-150700.7.34.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-syms-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:ocfs2-kmp-rt-6.4.0-150700.7.34.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.7,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_7_34-rt-1-150700.1.3.1.x86_64",
"SUSE Real Time Module 15 SP7:cluster-md-kmp-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:dlm-kmp-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:gfs2-kmp-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-devel-rt-6.4.0-150700.7.34.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-rt-devel-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-source-rt-6.4.0-150700.7.34.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-syms-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:ocfs2-kmp-rt-6.4.0-150700.7.34.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-03-23T09:09:02Z",
"details": "moderate"
}
],
"title": "CVE-2026-23053"
},
{
"cve": "CVE-2026-23054",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2026-23054"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nnet: hv_netvsc: reject RSS hash key programming without RX indirection table\n\nRSS configuration requires a valid RX indirection table. When the device\nreports a single receive queue, rndis_filter_device_add() does not\nallocate an indirection table, accepting RSS hash key updates in this\nstate leads to a hang.\n\nFix this by gating netvsc_set_rxfh() on ndc-\u003erx_table_sz and return\n-EOPNOTSUPP when the table is absent. This aligns set_rxfh with the device\ncapabilities and prevents incorrect behavior.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_7_34-rt-1-150700.1.3.1.x86_64",
"SUSE Real Time Module 15 SP7:cluster-md-kmp-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:dlm-kmp-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:gfs2-kmp-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-devel-rt-6.4.0-150700.7.34.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-rt-devel-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-source-rt-6.4.0-150700.7.34.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-syms-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:ocfs2-kmp-rt-6.4.0-150700.7.34.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2026-23054",
"url": "https://www.suse.com/security/cve/CVE-2026-23054"
},
{
"category": "external",
"summary": "SUSE Bug 1257732 for CVE-2026-23054",
"url": "https://bugzilla.suse.com/1257732"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_7_34-rt-1-150700.1.3.1.x86_64",
"SUSE Real Time Module 15 SP7:cluster-md-kmp-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:dlm-kmp-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:gfs2-kmp-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-devel-rt-6.4.0-150700.7.34.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-rt-devel-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-source-rt-6.4.0-150700.7.34.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-syms-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:ocfs2-kmp-rt-6.4.0-150700.7.34.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_7_34-rt-1-150700.1.3.1.x86_64",
"SUSE Real Time Module 15 SP7:cluster-md-kmp-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:dlm-kmp-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:gfs2-kmp-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-devel-rt-6.4.0-150700.7.34.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-rt-devel-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-source-rt-6.4.0-150700.7.34.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-syms-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:ocfs2-kmp-rt-6.4.0-150700.7.34.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-03-23T09:09:02Z",
"details": "moderate"
}
],
"title": "CVE-2026-23054"
},
{
"cve": "CVE-2026-23056",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2026-23056"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nuacce: implement mremap in uacce_vm_ops to return -EPERM\n\nThe current uacce_vm_ops does not support the mremap operation of\nvm_operations_struct. Implement .mremap to return -EPERM to remind\nusers.\n\nThe reason we need to explicitly disable mremap is that when the\ndriver does not implement .mremap, it uses the default mremap\nmethod. This could lead to a risk scenario:\n\nAn application might first mmap address p1, then mremap to p2,\nfollowed by munmap(p1), and finally munmap(p2). Since the default\nmremap copies the original vma\u0027s vm_private_data (i.e., q) to the\nnew vma, both munmap operations would trigger vma_close, causing\nq-\u003eqfr to be freed twice(qfr will be set to null here, so repeated\nrelease is ok).",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_7_34-rt-1-150700.1.3.1.x86_64",
"SUSE Real Time Module 15 SP7:cluster-md-kmp-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:dlm-kmp-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:gfs2-kmp-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-devel-rt-6.4.0-150700.7.34.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-rt-devel-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-source-rt-6.4.0-150700.7.34.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-syms-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:ocfs2-kmp-rt-6.4.0-150700.7.34.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2026-23056",
"url": "https://www.suse.com/security/cve/CVE-2026-23056"
},
{
"category": "external",
"summary": "SUSE Bug 1257729 for CVE-2026-23056",
"url": "https://bugzilla.suse.com/1257729"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_7_34-rt-1-150700.1.3.1.x86_64",
"SUSE Real Time Module 15 SP7:cluster-md-kmp-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:dlm-kmp-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:gfs2-kmp-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-devel-rt-6.4.0-150700.7.34.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-rt-devel-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-source-rt-6.4.0-150700.7.34.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-syms-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:ocfs2-kmp-rt-6.4.0-150700.7.34.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_7_34-rt-1-150700.1.3.1.x86_64",
"SUSE Real Time Module 15 SP7:cluster-md-kmp-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:dlm-kmp-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:gfs2-kmp-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-devel-rt-6.4.0-150700.7.34.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-rt-devel-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-source-rt-6.4.0-150700.7.34.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-syms-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:ocfs2-kmp-rt-6.4.0-150700.7.34.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-03-23T09:09:02Z",
"details": "moderate"
}
],
"title": "CVE-2026-23056"
},
{
"cve": "CVE-2026-23057",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2026-23057"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nvsock/virtio: Coalesce only linear skb\n\nvsock/virtio common tries to coalesce buffers in rx queue: if a linear skb\n(with a spare tail room) is followed by a small skb (length limited by\nGOOD_COPY_LEN = 128), an attempt is made to join them.\n\nSince the introduction of MSG_ZEROCOPY support, assumption that a small skb\nwill always be linear is incorrect. In the zerocopy case, data is lost and\nthe linear skb is appended with uninitialized kernel memory.\n\nOf all 3 supported virtio-based transports, only loopback-transport is\naffected. G2H virtio-transport rx queue operates on explicitly linear skbs;\nsee virtio_vsock_alloc_linear_skb() in virtio_vsock_rx_fill(). H2G\nvhost-transport may allocate non-linear skbs, but only for sizes that are\nnot considered for coalescence; see PAGE_ALLOC_COSTLY_ORDER in\nvirtio_vsock_alloc_skb().\n\nEnsure only linear skbs are coalesced. Note that skb_tailroom(last_skb) \u003e 0\nguarantees last_skb is linear.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_7_34-rt-1-150700.1.3.1.x86_64",
"SUSE Real Time Module 15 SP7:cluster-md-kmp-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:dlm-kmp-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:gfs2-kmp-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-devel-rt-6.4.0-150700.7.34.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-rt-devel-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-source-rt-6.4.0-150700.7.34.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-syms-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:ocfs2-kmp-rt-6.4.0-150700.7.34.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2026-23057",
"url": "https://www.suse.com/security/cve/CVE-2026-23057"
},
{
"category": "external",
"summary": "SUSE Bug 1257740 for CVE-2026-23057",
"url": "https://bugzilla.suse.com/1257740"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_7_34-rt-1-150700.1.3.1.x86_64",
"SUSE Real Time Module 15 SP7:cluster-md-kmp-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:dlm-kmp-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:gfs2-kmp-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-devel-rt-6.4.0-150700.7.34.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-rt-devel-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-source-rt-6.4.0-150700.7.34.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-syms-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:ocfs2-kmp-rt-6.4.0-150700.7.34.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.6,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_7_34-rt-1-150700.1.3.1.x86_64",
"SUSE Real Time Module 15 SP7:cluster-md-kmp-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:dlm-kmp-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:gfs2-kmp-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-devel-rt-6.4.0-150700.7.34.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-rt-devel-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-source-rt-6.4.0-150700.7.34.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-syms-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:ocfs2-kmp-rt-6.4.0-150700.7.34.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-03-23T09:09:02Z",
"details": "moderate"
}
],
"title": "CVE-2026-23057"
},
{
"cve": "CVE-2026-23058",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2026-23058"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\ncan: ems_usb: ems_usb_read_bulk_callback(): fix URB memory leak\n\nFix similar memory leak as in commit 7352e1d5932a (\"can: gs_usb:\ngs_usb_receive_bulk_callback(): fix URB memory leak\").\n\nIn ems_usb_open(), the URBs for USB-in transfers are allocated, added to\nthe dev-\u003erx_submitted anchor and submitted. In the complete callback\nems_usb_read_bulk_callback(), the URBs are processed and resubmitted. In\nems_usb_close() the URBs are freed by calling\nusb_kill_anchored_urbs(\u0026dev-\u003erx_submitted).\n\nHowever, this does not take into account that the USB framework unanchors\nthe URB before the complete function is called. This means that once an\nin-URB has been completed, it is no longer anchored and is ultimately not\nreleased in ems_usb_close().\n\nFix the memory leak by anchoring the URB in the\nems_usb_read_bulk_callback() to the dev-\u003erx_submitted anchor.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_7_34-rt-1-150700.1.3.1.x86_64",
"SUSE Real Time Module 15 SP7:cluster-md-kmp-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:dlm-kmp-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:gfs2-kmp-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-devel-rt-6.4.0-150700.7.34.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-rt-devel-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-source-rt-6.4.0-150700.7.34.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-syms-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:ocfs2-kmp-rt-6.4.0-150700.7.34.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2026-23058",
"url": "https://www.suse.com/security/cve/CVE-2026-23058"
},
{
"category": "external",
"summary": "SUSE Bug 1257739 for CVE-2026-23058",
"url": "https://bugzilla.suse.com/1257739"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_7_34-rt-1-150700.1.3.1.x86_64",
"SUSE Real Time Module 15 SP7:cluster-md-kmp-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:dlm-kmp-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:gfs2-kmp-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-devel-rt-6.4.0-150700.7.34.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-rt-devel-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-source-rt-6.4.0-150700.7.34.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-syms-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:ocfs2-kmp-rt-6.4.0-150700.7.34.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 3.3,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_7_34-rt-1-150700.1.3.1.x86_64",
"SUSE Real Time Module 15 SP7:cluster-md-kmp-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:dlm-kmp-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:gfs2-kmp-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-devel-rt-6.4.0-150700.7.34.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-rt-devel-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-source-rt-6.4.0-150700.7.34.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-syms-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:ocfs2-kmp-rt-6.4.0-150700.7.34.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-03-23T09:09:02Z",
"details": "low"
}
],
"title": "CVE-2026-23058"
},
{
"cve": "CVE-2026-23060",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2026-23060"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\ncrypto: authencesn - reject too-short AAD (assoclen\u003c8) to match ESP/ESN spec\n\nauthencesn assumes an ESP/ESN-formatted AAD. When assoclen is shorter than\nthe minimum expected length, crypto_authenc_esn_decrypt() can advance past\nthe end of the destination scatterlist and trigger a NULL pointer dereference\nin scatterwalk_map_and_copy(), leading to a kernel panic (DoS).\n\nAdd a minimum AAD length check to fail fast on invalid inputs.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_7_34-rt-1-150700.1.3.1.x86_64",
"SUSE Real Time Module 15 SP7:cluster-md-kmp-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:dlm-kmp-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:gfs2-kmp-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-devel-rt-6.4.0-150700.7.34.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-rt-devel-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-source-rt-6.4.0-150700.7.34.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-syms-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:ocfs2-kmp-rt-6.4.0-150700.7.34.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2026-23060",
"url": "https://www.suse.com/security/cve/CVE-2026-23060"
},
{
"category": "external",
"summary": "SUSE Bug 1257735 for CVE-2026-23060",
"url": "https://bugzilla.suse.com/1257735"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_7_34-rt-1-150700.1.3.1.x86_64",
"SUSE Real Time Module 15 SP7:cluster-md-kmp-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:dlm-kmp-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:gfs2-kmp-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-devel-rt-6.4.0-150700.7.34.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-rt-devel-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-source-rt-6.4.0-150700.7.34.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-syms-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:ocfs2-kmp-rt-6.4.0-150700.7.34.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_7_34-rt-1-150700.1.3.1.x86_64",
"SUSE Real Time Module 15 SP7:cluster-md-kmp-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:dlm-kmp-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:gfs2-kmp-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-devel-rt-6.4.0-150700.7.34.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-rt-devel-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-source-rt-6.4.0-150700.7.34.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-syms-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:ocfs2-kmp-rt-6.4.0-150700.7.34.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-03-23T09:09:02Z",
"details": "moderate"
}
],
"title": "CVE-2026-23060"
},
{
"cve": "CVE-2026-23061",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2026-23061"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\ncan: kvaser_usb: kvaser_usb_read_bulk_callback(): fix URB memory leak\n\nFix similar memory leak as in commit 7352e1d5932a (\"can: gs_usb:\ngs_usb_receive_bulk_callback(): fix URB memory leak\").\n\nIn kvaser_usb_set_{,data_}bittiming() -\u003e kvaser_usb_setup_rx_urbs(), the\nURBs for USB-in transfers are allocated, added to the dev-\u003erx_submitted\nanchor and submitted. In the complete callback\nkvaser_usb_read_bulk_callback(), the URBs are processed and resubmitted. In\nkvaser_usb_remove_interfaces() the URBs are freed by calling\nusb_kill_anchored_urbs(\u0026dev-\u003erx_submitted).\n\nHowever, this does not take into account that the USB framework unanchors\nthe URB before the complete function is called. This means that once an\nin-URB has been completed, it is no longer anchored and is ultimately not\nreleased in usb_kill_anchored_urbs().\n\nFix the memory leak by anchoring the URB in the\nkvaser_usb_read_bulk_callback() to the dev-\u003erx_submitted anchor.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_7_34-rt-1-150700.1.3.1.x86_64",
"SUSE Real Time Module 15 SP7:cluster-md-kmp-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:dlm-kmp-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:gfs2-kmp-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-devel-rt-6.4.0-150700.7.34.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-rt-devel-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-source-rt-6.4.0-150700.7.34.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-syms-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:ocfs2-kmp-rt-6.4.0-150700.7.34.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2026-23061",
"url": "https://www.suse.com/security/cve/CVE-2026-23061"
},
{
"category": "external",
"summary": "SUSE Bug 1257776 for CVE-2026-23061",
"url": "https://bugzilla.suse.com/1257776"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_7_34-rt-1-150700.1.3.1.x86_64",
"SUSE Real Time Module 15 SP7:cluster-md-kmp-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:dlm-kmp-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:gfs2-kmp-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-devel-rt-6.4.0-150700.7.34.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-rt-devel-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-source-rt-6.4.0-150700.7.34.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-syms-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:ocfs2-kmp-rt-6.4.0-150700.7.34.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.7,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_7_34-rt-1-150700.1.3.1.x86_64",
"SUSE Real Time Module 15 SP7:cluster-md-kmp-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:dlm-kmp-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:gfs2-kmp-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-devel-rt-6.4.0-150700.7.34.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-rt-devel-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-source-rt-6.4.0-150700.7.34.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-syms-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:ocfs2-kmp-rt-6.4.0-150700.7.34.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-03-23T09:09:02Z",
"details": "moderate"
}
],
"title": "CVE-2026-23061"
},
{
"cve": "CVE-2026-23062",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2026-23062"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nplatform/x86: hp-bioscfg: Fix kernel panic in GET_INSTANCE_ID macro\n\nThe GET_INSTANCE_ID macro that caused a kernel panic when accessing sysfs\nattributes:\n\n1. Off-by-one error: The loop condition used \u0027\u003c=\u0027 instead of \u0027\u003c\u0027,\n causing access beyond array bounds. Since array indices are 0-based\n and go from 0 to instances_count-1, the loop should use \u0027\u003c\u0027.\n\n2. Missing NULL check: The code dereferenced attr_name_kobj-\u003ename\n without checking if attr_name_kobj was NULL, causing a null pointer\n dereference in min_length_show() and other attribute show functions.\n\nThe panic occurred when fwupd tried to read BIOS configuration attributes:\n\n Oops: general protection fault [#1] SMP KASAN NOPTI\n KASAN: null-ptr-deref in range [0x0000000000000000-0x0000000000000007]\n RIP: 0010:min_length_show+0xcf/0x1d0 [hp_bioscfg]\n\nAdd a NULL check for attr_name_kobj before dereferencing and corrects\nthe loop boundary to match the pattern used elsewhere in the driver.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_7_34-rt-1-150700.1.3.1.x86_64",
"SUSE Real Time Module 15 SP7:cluster-md-kmp-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:dlm-kmp-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:gfs2-kmp-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-devel-rt-6.4.0-150700.7.34.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-rt-devel-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-source-rt-6.4.0-150700.7.34.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-syms-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:ocfs2-kmp-rt-6.4.0-150700.7.34.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2026-23062",
"url": "https://www.suse.com/security/cve/CVE-2026-23062"
},
{
"category": "external",
"summary": "SUSE Bug 1257734 for CVE-2026-23062",
"url": "https://bugzilla.suse.com/1257734"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_7_34-rt-1-150700.1.3.1.x86_64",
"SUSE Real Time Module 15 SP7:cluster-md-kmp-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:dlm-kmp-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:gfs2-kmp-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-devel-rt-6.4.0-150700.7.34.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-rt-devel-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-source-rt-6.4.0-150700.7.34.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-syms-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:ocfs2-kmp-rt-6.4.0-150700.7.34.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.1,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_7_34-rt-1-150700.1.3.1.x86_64",
"SUSE Real Time Module 15 SP7:cluster-md-kmp-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:dlm-kmp-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:gfs2-kmp-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-devel-rt-6.4.0-150700.7.34.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-rt-devel-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-source-rt-6.4.0-150700.7.34.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-syms-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:ocfs2-kmp-rt-6.4.0-150700.7.34.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-03-23T09:09:02Z",
"details": "moderate"
}
],
"title": "CVE-2026-23062"
},
{
"cve": "CVE-2026-23063",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2026-23063"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nuacce: ensure safe queue release with state management\n\nDirectly calling `put_queue` carries risks since it cannot\nguarantee that resources of `uacce_queue` have been fully released\nbeforehand. So adding a `stop_queue` operation for the\nUACCE_CMD_PUT_Q command and leaving the `put_queue` operation to\nthe final resource release ensures safety.\n\nQueue states are defined as follows:\n- UACCE_Q_ZOMBIE: Initial state\n- UACCE_Q_INIT: After opening `uacce`\n- UACCE_Q_STARTED: After `start` is issued via `ioctl`\n\nWhen executing `poweroff -f` in virt while accelerator are still\nworking, `uacce_fops_release` and `uacce_remove` may execute\nconcurrently. This can cause `uacce_put_queue` within\n`uacce_fops_release` to access a NULL `ops` pointer. Therefore, add\nstate checks to prevent accessing freed pointers.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_7_34-rt-1-150700.1.3.1.x86_64",
"SUSE Real Time Module 15 SP7:cluster-md-kmp-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:dlm-kmp-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:gfs2-kmp-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-devel-rt-6.4.0-150700.7.34.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-rt-devel-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-source-rt-6.4.0-150700.7.34.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-syms-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:ocfs2-kmp-rt-6.4.0-150700.7.34.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2026-23063",
"url": "https://www.suse.com/security/cve/CVE-2026-23063"
},
{
"category": "external",
"summary": "SUSE Bug 1257722 for CVE-2026-23063",
"url": "https://bugzilla.suse.com/1257722"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_7_34-rt-1-150700.1.3.1.x86_64",
"SUSE Real Time Module 15 SP7:cluster-md-kmp-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:dlm-kmp-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:gfs2-kmp-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-devel-rt-6.4.0-150700.7.34.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-rt-devel-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-source-rt-6.4.0-150700.7.34.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-syms-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:ocfs2-kmp-rt-6.4.0-150700.7.34.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_7_34-rt-1-150700.1.3.1.x86_64",
"SUSE Real Time Module 15 SP7:cluster-md-kmp-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:dlm-kmp-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:gfs2-kmp-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-devel-rt-6.4.0-150700.7.34.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-rt-devel-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-source-rt-6.4.0-150700.7.34.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-syms-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:ocfs2-kmp-rt-6.4.0-150700.7.34.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-03-23T09:09:02Z",
"details": "moderate"
}
],
"title": "CVE-2026-23063"
},
{
"cve": "CVE-2026-23064",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2026-23064"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nnet/sched: act_ife: avoid possible NULL deref\n\ntcf_ife_encode() must make sure ife_encode() does not return NULL.\n\nsyzbot reported:\n\nOops: general protection fault, probably for non-canonical address 0xdffffc0000000000: 0000 [#1] SMP KASAN NOPTI\nKASAN: null-ptr-deref in range [0x0000000000000000-0x0000000000000007]\n RIP: 0010:ife_tlv_meta_encode+0x41/0xa0 net/ife/ife.c:166\nCPU: 3 UID: 0 PID: 8990 Comm: syz.0.696 Not tainted syzkaller #0 PREEMPT(full)\nCall Trace:\n \u003cTASK\u003e\n ife_encode_meta_u32+0x153/0x180 net/sched/act_ife.c:101\n tcf_ife_encode net/sched/act_ife.c:841 [inline]\n tcf_ife_act+0x1022/0x1de0 net/sched/act_ife.c:877\n tc_act include/net/tc_wrapper.h:130 [inline]\n tcf_action_exec+0x1c0/0xa20 net/sched/act_api.c:1152\n tcf_exts_exec include/net/pkt_cls.h:349 [inline]\n mall_classify+0x1a0/0x2a0 net/sched/cls_matchall.c:42\n tc_classify include/net/tc_wrapper.h:197 [inline]\n __tcf_classify net/sched/cls_api.c:1764 [inline]\n tcf_classify+0x7f2/0x1380 net/sched/cls_api.c:1860\n multiq_classify net/sched/sch_multiq.c:39 [inline]\n multiq_enqueue+0xe0/0x510 net/sched/sch_multiq.c:66\n dev_qdisc_enqueue+0x45/0x250 net/core/dev.c:4147\n __dev_xmit_skb net/core/dev.c:4262 [inline]\n __dev_queue_xmit+0x2998/0x46c0 net/core/dev.c:4798",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_7_34-rt-1-150700.1.3.1.x86_64",
"SUSE Real Time Module 15 SP7:cluster-md-kmp-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:dlm-kmp-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:gfs2-kmp-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-devel-rt-6.4.0-150700.7.34.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-rt-devel-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-source-rt-6.4.0-150700.7.34.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-syms-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:ocfs2-kmp-rt-6.4.0-150700.7.34.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2026-23064",
"url": "https://www.suse.com/security/cve/CVE-2026-23064"
},
{
"category": "external",
"summary": "SUSE Bug 1257765 for CVE-2026-23064",
"url": "https://bugzilla.suse.com/1257765"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_7_34-rt-1-150700.1.3.1.x86_64",
"SUSE Real Time Module 15 SP7:cluster-md-kmp-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:dlm-kmp-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:gfs2-kmp-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-devel-rt-6.4.0-150700.7.34.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-rt-devel-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-source-rt-6.4.0-150700.7.34.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-syms-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:ocfs2-kmp-rt-6.4.0-150700.7.34.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_7_34-rt-1-150700.1.3.1.x86_64",
"SUSE Real Time Module 15 SP7:cluster-md-kmp-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:dlm-kmp-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:gfs2-kmp-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-devel-rt-6.4.0-150700.7.34.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-rt-devel-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-source-rt-6.4.0-150700.7.34.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-syms-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:ocfs2-kmp-rt-6.4.0-150700.7.34.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-03-23T09:09:02Z",
"details": "moderate"
}
],
"title": "CVE-2026-23064"
},
{
"cve": "CVE-2026-23065",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2026-23065"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nplatform/x86/amd: Fix memory leak in wbrf_record()\n\nThe tmp buffer is allocated using kcalloc() but is not freed if\nacpi_evaluate_dsm() fails. This causes a memory leak in the error path.\n\nFix this by explicitly freeing the tmp buffer in the error handling\npath of acpi_evaluate_dsm().",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_7_34-rt-1-150700.1.3.1.x86_64",
"SUSE Real Time Module 15 SP7:cluster-md-kmp-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:dlm-kmp-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:gfs2-kmp-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-devel-rt-6.4.0-150700.7.34.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-rt-devel-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-source-rt-6.4.0-150700.7.34.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-syms-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:ocfs2-kmp-rt-6.4.0-150700.7.34.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2026-23065",
"url": "https://www.suse.com/security/cve/CVE-2026-23065"
},
{
"category": "external",
"summary": "SUSE Bug 1257742 for CVE-2026-23065",
"url": "https://bugzilla.suse.com/1257742"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_7_34-rt-1-150700.1.3.1.x86_64",
"SUSE Real Time Module 15 SP7:cluster-md-kmp-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:dlm-kmp-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:gfs2-kmp-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-devel-rt-6.4.0-150700.7.34.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-rt-devel-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-source-rt-6.4.0-150700.7.34.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-syms-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:ocfs2-kmp-rt-6.4.0-150700.7.34.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_7_34-rt-1-150700.1.3.1.x86_64",
"SUSE Real Time Module 15 SP7:cluster-md-kmp-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:dlm-kmp-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:gfs2-kmp-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-devel-rt-6.4.0-150700.7.34.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-rt-devel-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-source-rt-6.4.0-150700.7.34.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-syms-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:ocfs2-kmp-rt-6.4.0-150700.7.34.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-03-23T09:09:02Z",
"details": "moderate"
}
],
"title": "CVE-2026-23065"
},
{
"cve": "CVE-2026-23068",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2026-23068"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nspi: spi-sprd-adi: Fix double free in probe error path\n\nThe driver currently uses spi_alloc_host() to allocate the controller\nbut registers it using devm_spi_register_controller().\n\nIf devm_register_restart_handler() fails, the code jumps to the\nput_ctlr label and calls spi_controller_put(). However, since the\ncontroller was registered via a devm function, the device core will\nautomatically call spi_controller_put() again when the probe fails.\nThis results in a double-free of the spi_controller structure.\n\nFix this by switching to devm_spi_alloc_host() and removing the\nmanual spi_controller_put() call.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_7_34-rt-1-150700.1.3.1.x86_64",
"SUSE Real Time Module 15 SP7:cluster-md-kmp-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:dlm-kmp-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:gfs2-kmp-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-devel-rt-6.4.0-150700.7.34.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-rt-devel-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-source-rt-6.4.0-150700.7.34.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-syms-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:ocfs2-kmp-rt-6.4.0-150700.7.34.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2026-23068",
"url": "https://www.suse.com/security/cve/CVE-2026-23068"
},
{
"category": "external",
"summary": "SUSE Bug 1257805 for CVE-2026-23068",
"url": "https://bugzilla.suse.com/1257805"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_7_34-rt-1-150700.1.3.1.x86_64",
"SUSE Real Time Module 15 SP7:cluster-md-kmp-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:dlm-kmp-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:gfs2-kmp-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-devel-rt-6.4.0-150700.7.34.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-rt-devel-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-source-rt-6.4.0-150700.7.34.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-syms-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:ocfs2-kmp-rt-6.4.0-150700.7.34.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_7_34-rt-1-150700.1.3.1.x86_64",
"SUSE Real Time Module 15 SP7:cluster-md-kmp-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:dlm-kmp-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:gfs2-kmp-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-devel-rt-6.4.0-150700.7.34.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-rt-devel-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-source-rt-6.4.0-150700.7.34.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-syms-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:ocfs2-kmp-rt-6.4.0-150700.7.34.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-03-23T09:09:02Z",
"details": "moderate"
}
],
"title": "CVE-2026-23068"
},
{
"cve": "CVE-2026-23069",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2026-23069"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nvsock/virtio: fix potential underflow in virtio_transport_get_credit()\n\nThe credit calculation in virtio_transport_get_credit() uses unsigned\narithmetic:\n\n ret = vvs-\u003epeer_buf_alloc - (vvs-\u003etx_cnt - vvs-\u003epeer_fwd_cnt);\n\nIf the peer shrinks its advertised buffer (peer_buf_alloc) while bytes\nare in flight, the subtraction can underflow and produce a large\npositive value, potentially allowing more data to be queued than the\npeer can handle.\n\nReuse virtio_transport_has_space() which already handles this case and\nadd a comment to make it clear why we are doing that.\n\n[Stefano: use virtio_transport_has_space() instead of duplicating the code]\n[Stefano: tweak the commit message]",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_7_34-rt-1-150700.1.3.1.x86_64",
"SUSE Real Time Module 15 SP7:cluster-md-kmp-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:dlm-kmp-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:gfs2-kmp-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-devel-rt-6.4.0-150700.7.34.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-rt-devel-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-source-rt-6.4.0-150700.7.34.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-syms-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:ocfs2-kmp-rt-6.4.0-150700.7.34.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2026-23069",
"url": "https://www.suse.com/security/cve/CVE-2026-23069"
},
{
"category": "external",
"summary": "SUSE Bug 1257755 for CVE-2026-23069",
"url": "https://bugzilla.suse.com/1257755"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_7_34-rt-1-150700.1.3.1.x86_64",
"SUSE Real Time Module 15 SP7:cluster-md-kmp-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:dlm-kmp-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:gfs2-kmp-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-devel-rt-6.4.0-150700.7.34.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-rt-devel-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-source-rt-6.4.0-150700.7.34.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-syms-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:ocfs2-kmp-rt-6.4.0-150700.7.34.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.7,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_7_34-rt-1-150700.1.3.1.x86_64",
"SUSE Real Time Module 15 SP7:cluster-md-kmp-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:dlm-kmp-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:gfs2-kmp-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-devel-rt-6.4.0-150700.7.34.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-rt-devel-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-source-rt-6.4.0-150700.7.34.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-syms-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:ocfs2-kmp-rt-6.4.0-150700.7.34.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-03-23T09:09:02Z",
"details": "moderate"
}
],
"title": "CVE-2026-23069"
},
{
"cve": "CVE-2026-23070",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2026-23070"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nOcteontx2-af: Add proper checks for fwdata\n\nfirmware populates MAC address, link modes (supported, advertised)\nand EEPROM data in shared firmware structure which kernel access\nvia MAC block(CGX/RPM).\n\nAccessing fwdata, on boards booted with out MAC block leading to\nkernel panics.\n\nInternal error: Oops: 0000000096000005 [#1] SMP\n[ 10.460721] Modules linked in:\n[ 10.463779] CPU: 0 UID: 0 PID: 174 Comm: kworker/0:3 Not tainted 6.19.0-rc5-00154-g76ec646abdf7-dirty #3 PREEMPT\n[ 10.474045] Hardware name: Marvell OcteonTX CN98XX board (DT)\n[ 10.479793] Workqueue: events work_for_cpu_fn\n[ 10.484159] pstate: 80400009 (Nzcv daif +PAN -UAO -TCO -DIT -SSBS BTYPE=--)\n[ 10.491124] pc : rvu_sdp_init+0x18/0x114\n[ 10.495051] lr : rvu_probe+0xe58/0x1d18",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_7_34-rt-1-150700.1.3.1.x86_64",
"SUSE Real Time Module 15 SP7:cluster-md-kmp-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:dlm-kmp-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:gfs2-kmp-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-devel-rt-6.4.0-150700.7.34.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-rt-devel-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-source-rt-6.4.0-150700.7.34.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-syms-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:ocfs2-kmp-rt-6.4.0-150700.7.34.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2026-23070",
"url": "https://www.suse.com/security/cve/CVE-2026-23070"
},
{
"category": "external",
"summary": "SUSE Bug 1257709 for CVE-2026-23070",
"url": "https://bugzilla.suse.com/1257709"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_7_34-rt-1-150700.1.3.1.x86_64",
"SUSE Real Time Module 15 SP7:cluster-md-kmp-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:dlm-kmp-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:gfs2-kmp-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-devel-rt-6.4.0-150700.7.34.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-rt-devel-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-source-rt-6.4.0-150700.7.34.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-syms-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:ocfs2-kmp-rt-6.4.0-150700.7.34.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_7_34-rt-1-150700.1.3.1.x86_64",
"SUSE Real Time Module 15 SP7:cluster-md-kmp-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:dlm-kmp-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:gfs2-kmp-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-devel-rt-6.4.0-150700.7.34.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-rt-devel-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-source-rt-6.4.0-150700.7.34.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-syms-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:ocfs2-kmp-rt-6.4.0-150700.7.34.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-03-23T09:09:02Z",
"details": "moderate"
}
],
"title": "CVE-2026-23070"
},
{
"cve": "CVE-2026-23071",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2026-23071"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nregmap: Fix race condition in hwspinlock irqsave routine\n\nPreviously, the address of the shared member \u0027\u0026map-\u003espinlock_flags\u0027 was\npassed directly to \u0027hwspin_lock_timeout_irqsave\u0027. This creates a race\ncondition where multiple contexts contending for the lock could overwrite\nthe shared flags variable, potentially corrupting the state for the\ncurrent lock owner.\n\nFix this by using a local stack variable \u0027flags\u0027 to store the IRQ state\ntemporarily.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_7_34-rt-1-150700.1.3.1.x86_64",
"SUSE Real Time Module 15 SP7:cluster-md-kmp-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:dlm-kmp-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:gfs2-kmp-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-devel-rt-6.4.0-150700.7.34.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-rt-devel-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-source-rt-6.4.0-150700.7.34.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-syms-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:ocfs2-kmp-rt-6.4.0-150700.7.34.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2026-23071",
"url": "https://www.suse.com/security/cve/CVE-2026-23071"
},
{
"category": "external",
"summary": "SUSE Bug 1257706 for CVE-2026-23071",
"url": "https://bugzilla.suse.com/1257706"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_7_34-rt-1-150700.1.3.1.x86_64",
"SUSE Real Time Module 15 SP7:cluster-md-kmp-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:dlm-kmp-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:gfs2-kmp-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-devel-rt-6.4.0-150700.7.34.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-rt-devel-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-source-rt-6.4.0-150700.7.34.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-syms-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:ocfs2-kmp-rt-6.4.0-150700.7.34.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_7_34-rt-1-150700.1.3.1.x86_64",
"SUSE Real Time Module 15 SP7:cluster-md-kmp-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:dlm-kmp-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:gfs2-kmp-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-devel-rt-6.4.0-150700.7.34.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-rt-devel-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-source-rt-6.4.0-150700.7.34.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-syms-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:ocfs2-kmp-rt-6.4.0-150700.7.34.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-03-23T09:09:02Z",
"details": "moderate"
}
],
"title": "CVE-2026-23071"
},
{
"cve": "CVE-2026-23073",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2026-23073"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nwifi: rsi: Fix memory corruption due to not set vif driver data size\n\nThe struct ieee80211_vif contains trailing space for vif driver data,\nwhen struct ieee80211_vif is allocated, the total memory size that is\nallocated is sizeof(struct ieee80211_vif) + size of vif driver data.\nThe size of vif driver data is set by each WiFi driver as needed.\n\nThe RSI911x driver does not set vif driver data size, no trailing space\nfor vif driver data is therefore allocated past struct ieee80211_vif .\nThe RSI911x driver does however use the vif driver data to store its\nvif driver data structure \"struct vif_priv\". An access to vif-\u003edrv_priv\nleads to access out of struct ieee80211_vif bounds and corruption of\nsome memory.\n\nIn case of the failure observed locally, rsi_mac80211_add_interface()\nwould write struct vif_priv *vif_info = (struct vif_priv *)vif-\u003edrv_priv;\nvif_info-\u003evap_id = vap_idx. This write corrupts struct fq_tin member\nstruct list_head new_flows . The flow = list_first_entry(head, struct\nfq_flow, flowchain); in fq_tin_reset() then reports non-NULL bogus\naddress, which when accessed causes a crash.\n\nThe trigger is very simple, boot the machine with init=/bin/sh , mount\ndevtmpfs, sysfs, procfs, and then do \"ip link set wlan0 up\", \"sleep 1\",\n\"ip link set wlan0 down\" and the crash occurs.\n\nFix this by setting the correct size of vif driver data, which is the\nsize of \"struct vif_priv\", so that memory is allocated and the driver\ncan store its driver data in it, instead of corrupting memory around\nit.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_7_34-rt-1-150700.1.3.1.x86_64",
"SUSE Real Time Module 15 SP7:cluster-md-kmp-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:dlm-kmp-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:gfs2-kmp-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-devel-rt-6.4.0-150700.7.34.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-rt-devel-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-source-rt-6.4.0-150700.7.34.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-syms-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:ocfs2-kmp-rt-6.4.0-150700.7.34.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2026-23073",
"url": "https://www.suse.com/security/cve/CVE-2026-23073"
},
{
"category": "external",
"summary": "SUSE Bug 1257707 for CVE-2026-23073",
"url": "https://bugzilla.suse.com/1257707"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_7_34-rt-1-150700.1.3.1.x86_64",
"SUSE Real Time Module 15 SP7:cluster-md-kmp-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:dlm-kmp-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:gfs2-kmp-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-devel-rt-6.4.0-150700.7.34.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-rt-devel-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-source-rt-6.4.0-150700.7.34.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-syms-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:ocfs2-kmp-rt-6.4.0-150700.7.34.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_7_34-rt-1-150700.1.3.1.x86_64",
"SUSE Real Time Module 15 SP7:cluster-md-kmp-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:dlm-kmp-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:gfs2-kmp-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-devel-rt-6.4.0-150700.7.34.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-rt-devel-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-source-rt-6.4.0-150700.7.34.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-syms-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:ocfs2-kmp-rt-6.4.0-150700.7.34.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-03-23T09:09:02Z",
"details": "moderate"
}
],
"title": "CVE-2026-23073"
},
{
"cve": "CVE-2026-23074",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2026-23074"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nnet/sched: Enforce that teql can only be used as root qdisc\n\nDesign intent of teql is that it is only supposed to be used as root qdisc.\nWe need to check for that constraint.\n\nAlthough not important, I will describe the scenario that unearthed this\nissue for the curious.\n\nGangMin Kim \u003ckm.kim1503@gmail.com\u003e managed to concot a scenario as follows:\n\nROOT qdisc 1:0 (QFQ)\n \u251c\u2500\u2500 class 1:1 (weight=15, lmax=16384) netem with delay 6.4s\n \u2500\u2500 class 1:2 (weight=1, lmax=1514) teql\n\nGangMin sends a packet which is enqueued to 1:1 (netem).\nAny invocation of dequeue by QFQ from this class will not return a packet\nuntil after 6.4s. In the meantime, a second packet is sent and it lands on\n1:2. teql\u0027s enqueue will return success and this will activate class 1:2.\nMain issue is that teql only updates the parent visible qlen (sch-\u003eq.qlen)\nat dequeue. Since QFQ will only call dequeue if peek succeeds (and teql\u0027s\npeek always returns NULL), dequeue will never be called and thus the qlen\nwill remain as 0. With that in mind, when GangMin updates 1:2\u0027s lmax value,\nthe qfq_change_class calls qfq_deact_rm_from_agg. Since the child qdisc\u0027s\nqlen was not incremented, qfq fails to deactivate the class, but still\nfrees its pointers from the aggregate. So when the first packet is\nrescheduled after 6.4 seconds (netem\u0027s delay), a dangling pointer is\naccessed causing GangMin\u0027s causing a UAF.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_7_34-rt-1-150700.1.3.1.x86_64",
"SUSE Real Time Module 15 SP7:cluster-md-kmp-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:dlm-kmp-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:gfs2-kmp-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-devel-rt-6.4.0-150700.7.34.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-rt-devel-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-source-rt-6.4.0-150700.7.34.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-syms-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:ocfs2-kmp-rt-6.4.0-150700.7.34.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2026-23074",
"url": "https://www.suse.com/security/cve/CVE-2026-23074"
},
{
"category": "external",
"summary": "SUSE Bug 1257749 for CVE-2026-23074",
"url": "https://bugzilla.suse.com/1257749"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_7_34-rt-1-150700.1.3.1.x86_64",
"SUSE Real Time Module 15 SP7:cluster-md-kmp-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:dlm-kmp-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:gfs2-kmp-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-devel-rt-6.4.0-150700.7.34.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-rt-devel-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-source-rt-6.4.0-150700.7.34.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-syms-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:ocfs2-kmp-rt-6.4.0-150700.7.34.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_7_34-rt-1-150700.1.3.1.x86_64",
"SUSE Real Time Module 15 SP7:cluster-md-kmp-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:dlm-kmp-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:gfs2-kmp-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-devel-rt-6.4.0-150700.7.34.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-rt-devel-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-source-rt-6.4.0-150700.7.34.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-syms-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:ocfs2-kmp-rt-6.4.0-150700.7.34.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-03-23T09:09:02Z",
"details": "important"
}
],
"title": "CVE-2026-23074"
},
{
"cve": "CVE-2026-23076",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2026-23076"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nALSA: ctxfi: Fix potential OOB access in audio mixer handling\n\nIn the audio mixer handling code of ctxfi driver, the conf field is\nused as a kind of loop index, and it\u0027s referred in the index callbacks\n(amixer_index() and sum_index()).\n\nAs spotted recently by fuzzers, the current code causes OOB access at\nthose functions.\n| UBSAN: array-index-out-of-bounds in /build/reproducible-path/linux-6.17.8/sound/pci/ctxfi/ctamixer.c:347:48\n| index 8 is out of range for type \u0027unsigned char [8]\u0027\n\nAfter the analysis, the cause was found to be the lack of the proper\n(re-)initialization of conj field.\n\nThis patch addresses those OOB accesses by adding the proper\ninitializations of the loop indices.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_7_34-rt-1-150700.1.3.1.x86_64",
"SUSE Real Time Module 15 SP7:cluster-md-kmp-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:dlm-kmp-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:gfs2-kmp-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-devel-rt-6.4.0-150700.7.34.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-rt-devel-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-source-rt-6.4.0-150700.7.34.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-syms-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:ocfs2-kmp-rt-6.4.0-150700.7.34.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2026-23076",
"url": "https://www.suse.com/security/cve/CVE-2026-23076"
},
{
"category": "external",
"summary": "SUSE Bug 1257788 for CVE-2026-23076",
"url": "https://bugzilla.suse.com/1257788"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_7_34-rt-1-150700.1.3.1.x86_64",
"SUSE Real Time Module 15 SP7:cluster-md-kmp-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:dlm-kmp-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:gfs2-kmp-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-devel-rt-6.4.0-150700.7.34.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-rt-devel-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-source-rt-6.4.0-150700.7.34.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-syms-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:ocfs2-kmp-rt-6.4.0-150700.7.34.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_7_34-rt-1-150700.1.3.1.x86_64",
"SUSE Real Time Module 15 SP7:cluster-md-kmp-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:dlm-kmp-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:gfs2-kmp-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-devel-rt-6.4.0-150700.7.34.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-rt-devel-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-source-rt-6.4.0-150700.7.34.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-syms-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:ocfs2-kmp-rt-6.4.0-150700.7.34.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-03-23T09:09:02Z",
"details": "moderate"
}
],
"title": "CVE-2026-23076"
},
{
"cve": "CVE-2026-23078",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2026-23078"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nALSA: scarlett2: Fix buffer overflow in config retrieval\n\nThe scarlett2_usb_get_config() function has a logic error in the\nendianness conversion code that can cause buffer overflows when\ncount \u003e 1.\n\nThe code checks `if (size == 2)` where `size` is the total buffer size in\nbytes, then loops `count` times treating each element as u16 (2 bytes).\nThis causes the loop to access `count * 2` bytes when the buffer only\nhas `size` bytes allocated.\n\nFix by checking the element size (config_item-\u003esize) instead of the\ntotal buffer size. This ensures the endianness conversion matches the\nactual element type.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_7_34-rt-1-150700.1.3.1.x86_64",
"SUSE Real Time Module 15 SP7:cluster-md-kmp-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:dlm-kmp-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:gfs2-kmp-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-devel-rt-6.4.0-150700.7.34.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-rt-devel-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-source-rt-6.4.0-150700.7.34.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-syms-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:ocfs2-kmp-rt-6.4.0-150700.7.34.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2026-23078",
"url": "https://www.suse.com/security/cve/CVE-2026-23078"
},
{
"category": "external",
"summary": "SUSE Bug 1257789 for CVE-2026-23078",
"url": "https://bugzilla.suse.com/1257789"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_7_34-rt-1-150700.1.3.1.x86_64",
"SUSE Real Time Module 15 SP7:cluster-md-kmp-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:dlm-kmp-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:gfs2-kmp-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-devel-rt-6.4.0-150700.7.34.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-rt-devel-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-source-rt-6.4.0-150700.7.34.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-syms-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:ocfs2-kmp-rt-6.4.0-150700.7.34.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:P/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_7_34-rt-1-150700.1.3.1.x86_64",
"SUSE Real Time Module 15 SP7:cluster-md-kmp-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:dlm-kmp-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:gfs2-kmp-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-devel-rt-6.4.0-150700.7.34.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-rt-devel-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-source-rt-6.4.0-150700.7.34.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-syms-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:ocfs2-kmp-rt-6.4.0-150700.7.34.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-03-23T09:09:02Z",
"details": "moderate"
}
],
"title": "CVE-2026-23078"
},
{
"cve": "CVE-2026-23080",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2026-23080"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\ncan: mcba_usb: mcba_usb_read_bulk_callback(): fix URB memory leak\n\nFix similar memory leak as in commit 7352e1d5932a (\"can: gs_usb:\ngs_usb_receive_bulk_callback(): fix URB memory leak\").\n\nIn mcba_usb_probe() -\u003e mcba_usb_start(), the URBs for USB-in transfers are\nallocated, added to the priv-\u003erx_submitted anchor and submitted. In the\ncomplete callback mcba_usb_read_bulk_callback(), the URBs are processed and\nresubmitted. In mcba_usb_close() -\u003e mcba_urb_unlink() the URBs are freed by\ncalling usb_kill_anchored_urbs(\u0026priv-\u003erx_submitted).\n\nHowever, this does not take into account that the USB framework unanchors\nthe URB before the complete function is called. This means that once an\nin-URB has been completed, it is no longer anchored and is ultimately not\nreleased in usb_kill_anchored_urbs().\n\nFix the memory leak by anchoring the URB in the\nmcba_usb_read_bulk_callback()to the priv-\u003erx_submitted anchor.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_7_34-rt-1-150700.1.3.1.x86_64",
"SUSE Real Time Module 15 SP7:cluster-md-kmp-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:dlm-kmp-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:gfs2-kmp-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-devel-rt-6.4.0-150700.7.34.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-rt-devel-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-source-rt-6.4.0-150700.7.34.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-syms-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:ocfs2-kmp-rt-6.4.0-150700.7.34.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2026-23080",
"url": "https://www.suse.com/security/cve/CVE-2026-23080"
},
{
"category": "external",
"summary": "SUSE Bug 1257714 for CVE-2026-23080",
"url": "https://bugzilla.suse.com/1257714"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_7_34-rt-1-150700.1.3.1.x86_64",
"SUSE Real Time Module 15 SP7:cluster-md-kmp-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:dlm-kmp-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:gfs2-kmp-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-devel-rt-6.4.0-150700.7.34.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-rt-devel-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-source-rt-6.4.0-150700.7.34.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-syms-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:ocfs2-kmp-rt-6.4.0-150700.7.34.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_7_34-rt-1-150700.1.3.1.x86_64",
"SUSE Real Time Module 15 SP7:cluster-md-kmp-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:dlm-kmp-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:gfs2-kmp-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-devel-rt-6.4.0-150700.7.34.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-rt-devel-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-source-rt-6.4.0-150700.7.34.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-syms-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:ocfs2-kmp-rt-6.4.0-150700.7.34.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-03-23T09:09:02Z",
"details": "moderate"
}
],
"title": "CVE-2026-23080"
},
{
"cve": "CVE-2026-23082",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2026-23082"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\ncan: gs_usb: gs_usb_receive_bulk_callback(): unanchor URL on usb_submit_urb() error\n\nIn commit 7352e1d5932a (\"can: gs_usb: gs_usb_receive_bulk_callback(): fix\nURB memory leak\"), the URB was re-anchored before usb_submit_urb() in\ngs_usb_receive_bulk_callback() to prevent a leak of this URB during\ncleanup.\n\nHowever, this patch did not take into account that usb_submit_urb() could\nfail. The URB remains anchored and\nusb_kill_anchored_urbs(\u0026parent-\u003erx_submitted) in gs_can_close() loops\ninfinitely since the anchor list never becomes empty.\n\nTo fix the bug, unanchor the URB when an usb_submit_urb() error occurs,\nalso print an info message.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_7_34-rt-1-150700.1.3.1.x86_64",
"SUSE Real Time Module 15 SP7:cluster-md-kmp-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:dlm-kmp-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:gfs2-kmp-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-devel-rt-6.4.0-150700.7.34.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-rt-devel-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-source-rt-6.4.0-150700.7.34.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-syms-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:ocfs2-kmp-rt-6.4.0-150700.7.34.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2026-23082",
"url": "https://www.suse.com/security/cve/CVE-2026-23082"
},
{
"category": "external",
"summary": "SUSE Bug 1257715 for CVE-2026-23082",
"url": "https://bugzilla.suse.com/1257715"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_7_34-rt-1-150700.1.3.1.x86_64",
"SUSE Real Time Module 15 SP7:cluster-md-kmp-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:dlm-kmp-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:gfs2-kmp-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-devel-rt-6.4.0-150700.7.34.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-rt-devel-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-source-rt-6.4.0-150700.7.34.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-syms-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:ocfs2-kmp-rt-6.4.0-150700.7.34.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_7_34-rt-1-150700.1.3.1.x86_64",
"SUSE Real Time Module 15 SP7:cluster-md-kmp-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:dlm-kmp-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:gfs2-kmp-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-devel-rt-6.4.0-150700.7.34.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-rt-devel-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-source-rt-6.4.0-150700.7.34.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-syms-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:ocfs2-kmp-rt-6.4.0-150700.7.34.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-03-23T09:09:02Z",
"details": "moderate"
}
],
"title": "CVE-2026-23082"
},
{
"cve": "CVE-2026-23083",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2026-23083"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nfou: Don\u0027t allow 0 for FOU_ATTR_IPPROTO.\n\nfou_udp_recv() has the same problem mentioned in the previous\npatch.\n\nIf FOU_ATTR_IPPROTO is set to 0, skb is not freed by\nfou_udp_recv() nor \"resubmit\"-ted in ip_protocol_deliver_rcu().\n\nLet\u0027s forbid 0 for FOU_ATTR_IPPROTO.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_7_34-rt-1-150700.1.3.1.x86_64",
"SUSE Real Time Module 15 SP7:cluster-md-kmp-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:dlm-kmp-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:gfs2-kmp-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-devel-rt-6.4.0-150700.7.34.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-rt-devel-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-source-rt-6.4.0-150700.7.34.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-syms-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:ocfs2-kmp-rt-6.4.0-150700.7.34.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2026-23083",
"url": "https://www.suse.com/security/cve/CVE-2026-23083"
},
{
"category": "external",
"summary": "SUSE Bug 1257745 for CVE-2026-23083",
"url": "https://bugzilla.suse.com/1257745"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_7_34-rt-1-150700.1.3.1.x86_64",
"SUSE Real Time Module 15 SP7:cluster-md-kmp-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:dlm-kmp-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:gfs2-kmp-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-devel-rt-6.4.0-150700.7.34.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-rt-devel-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-source-rt-6.4.0-150700.7.34.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-syms-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:ocfs2-kmp-rt-6.4.0-150700.7.34.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 3.3,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_7_34-rt-1-150700.1.3.1.x86_64",
"SUSE Real Time Module 15 SP7:cluster-md-kmp-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:dlm-kmp-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:gfs2-kmp-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-devel-rt-6.4.0-150700.7.34.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-rt-devel-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-source-rt-6.4.0-150700.7.34.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-syms-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:ocfs2-kmp-rt-6.4.0-150700.7.34.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-03-23T09:09:02Z",
"details": "low"
}
],
"title": "CVE-2026-23083"
},
{
"cve": "CVE-2026-23084",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2026-23084"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nbe2net: Fix NULL pointer dereference in be_cmd_get_mac_from_list\n\nWhen the parameter pmac_id_valid argument of be_cmd_get_mac_from_list() is\nset to false, the driver may request the PMAC_ID from the firmware of the\nnetwork card, and this function will store that PMAC_ID at the provided\naddress pmac_id. This is the contract of this function.\n\nHowever, there is a location within the driver where both\npmac_id_valid == false and pmac_id == NULL are being passed. This could\nresult in dereferencing a NULL pointer.\n\nTo resolve this issue, it is necessary to pass the address of a stub\nvariable to the function.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_7_34-rt-1-150700.1.3.1.x86_64",
"SUSE Real Time Module 15 SP7:cluster-md-kmp-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:dlm-kmp-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:gfs2-kmp-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-devel-rt-6.4.0-150700.7.34.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-rt-devel-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-source-rt-6.4.0-150700.7.34.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-syms-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:ocfs2-kmp-rt-6.4.0-150700.7.34.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2026-23084",
"url": "https://www.suse.com/security/cve/CVE-2026-23084"
},
{
"category": "external",
"summary": "SUSE Bug 1257830 for CVE-2026-23084",
"url": "https://bugzilla.suse.com/1257830"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_7_34-rt-1-150700.1.3.1.x86_64",
"SUSE Real Time Module 15 SP7:cluster-md-kmp-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:dlm-kmp-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:gfs2-kmp-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-devel-rt-6.4.0-150700.7.34.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-rt-devel-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-source-rt-6.4.0-150700.7.34.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-syms-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:ocfs2-kmp-rt-6.4.0-150700.7.34.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_7_34-rt-1-150700.1.3.1.x86_64",
"SUSE Real Time Module 15 SP7:cluster-md-kmp-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:dlm-kmp-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:gfs2-kmp-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-devel-rt-6.4.0-150700.7.34.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-rt-devel-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-source-rt-6.4.0-150700.7.34.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-syms-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:ocfs2-kmp-rt-6.4.0-150700.7.34.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-03-23T09:09:02Z",
"details": "moderate"
}
],
"title": "CVE-2026-23084"
},
{
"cve": "CVE-2026-23085",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2026-23085"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nirqchip/gic-v3-its: Avoid truncating memory addresses\n\nOn 32-bit machines with CONFIG_ARM_LPAE, it is possible for lowmem\nallocations to be backed by addresses physical memory above the 32-bit\naddress limit, as found while experimenting with larger VMSPLIT\nconfigurations.\n\nThis caused the qemu virt model to crash in the GICv3 driver, which\nallocates the \u0027itt\u0027 object using GFP_KERNEL. Since all memory below\nthe 4GB physical address limit is in ZONE_DMA in this configuration,\nkmalloc() defaults to higher addresses for ZONE_NORMAL, and the\nITS driver stores the physical address in a 32-bit \u0027unsigned long\u0027\nvariable.\n\nChange the itt_addr variable to the correct phys_addr_t type instead,\nalong with all other variables in this driver that hold a physical\naddress.\n\nThe gicv5 driver correctly uses u64 variables, while all other irqchip\ndrivers don\u0027t call virt_to_phys or similar interfaces. It\u0027s expected that\nother device drivers have similar issues, but fixing this one is\nsufficient for booting a virtio based guest.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_7_34-rt-1-150700.1.3.1.x86_64",
"SUSE Real Time Module 15 SP7:cluster-md-kmp-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:dlm-kmp-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:gfs2-kmp-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-devel-rt-6.4.0-150700.7.34.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-rt-devel-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-source-rt-6.4.0-150700.7.34.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-syms-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:ocfs2-kmp-rt-6.4.0-150700.7.34.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2026-23085",
"url": "https://www.suse.com/security/cve/CVE-2026-23085"
},
{
"category": "external",
"summary": "SUSE Bug 1257758 for CVE-2026-23085",
"url": "https://bugzilla.suse.com/1257758"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_7_34-rt-1-150700.1.3.1.x86_64",
"SUSE Real Time Module 15 SP7:cluster-md-kmp-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:dlm-kmp-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:gfs2-kmp-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-devel-rt-6.4.0-150700.7.34.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-rt-devel-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-source-rt-6.4.0-150700.7.34.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-syms-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:ocfs2-kmp-rt-6.4.0-150700.7.34.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_7_34-rt-1-150700.1.3.1.x86_64",
"SUSE Real Time Module 15 SP7:cluster-md-kmp-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:dlm-kmp-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:gfs2-kmp-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-devel-rt-6.4.0-150700.7.34.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-rt-devel-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-source-rt-6.4.0-150700.7.34.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-syms-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:ocfs2-kmp-rt-6.4.0-150700.7.34.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-03-23T09:09:02Z",
"details": "moderate"
}
],
"title": "CVE-2026-23085"
},
{
"cve": "CVE-2026-23086",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2026-23086"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nvsock/virtio: cap TX credit to local buffer size\n\nThe virtio transports derives its TX credit directly from peer_buf_alloc,\nwhich is set from the remote endpoint\u0027s SO_VM_SOCKETS_BUFFER_SIZE value.\n\nOn the host side this means that the amount of data we are willing to\nqueue for a connection is scaled by a guest-chosen buffer size, rather\nthan the host\u0027s own vsock configuration. A malicious guest can advertise\na large buffer and read slowly, causing the host to allocate a\ncorrespondingly large amount of sk_buff memory.\nThe same thing would happen in the guest with a malicious host, since\nvirtio transports share the same code base.\n\nIntroduce a small helper, virtio_transport_tx_buf_size(), that\nreturns min(peer_buf_alloc, buf_alloc), and use it wherever we consume\npeer_buf_alloc.\n\nThis ensures the effective TX window is bounded by both the peer\u0027s\nadvertised buffer and our own buf_alloc (already clamped to\nbuffer_max_size via SO_VM_SOCKETS_BUFFER_MAX_SIZE), so a remote peer\ncannot force the other to queue more data than allowed by its own\nvsock settings.\n\nOn an unpatched Ubuntu 22.04 host (~64 GiB RAM), running a PoC with\n32 guest vsock connections advertising 2 GiB each and reading slowly\ndrove Slab/SUnreclaim from ~0.5 GiB to ~57 GiB; the system only\nrecovered after killing the QEMU process. That said, if QEMU memory is\nlimited with cgroups, the maximum memory used will be limited.\n\nWith this patch applied:\n\n Before:\n MemFree: ~61.6 GiB\n Slab: ~142 MiB\n SUnreclaim: ~117 MiB\n\n After 32 high-credit connections:\n MemFree: ~61.5 GiB\n Slab: ~178 MiB\n SUnreclaim: ~152 MiB\n\nOnly ~35 MiB increase in Slab/SUnreclaim, no host OOM, and the guest\nremains responsive.\n\nCompatibility with non-virtio transports:\n\n - VMCI uses the AF_VSOCK buffer knobs to size its queue pairs per\n socket based on the local vsk-\u003ebuffer_* values; the remote side\n cannot enlarge those queues beyond what the local endpoint\n configured.\n\n - Hyper-V\u0027s vsock transport uses fixed-size VMBus ring buffers and\n an MTU bound; there is no peer-controlled credit field comparable\n to peer_buf_alloc, and the remote endpoint cannot drive in-flight\n kernel memory above those ring sizes.\n\n - The loopback path reuses virtio_transport_common.c, so it\n naturally follows the same semantics as the virtio transport.\n\nThis change is limited to virtio_transport_common.c and thus affects\nvirtio-vsock, vhost-vsock, and loopback, bringing them in line with the\n\"remote window intersected with local policy\" behaviour that VMCI and\nHyper-V already effectively have.\n\n[Stefano: small adjustments after changing the previous patch]\n[Stefano: tweak the commit message]",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_7_34-rt-1-150700.1.3.1.x86_64",
"SUSE Real Time Module 15 SP7:cluster-md-kmp-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:dlm-kmp-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:gfs2-kmp-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-devel-rt-6.4.0-150700.7.34.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-rt-devel-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-source-rt-6.4.0-150700.7.34.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-syms-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:ocfs2-kmp-rt-6.4.0-150700.7.34.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2026-23086",
"url": "https://www.suse.com/security/cve/CVE-2026-23086"
},
{
"category": "external",
"summary": "SUSE Bug 1257757 for CVE-2026-23086",
"url": "https://bugzilla.suse.com/1257757"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_7_34-rt-1-150700.1.3.1.x86_64",
"SUSE Real Time Module 15 SP7:cluster-md-kmp-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:dlm-kmp-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:gfs2-kmp-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-devel-rt-6.4.0-150700.7.34.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-rt-devel-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-source-rt-6.4.0-150700.7.34.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-syms-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:ocfs2-kmp-rt-6.4.0-150700.7.34.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_7_34-rt-1-150700.1.3.1.x86_64",
"SUSE Real Time Module 15 SP7:cluster-md-kmp-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:dlm-kmp-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:gfs2-kmp-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-devel-rt-6.4.0-150700.7.34.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-rt-devel-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-source-rt-6.4.0-150700.7.34.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-syms-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:ocfs2-kmp-rt-6.4.0-150700.7.34.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-03-23T09:09:02Z",
"details": "moderate"
}
],
"title": "CVE-2026-23086"
},
{
"cve": "CVE-2026-23088",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2026-23088"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\ntracing: Fix crash on synthetic stacktrace field usage\n\nWhen creating a synthetic event based on an existing synthetic event that\nhad a stacktrace field and the new synthetic event used that field a\nkernel crash occurred:\n\n ~# cd /sys/kernel/tracing\n ~# echo \u0027s:stack unsigned long stack[];\u0027 \u003e dynamic_events\n ~# echo \u0027hist:keys=prev_pid:s0=common_stacktrace if prev_state \u0026 3\u0027 \u003e\u003e events/sched/sched_switch/trigger\n ~# echo \u0027hist:keys=next_pid:s1=$s0:onmatch(sched.sched_switch).trace(stack,$s1)\u0027 \u003e\u003e events/sched/sched_switch/trigger\n\nThe above creates a synthetic event that takes a stacktrace when a task\nschedules out in a non-running state and passes that stacktrace to the\nsched_switch event when that task schedules back in. It triggers the\n\"stack\" synthetic event that has a stacktrace as its field (called \"stack\").\n\n ~# echo \u0027s:syscall_stack s64 id; unsigned long stack[];\u0027 \u003e\u003e dynamic_events\n ~# echo \u0027hist:keys=common_pid:s2=stack\u0027 \u003e\u003e events/synthetic/stack/trigger\n ~# echo \u0027hist:keys=common_pid:s3=$s2,i0=id:onmatch(synthetic.stack).trace(syscall_stack,$i0,$s3)\u0027 \u003e\u003e events/raw_syscalls/sys_exit/trigger\n\nThe above makes another synthetic event called \"syscall_stack\" that\nattaches the first synthetic event (stack) to the sys_exit trace event and\nrecords the stacktrace from the stack event with the id of the system call\nthat is exiting.\n\nWhen enabling this event (or using it in a historgram):\n\n ~# echo 1 \u003e events/synthetic/syscall_stack/enable\n\nProduces a kernel crash!\n\n BUG: unable to handle page fault for address: 0000000000400010\n #PF: supervisor read access in kernel mode\n #PF: error_code(0x0000) - not-present page\n PGD 0 P4D 0\n Oops: Oops: 0000 [#1] SMP PTI\n CPU: 6 UID: 0 PID: 1257 Comm: bash Not tainted 6.16.3+deb14-amd64 #1 PREEMPT(lazy) Debian 6.16.3-1\n Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.17.0-debian-1.17.0-1 04/01/2014\n RIP: 0010:trace_event_raw_event_synth+0x90/0x380\n Code: c5 00 00 00 00 85 d2 0f 84 e1 00 00 00 31 db eb 34 0f 1f 00 66 66 2e 0f 1f 84 00 00 00 00 00 66 66 2e 0f 1f 84 00 00 00 00 00 \u003c49\u003e 8b 04 24 48 83 c3 01 8d 0c c5 08 00 00 00 01 cd 41 3b 5d 40 0f\n RSP: 0018:ffffd2670388f958 EFLAGS: 00010202\n RAX: ffff8ba1065cc100 RBX: 0000000000000000 RCX: 0000000000000000\n RDX: 0000000000000001 RSI: fffff266ffda7b90 RDI: ffffd2670388f9b0\n RBP: 0000000000000010 R08: ffff8ba104e76000 R09: ffffd2670388fa50\n R10: ffff8ba102dd42e0 R11: ffffffff9a908970 R12: 0000000000400010\n R13: ffff8ba10a246400 R14: ffff8ba10a710220 R15: fffff266ffda7b90\n FS: 00007fa3bc63f740(0000) GS:ffff8ba2e0f48000(0000) knlGS:0000000000000000\n CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033\n CR2: 0000000000400010 CR3: 0000000107f9e003 CR4: 0000000000172ef0\n Call Trace:\n \u003cTASK\u003e\n ? __tracing_map_insert+0x208/0x3a0\n action_trace+0x67/0x70\n event_hist_trigger+0x633/0x6d0\n event_triggers_call+0x82/0x130\n trace_event_buffer_commit+0x19d/0x250\n trace_event_raw_event_sys_exit+0x62/0xb0\n syscall_exit_work+0x9d/0x140\n do_syscall_64+0x20a/0x2f0\n ? trace_event_raw_event_sched_switch+0x12b/0x170\n ? save_fpregs_to_fpstate+0x3e/0x90\n ? _raw_spin_unlock+0xe/0x30\n ? finish_task_switch.isra.0+0x97/0x2c0\n ? __rseq_handle_notify_resume+0xad/0x4c0\n ? __schedule+0x4b8/0xd00\n ? restore_fpregs_from_fpstate+0x3c/0x90\n ? switch_fpu_return+0x5b/0xe0\n ? do_syscall_64+0x1ef/0x2f0\n ? do_fault+0x2e9/0x540\n ? __handle_mm_fault+0x7d1/0xf70\n ? count_memcg_events+0x167/0x1d0\n ? handle_mm_fault+0x1d7/0x2e0\n ? do_user_addr_fault+0x2c3/0x7f0\n entry_SYSCALL_64_after_hwframe+0x76/0x7e\n\nThe reason is that the stacktrace field is not labeled as such, and is\ntreated as a normal field and not as a dynamic event that it is.\n\nIn trace_event_raw_event_synth() the event is field is still treated as a\ndynamic array, but the retrieval of the data is considered a normal field,\nand the reference is just the meta data:\n\n// Meta data is retrieved instead of a dynamic array\n---truncated---",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_7_34-rt-1-150700.1.3.1.x86_64",
"SUSE Real Time Module 15 SP7:cluster-md-kmp-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:dlm-kmp-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:gfs2-kmp-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-devel-rt-6.4.0-150700.7.34.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-rt-devel-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-source-rt-6.4.0-150700.7.34.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-syms-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:ocfs2-kmp-rt-6.4.0-150700.7.34.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2026-23088",
"url": "https://www.suse.com/security/cve/CVE-2026-23088"
},
{
"category": "external",
"summary": "SUSE Bug 1257814 for CVE-2026-23088",
"url": "https://bugzilla.suse.com/1257814"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_7_34-rt-1-150700.1.3.1.x86_64",
"SUSE Real Time Module 15 SP7:cluster-md-kmp-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:dlm-kmp-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:gfs2-kmp-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-devel-rt-6.4.0-150700.7.34.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-rt-devel-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-source-rt-6.4.0-150700.7.34.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-syms-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:ocfs2-kmp-rt-6.4.0-150700.7.34.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_7_34-rt-1-150700.1.3.1.x86_64",
"SUSE Real Time Module 15 SP7:cluster-md-kmp-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:dlm-kmp-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:gfs2-kmp-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-devel-rt-6.4.0-150700.7.34.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-rt-devel-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-source-rt-6.4.0-150700.7.34.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-syms-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:ocfs2-kmp-rt-6.4.0-150700.7.34.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-03-23T09:09:02Z",
"details": "moderate"
}
],
"title": "CVE-2026-23088"
},
{
"cve": "CVE-2026-23089",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2026-23089"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nALSA: usb-audio: Fix use-after-free in snd_usb_mixer_free()\n\nWhen snd_usb_create_mixer() fails, snd_usb_mixer_free() frees\nmixer-\u003eid_elems but the controls already added to the card still\nreference the freed memory. Later when snd_card_register() runs,\nthe OSS mixer layer calls their callbacks and hits a use-after-free read.\n\nCall trace:\n get_ctl_value+0x63f/0x820 sound/usb/mixer.c:411\n get_min_max_with_quirks.isra.0+0x240/0x1f40 sound/usb/mixer.c:1241\n mixer_ctl_feature_info+0x26b/0x490 sound/usb/mixer.c:1381\n snd_mixer_oss_build_test+0x174/0x3a0 sound/core/oss/mixer_oss.c:887\n ...\n snd_card_register+0x4ed/0x6d0 sound/core/init.c:923\n usb_audio_probe+0x5ef/0x2a90 sound/usb/card.c:1025\n\nFix by calling snd_ctl_remove() for all mixer controls before freeing\nid_elems. We save the next pointer first because snd_ctl_remove()\nfrees the current element.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_7_34-rt-1-150700.1.3.1.x86_64",
"SUSE Real Time Module 15 SP7:cluster-md-kmp-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:dlm-kmp-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:gfs2-kmp-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-devel-rt-6.4.0-150700.7.34.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-rt-devel-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-source-rt-6.4.0-150700.7.34.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-syms-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:ocfs2-kmp-rt-6.4.0-150700.7.34.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2026-23089",
"url": "https://www.suse.com/security/cve/CVE-2026-23089"
},
{
"category": "external",
"summary": "SUSE Bug 1257790 for CVE-2026-23089",
"url": "https://bugzilla.suse.com/1257790"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_7_34-rt-1-150700.1.3.1.x86_64",
"SUSE Real Time Module 15 SP7:cluster-md-kmp-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:dlm-kmp-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:gfs2-kmp-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-devel-rt-6.4.0-150700.7.34.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-rt-devel-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-source-rt-6.4.0-150700.7.34.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-syms-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:ocfs2-kmp-rt-6.4.0-150700.7.34.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.9,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_7_34-rt-1-150700.1.3.1.x86_64",
"SUSE Real Time Module 15 SP7:cluster-md-kmp-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:dlm-kmp-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:gfs2-kmp-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-devel-rt-6.4.0-150700.7.34.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-rt-devel-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-source-rt-6.4.0-150700.7.34.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-syms-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:ocfs2-kmp-rt-6.4.0-150700.7.34.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-03-23T09:09:02Z",
"details": "moderate"
}
],
"title": "CVE-2026-23089"
},
{
"cve": "CVE-2026-23090",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2026-23090"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nslimbus: core: fix device reference leak on report present\n\nSlimbus devices can be allocated dynamically upon reception of\nreport-present messages.\n\nMake sure to drop the reference taken when looking up already registered\ndevices.\n\nNote that this requires taking an extra reference in case the device has\nnot yet been registered and has to be allocated.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_7_34-rt-1-150700.1.3.1.x86_64",
"SUSE Real Time Module 15 SP7:cluster-md-kmp-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:dlm-kmp-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:gfs2-kmp-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-devel-rt-6.4.0-150700.7.34.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-rt-devel-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-source-rt-6.4.0-150700.7.34.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-syms-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:ocfs2-kmp-rt-6.4.0-150700.7.34.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2026-23090",
"url": "https://www.suse.com/security/cve/CVE-2026-23090"
},
{
"category": "external",
"summary": "SUSE Bug 1257759 for CVE-2026-23090",
"url": "https://bugzilla.suse.com/1257759"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_7_34-rt-1-150700.1.3.1.x86_64",
"SUSE Real Time Module 15 SP7:cluster-md-kmp-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:dlm-kmp-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:gfs2-kmp-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-devel-rt-6.4.0-150700.7.34.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-rt-devel-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-source-rt-6.4.0-150700.7.34.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-syms-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:ocfs2-kmp-rt-6.4.0-150700.7.34.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_7_34-rt-1-150700.1.3.1.x86_64",
"SUSE Real Time Module 15 SP7:cluster-md-kmp-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:dlm-kmp-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:gfs2-kmp-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-devel-rt-6.4.0-150700.7.34.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-rt-devel-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-source-rt-6.4.0-150700.7.34.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-syms-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:ocfs2-kmp-rt-6.4.0-150700.7.34.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-03-23T09:09:02Z",
"details": "moderate"
}
],
"title": "CVE-2026-23090"
},
{
"cve": "CVE-2026-23091",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2026-23091"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nintel_th: fix device leak on output open()\n\nMake sure to drop the reference taken when looking up the th device\nduring output device open() on errors and on close().\n\nNote that a recent commit fixed the leak in a couple of open() error\npaths but not all of them, and the reference is still leaking on\nsuccessful open().",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_7_34-rt-1-150700.1.3.1.x86_64",
"SUSE Real Time Module 15 SP7:cluster-md-kmp-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:dlm-kmp-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:gfs2-kmp-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-devel-rt-6.4.0-150700.7.34.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-rt-devel-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-source-rt-6.4.0-150700.7.34.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-syms-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:ocfs2-kmp-rt-6.4.0-150700.7.34.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2026-23091",
"url": "https://www.suse.com/security/cve/CVE-2026-23091"
},
{
"category": "external",
"summary": "SUSE Bug 1257813 for CVE-2026-23091",
"url": "https://bugzilla.suse.com/1257813"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_7_34-rt-1-150700.1.3.1.x86_64",
"SUSE Real Time Module 15 SP7:cluster-md-kmp-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:dlm-kmp-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:gfs2-kmp-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-devel-rt-6.4.0-150700.7.34.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-rt-devel-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-source-rt-6.4.0-150700.7.34.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-syms-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:ocfs2-kmp-rt-6.4.0-150700.7.34.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_7_34-rt-1-150700.1.3.1.x86_64",
"SUSE Real Time Module 15 SP7:cluster-md-kmp-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:dlm-kmp-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:gfs2-kmp-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-devel-rt-6.4.0-150700.7.34.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-rt-devel-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-source-rt-6.4.0-150700.7.34.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-syms-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:ocfs2-kmp-rt-6.4.0-150700.7.34.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-03-23T09:09:02Z",
"details": "moderate"
}
],
"title": "CVE-2026-23091"
},
{
"cve": "CVE-2026-23094",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2026-23094"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nuacce: fix isolate sysfs check condition\n\nuacce supports the device isolation feature. If the driver\nimplements the isolate_err_threshold_read and\nisolate_err_threshold_write callback functions, uacce will create\nsysfs files now. Users can read and configure the isolation policy\nthrough sysfs. Currently, sysfs files are created as long as either\nisolate_err_threshold_read or isolate_err_threshold_write callback\nfunctions are present.\n\nHowever, accessing a non-existent callback function may cause the\nsystem to crash. Therefore, intercept the creation of sysfs if\nneither read nor write exists; create sysfs if either is supported,\nbut intercept unsupported operations at the call site.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_7_34-rt-1-150700.1.3.1.x86_64",
"SUSE Real Time Module 15 SP7:cluster-md-kmp-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:dlm-kmp-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:gfs2-kmp-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-devel-rt-6.4.0-150700.7.34.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-rt-devel-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-source-rt-6.4.0-150700.7.34.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-syms-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:ocfs2-kmp-rt-6.4.0-150700.7.34.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2026-23094",
"url": "https://www.suse.com/security/cve/CVE-2026-23094"
},
{
"category": "external",
"summary": "SUSE Bug 1257811 for CVE-2026-23094",
"url": "https://bugzilla.suse.com/1257811"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_7_34-rt-1-150700.1.3.1.x86_64",
"SUSE Real Time Module 15 SP7:cluster-md-kmp-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:dlm-kmp-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:gfs2-kmp-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-devel-rt-6.4.0-150700.7.34.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-rt-devel-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-source-rt-6.4.0-150700.7.34.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-syms-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:ocfs2-kmp-rt-6.4.0-150700.7.34.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_7_34-rt-1-150700.1.3.1.x86_64",
"SUSE Real Time Module 15 SP7:cluster-md-kmp-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:dlm-kmp-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:gfs2-kmp-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-devel-rt-6.4.0-150700.7.34.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-rt-devel-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-source-rt-6.4.0-150700.7.34.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-syms-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:ocfs2-kmp-rt-6.4.0-150700.7.34.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-03-23T09:09:02Z",
"details": "moderate"
}
],
"title": "CVE-2026-23094"
},
{
"cve": "CVE-2026-23095",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2026-23095"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\ngue: Fix skb memleak with inner IP protocol 0.\n\nsyzbot reported skb memleak below. [0]\n\nThe repro generated a GUE packet with its inner protocol 0.\n\ngue_udp_recv() returns -guehdr-\u003eproto_ctype for \"resubmit\"\nin ip_protocol_deliver_rcu(), but this only works with\nnon-zero protocol number.\n\nLet\u0027s drop such packets.\n\nNote that 0 is a valid number (IPv6 Hop-by-Hop Option).\n\nI think it is not practical to encap HOPOPT in GUE, so once\nsomeone starts to complain, we could pass down a resubmit\nflag pointer to distinguish two zeros from the upper layer:\n\n * no error\n * resubmit HOPOPT\n\n[0]\nBUG: memory leak\nunreferenced object 0xffff888109695a00 (size 240):\n comm \"syz.0.17\", pid 6088, jiffies 4294943096\n hex dump (first 32 bytes):\n 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................\n 00 40 c2 10 81 88 ff ff 00 00 00 00 00 00 00 00 .@..............\n backtrace (crc a84b336f):\n kmemleak_alloc_recursive include/linux/kmemleak.h:44 [inline]\n slab_post_alloc_hook mm/slub.c:4958 [inline]\n slab_alloc_node mm/slub.c:5263 [inline]\n kmem_cache_alloc_noprof+0x3b4/0x590 mm/slub.c:5270\n __build_skb+0x23/0x60 net/core/skbuff.c:474\n build_skb+0x20/0x190 net/core/skbuff.c:490\n __tun_build_skb drivers/net/tun.c:1541 [inline]\n tun_build_skb+0x4a1/0xa40 drivers/net/tun.c:1636\n tun_get_user+0xc12/0x2030 drivers/net/tun.c:1770\n tun_chr_write_iter+0x71/0x120 drivers/net/tun.c:1999\n new_sync_write fs/read_write.c:593 [inline]\n vfs_write+0x45d/0x710 fs/read_write.c:686\n ksys_write+0xa7/0x170 fs/read_write.c:738\n do_syscall_x64 arch/x86/entry/syscall_64.c:63 [inline]\n do_syscall_64+0xa4/0xf80 arch/x86/entry/syscall_64.c:94\n entry_SYSCALL_64_after_hwframe+0x77/0x7f",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_7_34-rt-1-150700.1.3.1.x86_64",
"SUSE Real Time Module 15 SP7:cluster-md-kmp-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:dlm-kmp-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:gfs2-kmp-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-devel-rt-6.4.0-150700.7.34.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-rt-devel-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-source-rt-6.4.0-150700.7.34.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-syms-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:ocfs2-kmp-rt-6.4.0-150700.7.34.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2026-23095",
"url": "https://www.suse.com/security/cve/CVE-2026-23095"
},
{
"category": "external",
"summary": "SUSE Bug 1257808 for CVE-2026-23095",
"url": "https://bugzilla.suse.com/1257808"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_7_34-rt-1-150700.1.3.1.x86_64",
"SUSE Real Time Module 15 SP7:cluster-md-kmp-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:dlm-kmp-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:gfs2-kmp-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-devel-rt-6.4.0-150700.7.34.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-rt-devel-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-source-rt-6.4.0-150700.7.34.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-syms-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:ocfs2-kmp-rt-6.4.0-150700.7.34.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_7_34-rt-1-150700.1.3.1.x86_64",
"SUSE Real Time Module 15 SP7:cluster-md-kmp-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:dlm-kmp-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:gfs2-kmp-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-devel-rt-6.4.0-150700.7.34.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-rt-devel-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-source-rt-6.4.0-150700.7.34.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-syms-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:ocfs2-kmp-rt-6.4.0-150700.7.34.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-03-23T09:09:02Z",
"details": "moderate"
}
],
"title": "CVE-2026-23095"
},
{
"cve": "CVE-2026-23096",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2026-23096"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nuacce: fix cdev handling in the cleanup path\n\nWhen cdev_device_add fails, it internally releases the cdev memory,\nand if cdev_device_del is then executed, it will cause a hang error.\nTo fix it, we check the return value of cdev_device_add() and clear\nuacce-\u003ecdev to avoid calling cdev_device_del in the uacce_remove.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_7_34-rt-1-150700.1.3.1.x86_64",
"SUSE Real Time Module 15 SP7:cluster-md-kmp-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:dlm-kmp-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:gfs2-kmp-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-devel-rt-6.4.0-150700.7.34.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-rt-devel-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-source-rt-6.4.0-150700.7.34.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-syms-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:ocfs2-kmp-rt-6.4.0-150700.7.34.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2026-23096",
"url": "https://www.suse.com/security/cve/CVE-2026-23096"
},
{
"category": "external",
"summary": "SUSE Bug 1257809 for CVE-2026-23096",
"url": "https://bugzilla.suse.com/1257809"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_7_34-rt-1-150700.1.3.1.x86_64",
"SUSE Real Time Module 15 SP7:cluster-md-kmp-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:dlm-kmp-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:gfs2-kmp-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-devel-rt-6.4.0-150700.7.34.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-rt-devel-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-source-rt-6.4.0-150700.7.34.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-syms-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:ocfs2-kmp-rt-6.4.0-150700.7.34.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_7_34-rt-1-150700.1.3.1.x86_64",
"SUSE Real Time Module 15 SP7:cluster-md-kmp-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:dlm-kmp-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:gfs2-kmp-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-devel-rt-6.4.0-150700.7.34.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-rt-devel-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-source-rt-6.4.0-150700.7.34.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-syms-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:ocfs2-kmp-rt-6.4.0-150700.7.34.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-03-23T09:09:02Z",
"details": "moderate"
}
],
"title": "CVE-2026-23096"
},
{
"cve": "CVE-2026-23099",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2026-23099"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nbonding: limit BOND_MODE_8023AD to Ethernet devices\n\nBOND_MODE_8023AD makes sense for ARPHRD_ETHER only.\n\nsyzbot reported:\n\n BUG: KASAN: global-out-of-bounds in __hw_addr_create net/core/dev_addr_lists.c:63 [inline]\n BUG: KASAN: global-out-of-bounds in __hw_addr_add_ex+0x25d/0x760 net/core/dev_addr_lists.c:118\nRead of size 16 at addr ffffffff8bf94040 by task syz.1.3580/19497\n\nCPU: 1 UID: 0 PID: 19497 Comm: syz.1.3580 Tainted: G L syzkaller #0 PREEMPT(full)\nTainted: [L]=SOFTLOCKUP\nHardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/25/2025\nCall Trace:\n \u003cTASK\u003e\n dump_stack_lvl+0xe8/0x150 lib/dump_stack.c:120\n print_address_description mm/kasan/report.c:378 [inline]\n print_report+0xca/0x240 mm/kasan/report.c:482\n kasan_report+0x118/0x150 mm/kasan/report.c:595\n check_region_inline mm/kasan/generic.c:-1 [inline]\n kasan_check_range+0x2b0/0x2c0 mm/kasan/generic.c:200\n __asan_memcpy+0x29/0x70 mm/kasan/shadow.c:105\n __hw_addr_create net/core/dev_addr_lists.c:63 [inline]\n __hw_addr_add_ex+0x25d/0x760 net/core/dev_addr_lists.c:118\n __dev_mc_add net/core/dev_addr_lists.c:868 [inline]\n dev_mc_add+0xa1/0x120 net/core/dev_addr_lists.c:886\n bond_enslave+0x2b8b/0x3ac0 drivers/net/bonding/bond_main.c:2180\n do_set_master+0x533/0x6d0 net/core/rtnetlink.c:2963\n do_setlink+0xcf0/0x41c0 net/core/rtnetlink.c:3165\n rtnl_changelink net/core/rtnetlink.c:3776 [inline]\n __rtnl_newlink net/core/rtnetlink.c:3935 [inline]\n rtnl_newlink+0x161c/0x1c90 net/core/rtnetlink.c:4072\n rtnetlink_rcv_msg+0x7cf/0xb70 net/core/rtnetlink.c:6958\n netlink_rcv_skb+0x208/0x470 net/netlink/af_netlink.c:2550\n netlink_unicast_kernel net/netlink/af_netlink.c:1318 [inline]\n netlink_unicast+0x82f/0x9e0 net/netlink/af_netlink.c:1344\n netlink_sendmsg+0x805/0xb30 net/netlink/af_netlink.c:1894\n sock_sendmsg_nosec net/socket.c:727 [inline]\n __sock_sendmsg+0x21c/0x270 net/socket.c:742\n ____sys_sendmsg+0x505/0x820 net/socket.c:2592\n ___sys_sendmsg+0x21f/0x2a0 net/socket.c:2646\n __sys_sendmsg+0x164/0x220 net/socket.c:2678\n do_syscall_32_irqs_on arch/x86/entry/syscall_32.c:83 [inline]\n __do_fast_syscall_32+0x1dc/0x560 arch/x86/entry/syscall_32.c:307\n do_fast_syscall_32+0x34/0x80 arch/x86/entry/syscall_32.c:332\n entry_SYSENTER_compat_after_hwframe+0x84/0x8e\n \u003c/TASK\u003e\n\nThe buggy address belongs to the variable:\n lacpdu_mcast_addr+0x0/0x40",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_7_34-rt-1-150700.1.3.1.x86_64",
"SUSE Real Time Module 15 SP7:cluster-md-kmp-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:dlm-kmp-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:gfs2-kmp-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-devel-rt-6.4.0-150700.7.34.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-rt-devel-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-source-rt-6.4.0-150700.7.34.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-syms-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:ocfs2-kmp-rt-6.4.0-150700.7.34.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2026-23099",
"url": "https://www.suse.com/security/cve/CVE-2026-23099"
},
{
"category": "external",
"summary": "SUSE Bug 1257816 for CVE-2026-23099",
"url": "https://bugzilla.suse.com/1257816"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_7_34-rt-1-150700.1.3.1.x86_64",
"SUSE Real Time Module 15 SP7:cluster-md-kmp-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:dlm-kmp-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:gfs2-kmp-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-devel-rt-6.4.0-150700.7.34.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-rt-devel-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-source-rt-6.4.0-150700.7.34.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-syms-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:ocfs2-kmp-rt-6.4.0-150700.7.34.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_7_34-rt-1-150700.1.3.1.x86_64",
"SUSE Real Time Module 15 SP7:cluster-md-kmp-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:dlm-kmp-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:gfs2-kmp-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-devel-rt-6.4.0-150700.7.34.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-rt-devel-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-source-rt-6.4.0-150700.7.34.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-syms-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:ocfs2-kmp-rt-6.4.0-150700.7.34.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-03-23T09:09:02Z",
"details": "moderate"
}
],
"title": "CVE-2026-23099"
},
{
"cve": "CVE-2026-23101",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2026-23101"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nleds: led-class: Only Add LED to leds_list when it is fully ready\n\nBefore this change the LED was added to leds_list before led_init_core()\ngets called adding it the list before led_classdev.set_brightness_work gets\ninitialized.\n\nThis leaves a window where led_trigger_register() of a LED\u0027s default\ntrigger will call led_trigger_set() which calls led_set_brightness()\nwhich in turn will end up queueing the *uninitialized*\nled_classdev.set_brightness_work.\n\nThis race gets hit by the lenovo-thinkpad-t14s EC driver which registers\n2 LEDs with a default trigger provided by snd_ctl_led.ko in quick\nsuccession. The first led_classdev_register() causes an async modprobe of\nsnd_ctl_led to run and that async modprobe manages to exactly hit\nthe window where the second LED is on the leds_list without led_init_core()\nbeing called for it, resulting in:\n\n ------------[ cut here ]------------\n WARNING: CPU: 11 PID: 5608 at kernel/workqueue.c:4234 __flush_work+0x344/0x390\n Hardware name: LENOVO 21N2S01F0B/21N2S01F0B, BIOS N42ET93W (2.23 ) 09/01/2025\n ...\n Call trace:\n __flush_work+0x344/0x390 (P)\n flush_work+0x2c/0x50\n led_trigger_set+0x1c8/0x340\n led_trigger_register+0x17c/0x1c0\n led_trigger_register_simple+0x84/0xe8\n snd_ctl_led_init+0x40/0xf88 [snd_ctl_led]\n do_one_initcall+0x5c/0x318\n do_init_module+0x9c/0x2b8\n load_module+0x7e0/0x998\n\nClose the race window by moving the adding of the LED to leds_list to\nafter the led_init_core() call.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_7_34-rt-1-150700.1.3.1.x86_64",
"SUSE Real Time Module 15 SP7:cluster-md-kmp-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:dlm-kmp-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:gfs2-kmp-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-devel-rt-6.4.0-150700.7.34.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-rt-devel-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-source-rt-6.4.0-150700.7.34.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-syms-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:ocfs2-kmp-rt-6.4.0-150700.7.34.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2026-23101",
"url": "https://www.suse.com/security/cve/CVE-2026-23101"
},
{
"category": "external",
"summary": "SUSE Bug 1257768 for CVE-2026-23101",
"url": "https://bugzilla.suse.com/1257768"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_7_34-rt-1-150700.1.3.1.x86_64",
"SUSE Real Time Module 15 SP7:cluster-md-kmp-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:dlm-kmp-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:gfs2-kmp-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-devel-rt-6.4.0-150700.7.34.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-rt-devel-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-source-rt-6.4.0-150700.7.34.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-syms-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:ocfs2-kmp-rt-6.4.0-150700.7.34.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_7_34-rt-1-150700.1.3.1.x86_64",
"SUSE Real Time Module 15 SP7:cluster-md-kmp-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:dlm-kmp-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:gfs2-kmp-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-devel-rt-6.4.0-150700.7.34.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-rt-devel-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-source-rt-6.4.0-150700.7.34.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-syms-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:ocfs2-kmp-rt-6.4.0-150700.7.34.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-03-23T09:09:02Z",
"details": "moderate"
}
],
"title": "CVE-2026-23101"
},
{
"cve": "CVE-2026-23102",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2026-23102"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\narm64/fpsimd: signal: Fix restoration of SVE context\n\nWhen SME is supported, Restoring SVE signal context can go wrong in a\nfew ways, including placing the task into an invalid state where the\nkernel may read from out-of-bounds memory (and may potentially take a\nfatal fault) and/or may kill the task with a SIGKILL.\n\n(1) Restoring a context with SVE_SIG_FLAG_SM set can place the task into\n an invalid state where SVCR.SM is set (and sve_state is non-NULL)\n but TIF_SME is clear, consequently resuting in out-of-bounds memory\n reads and/or killing the task with SIGKILL.\n\n This can only occur in unusual (but legitimate) cases where the SVE\n signal context has either been modified by userspace or was saved in\n the context of another task (e.g. as with CRIU), as otherwise the\n presence of an SVE signal context with SVE_SIG_FLAG_SM implies that\n TIF_SME is already set.\n\n While in this state, task_fpsimd_load() will NOT configure SMCR_ELx\n (leaving some arbitrary value configured in hardware) before\n restoring SVCR and attempting to restore the streaming mode SVE\n registers from memory via sve_load_state(). As the value of\n SMCR_ELx.LEN may be larger than the task\u0027s streaming SVE vector\n length, this may read memory outside of the task\u0027s allocated\n sve_state, reading unrelated data and/or triggering a fault.\n\n While this can result in secrets being loaded into streaming SVE\n registers, these values are never exposed. As TIF_SME is clear,\n fpsimd_bind_task_to_cpu() will configure CPACR_ELx.SMEN to trap EL0\n accesses to streaming mode SVE registers, so these cannot be\n accessed directly at EL0. As fpsimd_save_user_state() verifies the\n live vector length before saving (S)SVE state to memory, no secret\n values can be saved back to memory (and hence cannot be observed via\n ptrace, signals, etc).\n\n When the live vector length doesn\u0027t match the expected vector length\n for the task, fpsimd_save_user_state() will send a fatal SIGKILL\n signal to the task. Hence the task may be killed after executing\n userspace for some period of time.\n\n(2) Restoring a context with SVE_SIG_FLAG_SM clear does not clear the\n task\u0027s SVCR.SM. If SVCR.SM was set prior to restoring the context,\n then the task will be left in streaming mode unexpectedly, and some\n register state will be combined inconsistently, though the task will\n be left in legitimate state from the kernel\u0027s PoV.\n\n This can only occur in unusual (but legitimate) cases where ptrace\n has been used to set SVCR.SM after entry to the sigreturn syscall,\n as syscall entry clears SVCR.SM.\n\n In these cases, the the provided SVE register data will be loaded\n into the task\u0027s sve_state using the non-streaming SVE vector length\n and the FPSIMD registers will be merged into this using the\n streaming SVE vector length.\n\nFix (1) by setting TIF_SME when setting SVCR.SM. This also requires\nensuring that the task\u0027s sme_state has been allocated, but as this could\ncontain live ZA state, it should not be zeroed. Fix (2) by clearing\nSVCR.SM when restoring a SVE signal context with SVE_SIG_FLAG_SM clear.\n\nFor consistency, I\u0027ve pulled the manipulation of SVCR, TIF_SVE, TIF_SME,\nand fp_type earlier, immediately after the allocation of\nsve_state/sme_state, before the restore of the actual register state.\nThis makes it easier to ensure that these are always modified\nconsistently, even if a fault is taken while reading the register data\nfrom the signal context. I do not expect any software to depend on the\nexact state restored when a fault is taken while reading the context.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_7_34-rt-1-150700.1.3.1.x86_64",
"SUSE Real Time Module 15 SP7:cluster-md-kmp-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:dlm-kmp-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:gfs2-kmp-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-devel-rt-6.4.0-150700.7.34.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-rt-devel-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-source-rt-6.4.0-150700.7.34.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-syms-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:ocfs2-kmp-rt-6.4.0-150700.7.34.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2026-23102",
"url": "https://www.suse.com/security/cve/CVE-2026-23102"
},
{
"category": "external",
"summary": "SUSE Bug 1257772 for CVE-2026-23102",
"url": "https://bugzilla.suse.com/1257772"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_7_34-rt-1-150700.1.3.1.x86_64",
"SUSE Real Time Module 15 SP7:cluster-md-kmp-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:dlm-kmp-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:gfs2-kmp-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-devel-rt-6.4.0-150700.7.34.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-rt-devel-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-source-rt-6.4.0-150700.7.34.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-syms-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:ocfs2-kmp-rt-6.4.0-150700.7.34.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_7_34-rt-1-150700.1.3.1.x86_64",
"SUSE Real Time Module 15 SP7:cluster-md-kmp-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:dlm-kmp-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:gfs2-kmp-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-devel-rt-6.4.0-150700.7.34.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-rt-devel-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-source-rt-6.4.0-150700.7.34.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-syms-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:ocfs2-kmp-rt-6.4.0-150700.7.34.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-03-23T09:09:02Z",
"details": "moderate"
}
],
"title": "CVE-2026-23102"
},
{
"cve": "CVE-2026-23104",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2026-23104"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nice: fix devlink reload call trace\n\nCommit 4da71a77fc3b (\"ice: read internal temperature sensor\") introduced\ninternal temperature sensor reading via HWMON. ice_hwmon_init() was added\nto ice_init_feature() and ice_hwmon_exit() was added to ice_remove(). As a\nresult if devlink reload is used to reinit the device and then the driver\nis removed, a call trace can occur.\n\nBUG: unable to handle page fault for address: ffffffffc0fd4b5d\nCall Trace:\n string+0x48/0xe0\n vsnprintf+0x1f9/0x650\n sprintf+0x62/0x80\n name_show+0x1f/0x30\n dev_attr_show+0x19/0x60\n\nThe call trace repeats approximately every 10 minutes when system\nmonitoring tools (e.g., sadc) attempt to read the orphaned hwmon sysfs\nattributes that reference freed module memory.\n\nThe sequence is:\n1. Driver load, ice_hwmon_init() gets called from ice_init_feature()\n2. Devlink reload down, flow does not call ice_remove()\n3. Devlink reload up, ice_hwmon_init() gets called from\n ice_init_feature() resulting in a second instance\n4. Driver unload, ice_hwmon_exit() called from ice_remove() leaving the\n first hwmon instance orphaned with dangling pointer\n\nFix this by moving ice_hwmon_exit() from ice_remove() to\nice_deinit_features() to ensure proper cleanup symmetry with\nice_hwmon_init().",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_7_34-rt-1-150700.1.3.1.x86_64",
"SUSE Real Time Module 15 SP7:cluster-md-kmp-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:dlm-kmp-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:gfs2-kmp-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-devel-rt-6.4.0-150700.7.34.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-rt-devel-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-source-rt-6.4.0-150700.7.34.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-syms-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:ocfs2-kmp-rt-6.4.0-150700.7.34.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2026-23104",
"url": "https://www.suse.com/security/cve/CVE-2026-23104"
},
{
"category": "external",
"summary": "SUSE Bug 1257763 for CVE-2026-23104",
"url": "https://bugzilla.suse.com/1257763"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_7_34-rt-1-150700.1.3.1.x86_64",
"SUSE Real Time Module 15 SP7:cluster-md-kmp-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:dlm-kmp-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:gfs2-kmp-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-devel-rt-6.4.0-150700.7.34.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-rt-devel-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-source-rt-6.4.0-150700.7.34.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-syms-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:ocfs2-kmp-rt-6.4.0-150700.7.34.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.1,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:L/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_7_34-rt-1-150700.1.3.1.x86_64",
"SUSE Real Time Module 15 SP7:cluster-md-kmp-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:dlm-kmp-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:gfs2-kmp-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-devel-rt-6.4.0-150700.7.34.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-rt-devel-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-source-rt-6.4.0-150700.7.34.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-syms-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:ocfs2-kmp-rt-6.4.0-150700.7.34.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-03-23T09:09:02Z",
"details": "moderate"
}
],
"title": "CVE-2026-23104"
},
{
"cve": "CVE-2026-23105",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2026-23105"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nnet/sched: qfq: Use cl_is_active to determine whether class is active in qfq_rm_from_ag\n\nThis is more of a preventive patch to make the code more consistent and\nto prevent possible exploits that employ child qlen manipulations on qfq.\nuse cl_is_active instead of relying on the child qdisc\u0027s qlen to determine\nclass activation.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_7_34-rt-1-150700.1.3.1.x86_64",
"SUSE Real Time Module 15 SP7:cluster-md-kmp-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:dlm-kmp-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:gfs2-kmp-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-devel-rt-6.4.0-150700.7.34.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-rt-devel-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-source-rt-6.4.0-150700.7.34.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-syms-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:ocfs2-kmp-rt-6.4.0-150700.7.34.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2026-23105",
"url": "https://www.suse.com/security/cve/CVE-2026-23105"
},
{
"category": "external",
"summary": "SUSE Bug 1257775 for CVE-2026-23105",
"url": "https://bugzilla.suse.com/1257775"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_7_34-rt-1-150700.1.3.1.x86_64",
"SUSE Real Time Module 15 SP7:cluster-md-kmp-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:dlm-kmp-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:gfs2-kmp-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-devel-rt-6.4.0-150700.7.34.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-rt-devel-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-source-rt-6.4.0-150700.7.34.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-syms-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:ocfs2-kmp-rt-6.4.0-150700.7.34.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.7,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_7_34-rt-1-150700.1.3.1.x86_64",
"SUSE Real Time Module 15 SP7:cluster-md-kmp-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:dlm-kmp-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:gfs2-kmp-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-devel-rt-6.4.0-150700.7.34.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-rt-devel-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-source-rt-6.4.0-150700.7.34.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-syms-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:ocfs2-kmp-rt-6.4.0-150700.7.34.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-03-23T09:09:02Z",
"details": "moderate"
}
],
"title": "CVE-2026-23105"
},
{
"cve": "CVE-2026-23107",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2026-23107"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\narm64/fpsimd: signal: Allocate SSVE storage when restoring ZA\n\nThe code to restore a ZA context doesn\u0027t attempt to allocate the task\u0027s\nsve_state before setting TIF_SME. Consequently, restoring a ZA context\ncan place a task into an invalid state where TIF_SME is set but the\ntask\u0027s sve_state is NULL.\n\nIn legitimate but uncommon cases where the ZA signal context was NOT\ncreated by the kernel in the context of the same task (e.g. if the task\nis saved/restored with something like CRIU), we have no guarantee that\nsve_state had been allocated previously. In these cases, userspace can\nenter streaming mode without trapping while sve_state is NULL, causing a\nlater NULL pointer dereference when the kernel attempts to store the\nregister state:\n\n| # ./sigreturn-za\n| Unable to handle kernel NULL pointer dereference at virtual address 0000000000000000\n| Mem abort info:\n| ESR = 0x0000000096000046\n| EC = 0x25: DABT (current EL), IL = 32 bits\n| SET = 0, FnV = 0\n| EA = 0, S1PTW = 0\n| FSC = 0x06: level 2 translation fault\n| Data abort info:\n| ISV = 0, ISS = 0x00000046, ISS2 = 0x00000000\n| CM = 0, WnR = 1, TnD = 0, TagAccess = 0\n| GCS = 0, Overlay = 0, DirtyBit = 0, Xs = 0\n| user pgtable: 4k pages, 52-bit VAs, pgdp=0000000101f47c00\n| [0000000000000000] pgd=08000001021d8403, p4d=0800000102274403, pud=0800000102275403, pmd=0000000000000000\n| Internal error: Oops: 0000000096000046 [#1] SMP\n| Modules linked in:\n| CPU: 0 UID: 0 PID: 153 Comm: sigreturn-za Not tainted 6.19.0-rc1 #1 PREEMPT\n| Hardware name: linux,dummy-virt (DT)\n| pstate: 214000c9 (nzCv daIF +PAN -UAO -TCO +DIT -SSBS BTYPE=--)\n| pc : sve_save_state+0x4/0xf0\n| lr : fpsimd_save_user_state+0xb0/0x1c0\n| sp : ffff80008070bcc0\n| x29: ffff80008070bcc0 x28: fff00000c1ca4c40 x27: 63cfa172fb5cf658\n| x26: fff00000c1ca5228 x25: 0000000000000000 x24: 0000000000000000\n| x23: 0000000000000000 x22: fff00000c1ca4c40 x21: fff00000c1ca4c40\n| x20: 0000000000000020 x19: fff00000ff6900f0 x18: 0000000000000000\n| x17: fff05e8e0311f000 x16: 0000000000000000 x15: 028fca8f3bdaf21c\n| x14: 0000000000000212 x13: fff00000c0209f10 x12: 0000000000000020\n| x11: 0000000000200b20 x10: 0000000000000000 x9 : fff00000ff69dcc0\n| x8 : 00000000000003f2 x7 : 0000000000000001 x6 : fff00000c1ca5b48\n| x5 : fff05e8e0311f000 x4 : 0000000008000000 x3 : 0000000000000000\n| x2 : 0000000000000001 x1 : fff00000c1ca5970 x0 : 0000000000000440\n| Call trace:\n| sve_save_state+0x4/0xf0 (P)\n| fpsimd_thread_switch+0x48/0x198\n| __switch_to+0x20/0x1c0\n| __schedule+0x36c/0xce0\n| schedule+0x34/0x11c\n| exit_to_user_mode_loop+0x124/0x188\n| el0_interrupt+0xc8/0xd8\n| __el0_irq_handler_common+0x18/0x24\n| el0t_64_irq_handler+0x10/0x1c\n| el0t_64_irq+0x198/0x19c\n| Code: 54000040 d51b4408 d65f03c0 d503245f (e5bb5800)\n| ---[ end trace 0000000000000000 ]---\n\nFix this by having restore_za_context() ensure that the task\u0027s sve_state\nis allocated, matching what we do when taking an SME trap. Any live\nSVE/SSVE state (which is restored earlier from a separate signal\ncontext) must be preserved, and hence this is not zeroed.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_7_34-rt-1-150700.1.3.1.x86_64",
"SUSE Real Time Module 15 SP7:cluster-md-kmp-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:dlm-kmp-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:gfs2-kmp-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-devel-rt-6.4.0-150700.7.34.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-rt-devel-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-source-rt-6.4.0-150700.7.34.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-syms-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:ocfs2-kmp-rt-6.4.0-150700.7.34.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2026-23107",
"url": "https://www.suse.com/security/cve/CVE-2026-23107"
},
{
"category": "external",
"summary": "SUSE Bug 1257762 for CVE-2026-23107",
"url": "https://bugzilla.suse.com/1257762"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_7_34-rt-1-150700.1.3.1.x86_64",
"SUSE Real Time Module 15 SP7:cluster-md-kmp-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:dlm-kmp-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:gfs2-kmp-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-devel-rt-6.4.0-150700.7.34.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-rt-devel-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-source-rt-6.4.0-150700.7.34.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-syms-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:ocfs2-kmp-rt-6.4.0-150700.7.34.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_7_34-rt-1-150700.1.3.1.x86_64",
"SUSE Real Time Module 15 SP7:cluster-md-kmp-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:dlm-kmp-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:gfs2-kmp-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-devel-rt-6.4.0-150700.7.34.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-rt-devel-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-source-rt-6.4.0-150700.7.34.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-syms-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:ocfs2-kmp-rt-6.4.0-150700.7.34.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-03-23T09:09:02Z",
"details": "moderate"
}
],
"title": "CVE-2026-23107"
},
{
"cve": "CVE-2026-23108",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2026-23108"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\ncan: usb_8dev: usb_8dev_read_bulk_callback(): fix URB memory leak\n\nFix similar memory leak as in commit 7352e1d5932a (\"can: gs_usb:\ngs_usb_receive_bulk_callback(): fix URB memory leak\").\n\nIn usb_8dev_open() -\u003e usb_8dev_start(), the URBs for USB-in transfers are\nallocated, added to the priv-\u003erx_submitted anchor and submitted. In the\ncomplete callback usb_8dev_read_bulk_callback(), the URBs are processed and\nresubmitted. In usb_8dev_close() -\u003e unlink_all_urbs() the URBs are freed by\ncalling usb_kill_anchored_urbs(\u0026priv-\u003erx_submitted).\n\nHowever, this does not take into account that the USB framework unanchors\nthe URB before the complete function is called. This means that once an\nin-URB has been completed, it is no longer anchored and is ultimately not\nreleased in usb_kill_anchored_urbs().\n\nFix the memory leak by anchoring the URB in the\nusb_8dev_read_bulk_callback() to the priv-\u003erx_submitted anchor.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_7_34-rt-1-150700.1.3.1.x86_64",
"SUSE Real Time Module 15 SP7:cluster-md-kmp-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:dlm-kmp-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:gfs2-kmp-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-devel-rt-6.4.0-150700.7.34.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-rt-devel-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-source-rt-6.4.0-150700.7.34.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-syms-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:ocfs2-kmp-rt-6.4.0-150700.7.34.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2026-23108",
"url": "https://www.suse.com/security/cve/CVE-2026-23108"
},
{
"category": "external",
"summary": "SUSE Bug 1257770 for CVE-2026-23108",
"url": "https://bugzilla.suse.com/1257770"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_7_34-rt-1-150700.1.3.1.x86_64",
"SUSE Real Time Module 15 SP7:cluster-md-kmp-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:dlm-kmp-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:gfs2-kmp-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-devel-rt-6.4.0-150700.7.34.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-rt-devel-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-source-rt-6.4.0-150700.7.34.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-syms-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:ocfs2-kmp-rt-6.4.0-150700.7.34.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_7_34-rt-1-150700.1.3.1.x86_64",
"SUSE Real Time Module 15 SP7:cluster-md-kmp-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:dlm-kmp-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:gfs2-kmp-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-devel-rt-6.4.0-150700.7.34.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-rt-devel-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-source-rt-6.4.0-150700.7.34.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-syms-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:ocfs2-kmp-rt-6.4.0-150700.7.34.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-03-23T09:09:02Z",
"details": "moderate"
}
],
"title": "CVE-2026-23108"
},
{
"cve": "CVE-2026-23110",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2026-23110"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nscsi: core: Wake up the error handler when final completions race against each other\n\nThe fragile ordering between marking commands completed or failed so\nthat the error handler only wakes when the last running command\ncompletes or times out has race conditions. These race conditions can\ncause the SCSI layer to fail to wake the error handler, leaving I/O\nthrough the SCSI host stuck as the error state cannot advance.\n\nFirst, there is an memory ordering issue within scsi_dec_host_busy().\nThe write which clears SCMD_STATE_INFLIGHT may be reordered with reads\ncounting in scsi_host_busy(). While the local CPU will see its own\nwrite, reordering can allow other CPUs in scsi_dec_host_busy() or\nscsi_eh_inc_host_failed() to see a raised busy count, causing no CPU to\nsee a host busy equal to the host_failed count.\n\nThis race condition can be prevented with a memory barrier on the error\npath to force the write to be visible before counting host busy\ncommands.\n\nSecond, there is a general ordering issue with scsi_eh_inc_host_failed(). By\ncounting busy commands before incrementing host_failed, it can race with a\nfinal command in scsi_dec_host_busy(), such that scsi_dec_host_busy() does\nnot see host_failed incremented but scsi_eh_inc_host_failed() counts busy\ncommands before SCMD_STATE_INFLIGHT is cleared by scsi_dec_host_busy(),\nresulting in neither waking the error handler task.\n\nThis needs the call to scsi_host_busy() to be moved after host_failed is\nincremented to close the race condition.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_7_34-rt-1-150700.1.3.1.x86_64",
"SUSE Real Time Module 15 SP7:cluster-md-kmp-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:dlm-kmp-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:gfs2-kmp-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-devel-rt-6.4.0-150700.7.34.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-rt-devel-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-source-rt-6.4.0-150700.7.34.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-syms-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:ocfs2-kmp-rt-6.4.0-150700.7.34.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2026-23110",
"url": "https://www.suse.com/security/cve/CVE-2026-23110"
},
{
"category": "external",
"summary": "SUSE Bug 1257761 for CVE-2026-23110",
"url": "https://bugzilla.suse.com/1257761"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_7_34-rt-1-150700.1.3.1.x86_64",
"SUSE Real Time Module 15 SP7:cluster-md-kmp-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:dlm-kmp-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:gfs2-kmp-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-devel-rt-6.4.0-150700.7.34.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-rt-devel-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-source-rt-6.4.0-150700.7.34.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-syms-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:ocfs2-kmp-rt-6.4.0-150700.7.34.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.7,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_7_34-rt-1-150700.1.3.1.x86_64",
"SUSE Real Time Module 15 SP7:cluster-md-kmp-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:dlm-kmp-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:gfs2-kmp-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-devel-rt-6.4.0-150700.7.34.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-rt-devel-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-source-rt-6.4.0-150700.7.34.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-syms-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:ocfs2-kmp-rt-6.4.0-150700.7.34.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-03-23T09:09:02Z",
"details": "moderate"
}
],
"title": "CVE-2026-23110"
},
{
"cve": "CVE-2026-23111",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2026-23111"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nnetfilter: nf_tables: fix inverted genmask check in nft_map_catchall_activate()\n\nnft_map_catchall_activate() has an inverted element activity check\ncompared to its non-catchall counterpart nft_mapelem_activate() and\ncompared to what is logically required.\n\nnft_map_catchall_activate() is called from the abort path to re-activate\ncatchall map elements that were deactivated during a failed transaction.\nIt should skip elements that are already active (they don\u0027t need\nre-activation) and process elements that are inactive (they need to be\nrestored). Instead, the current code does the opposite: it skips inactive\nelements and processes active ones.\n\nCompare the non-catchall activate callback, which is correct:\n\n nft_mapelem_activate():\n if (nft_set_elem_active(ext, iter-\u003egenmask))\n return 0; /* skip active, process inactive */\n\nWith the buggy catchall version:\n\n nft_map_catchall_activate():\n if (!nft_set_elem_active(ext, genmask))\n continue; /* skip inactive, process active */\n\nThe consequence is that when a DELSET operation is aborted,\nnft_setelem_data_activate() is never called for the catchall element.\nFor NFT_GOTO verdict elements, this means nft_data_hold() is never\ncalled to restore the chain-\u003euse reference count. Each abort cycle\npermanently decrements chain-\u003euse. Once chain-\u003euse reaches zero,\nDELCHAIN succeeds and frees the chain while catchall verdict elements\nstill reference it, resulting in a use-after-free.\n\nThis is exploitable for local privilege escalation from an unprivileged\nuser via user namespaces + nftables on distributions that enable\nCONFIG_USER_NS and CONFIG_NF_TABLES.\n\nFix by removing the negation so the check matches nft_mapelem_activate():\nskip active elements, process inactive ones.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_7_34-rt-1-150700.1.3.1.x86_64",
"SUSE Real Time Module 15 SP7:cluster-md-kmp-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:dlm-kmp-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:gfs2-kmp-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-devel-rt-6.4.0-150700.7.34.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-rt-devel-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-source-rt-6.4.0-150700.7.34.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-syms-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:ocfs2-kmp-rt-6.4.0-150700.7.34.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2026-23111",
"url": "https://www.suse.com/security/cve/CVE-2026-23111"
},
{
"category": "external",
"summary": "SUSE Bug 1258181 for CVE-2026-23111",
"url": "https://bugzilla.suse.com/1258181"
},
{
"category": "external",
"summary": "SUSE Bug 1258183 for CVE-2026-23111",
"url": "https://bugzilla.suse.com/1258183"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_7_34-rt-1-150700.1.3.1.x86_64",
"SUSE Real Time Module 15 SP7:cluster-md-kmp-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:dlm-kmp-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:gfs2-kmp-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-devel-rt-6.4.0-150700.7.34.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-rt-devel-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-source-rt-6.4.0-150700.7.34.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-syms-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:ocfs2-kmp-rt-6.4.0-150700.7.34.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_7_34-rt-1-150700.1.3.1.x86_64",
"SUSE Real Time Module 15 SP7:cluster-md-kmp-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:dlm-kmp-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:gfs2-kmp-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-devel-rt-6.4.0-150700.7.34.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-rt-devel-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-source-rt-6.4.0-150700.7.34.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-syms-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:ocfs2-kmp-rt-6.4.0-150700.7.34.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-03-23T09:09:02Z",
"details": "important"
}
],
"title": "CVE-2026-23111"
},
{
"cve": "CVE-2026-23112",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2026-23112"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nnvmet-tcp: add bounds checks in nvmet_tcp_build_pdu_iovec\n\nnvmet_tcp_build_pdu_iovec() could walk past cmd-\u003ereq.sg when a PDU\nlength or offset exceeds sg_cnt and then use bogus sg-\u003elength/offset\nvalues, leading to _copy_to_iter() GPF/KASAN. Guard sg_idx, remaining\nentries, and sg-\u003elength/offset before building the bvec.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_7_34-rt-1-150700.1.3.1.x86_64",
"SUSE Real Time Module 15 SP7:cluster-md-kmp-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:dlm-kmp-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:gfs2-kmp-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-devel-rt-6.4.0-150700.7.34.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-rt-devel-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-source-rt-6.4.0-150700.7.34.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-syms-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:ocfs2-kmp-rt-6.4.0-150700.7.34.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2026-23112",
"url": "https://www.suse.com/security/cve/CVE-2026-23112"
},
{
"category": "external",
"summary": "SUSE Bug 1258184 for CVE-2026-23112",
"url": "https://bugzilla.suse.com/1258184"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_7_34-rt-1-150700.1.3.1.x86_64",
"SUSE Real Time Module 15 SP7:cluster-md-kmp-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:dlm-kmp-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:gfs2-kmp-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-devel-rt-6.4.0-150700.7.34.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-rt-devel-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-source-rt-6.4.0-150700.7.34.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-syms-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:ocfs2-kmp-rt-6.4.0-150700.7.34.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.1,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_7_34-rt-1-150700.1.3.1.x86_64",
"SUSE Real Time Module 15 SP7:cluster-md-kmp-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:dlm-kmp-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:gfs2-kmp-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-devel-rt-6.4.0-150700.7.34.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-rt-devel-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-source-rt-6.4.0-150700.7.34.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-syms-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:ocfs2-kmp-rt-6.4.0-150700.7.34.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-03-23T09:09:02Z",
"details": "moderate"
}
],
"title": "CVE-2026-23112"
},
{
"cve": "CVE-2026-23113",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2026-23113"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nio_uring/io-wq: check IO_WQ_BIT_EXIT inside work run loop\n\nCurrently this is checked before running the pending work. Normally this\nis quite fine, as work items either end up blocking (which will create a\nnew worker for other items), or they complete fairly quickly. But syzbot\nreports an issue where io-wq takes seemingly forever to exit, and with a\nbit of debugging, this turns out to be because it queues a bunch of big\n(2GB - 4096b) reads with a /dev/msr* file. Since this file type doesn\u0027t\nsupport -\u003eread_iter(), loop_rw_iter() ends up handling them. Each read\nreturns 16MB of data read, which takes 20 (!!) seconds. With a bunch of\nthese pending, processing the whole chain can take a long time. Easily\nlonger than the syzbot uninterruptible sleep timeout of 140 seconds.\nThis then triggers a complaint off the io-wq exit path:\n\nINFO: task syz.4.135:6326 blocked for more than 143 seconds.\n Not tainted syzkaller #0\n Blocked by coredump.\n\"echo 0 \u003e /proc/sys/kernel/hung_task_timeout_secs\" disables this message.\ntask:syz.4.135 state:D stack:26824 pid:6326 tgid:6324 ppid:5957 task_flags:0x400548 flags:0x00080000\nCall Trace:\n \u003cTASK\u003e\n context_switch kernel/sched/core.c:5256 [inline]\n __schedule+0x1139/0x6150 kernel/sched/core.c:6863\n __schedule_loop kernel/sched/core.c:6945 [inline]\n schedule+0xe7/0x3a0 kernel/sched/core.c:6960\n schedule_timeout+0x257/0x290 kernel/time/sleep_timeout.c:75\n do_wait_for_common kernel/sched/completion.c:100 [inline]\n __wait_for_common+0x2fc/0x4e0 kernel/sched/completion.c:121\n io_wq_exit_workers io_uring/io-wq.c:1328 [inline]\n io_wq_put_and_exit+0x271/0x8a0 io_uring/io-wq.c:1356\n io_uring_clean_tctx+0x10d/0x190 io_uring/tctx.c:203\n io_uring_cancel_generic+0x69c/0x9a0 io_uring/cancel.c:651\n io_uring_files_cancel include/linux/io_uring.h:19 [inline]\n do_exit+0x2ce/0x2bd0 kernel/exit.c:911\n do_group_exit+0xd3/0x2a0 kernel/exit.c:1112\n get_signal+0x2671/0x26d0 kernel/signal.c:3034\n arch_do_signal_or_restart+0x8f/0x7e0 arch/x86/kernel/signal.c:337\n __exit_to_user_mode_loop kernel/entry/common.c:41 [inline]\n exit_to_user_mode_loop+0x8c/0x540 kernel/entry/common.c:75\n __exit_to_user_mode_prepare include/linux/irq-entry-common.h:226 [inline]\n syscall_exit_to_user_mode_prepare include/linux/irq-entry-common.h:256 [inline]\n syscall_exit_to_user_mode_work include/linux/entry-common.h:159 [inline]\n syscall_exit_to_user_mode include/linux/entry-common.h:194 [inline]\n do_syscall_64+0x4ee/0xf80 arch/x86/entry/syscall_64.c:100\n entry_SYSCALL_64_after_hwframe+0x77/0x7f\nRIP: 0033:0x7fa02738f749\nRSP: 002b:00007fa0281ae0e8 EFLAGS: 00000246 ORIG_RAX: 00000000000000ca\nRAX: fffffffffffffe00 RBX: 00007fa0275e6098 RCX: 00007fa02738f749\nRDX: 0000000000000000 RSI: 0000000000000080 RDI: 00007fa0275e6098\nRBP: 00007fa0275e6090 R08: 0000000000000000 R09: 0000000000000000\nR10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000\nR13: 00007fa0275e6128 R14: 00007fff14e4fcb0 R15: 00007fff14e4fd98\n\nThere\u0027s really nothing wrong here, outside of processing these reads\nwill take a LONG time. However, we can speed up the exit by checking the\nIO_WQ_BIT_EXIT inside the io_worker_handle_work() loop, as syzbot will\nexit the ring after queueing up all of these reads. Then once the first\nitem is processed, io-wq will simply cancel the rest. That should avoid\nsyzbot running into this complaint again.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_7_34-rt-1-150700.1.3.1.x86_64",
"SUSE Real Time Module 15 SP7:cluster-md-kmp-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:dlm-kmp-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:gfs2-kmp-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-devel-rt-6.4.0-150700.7.34.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-rt-devel-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-source-rt-6.4.0-150700.7.34.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-syms-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:ocfs2-kmp-rt-6.4.0-150700.7.34.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2026-23113",
"url": "https://www.suse.com/security/cve/CVE-2026-23113"
},
{
"category": "external",
"summary": "SUSE Bug 1258278 for CVE-2026-23113",
"url": "https://bugzilla.suse.com/1258278"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_7_34-rt-1-150700.1.3.1.x86_64",
"SUSE Real Time Module 15 SP7:cluster-md-kmp-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:dlm-kmp-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:gfs2-kmp-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-devel-rt-6.4.0-150700.7.34.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-rt-devel-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-source-rt-6.4.0-150700.7.34.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-syms-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:ocfs2-kmp-rt-6.4.0-150700.7.34.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_7_34-rt-1-150700.1.3.1.x86_64",
"SUSE Real Time Module 15 SP7:cluster-md-kmp-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:dlm-kmp-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:gfs2-kmp-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-devel-rt-6.4.0-150700.7.34.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-rt-devel-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-source-rt-6.4.0-150700.7.34.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-syms-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:ocfs2-kmp-rt-6.4.0-150700.7.34.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-03-23T09:09:02Z",
"details": "moderate"
}
],
"title": "CVE-2026-23113"
},
{
"cve": "CVE-2026-23116",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2026-23116"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\npmdomain: imx8m-blk-ctrl: Remove separate rst and clk mask for 8mq vpu\n\nFor i.MX8MQ platform, the ADB in the VPUMIX domain has no separate reset\nand clock enable bits, but is ungated and reset together with the VPUs.\nSo we can\u0027t reset G1 or G2 separately, it may led to the system hang.\nRemove rst_mask and clk_mask of imx8mq_vpu_blk_ctl_domain_data.\nLet imx8mq_vpu_power_notifier() do really vpu reset.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_7_34-rt-1-150700.1.3.1.x86_64",
"SUSE Real Time Module 15 SP7:cluster-md-kmp-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:dlm-kmp-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:gfs2-kmp-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-devel-rt-6.4.0-150700.7.34.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-rt-devel-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-source-rt-6.4.0-150700.7.34.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-syms-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:ocfs2-kmp-rt-6.4.0-150700.7.34.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2026-23116",
"url": "https://www.suse.com/security/cve/CVE-2026-23116"
},
{
"category": "external",
"summary": "SUSE Bug 1258277 for CVE-2026-23116",
"url": "https://bugzilla.suse.com/1258277"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_7_34-rt-1-150700.1.3.1.x86_64",
"SUSE Real Time Module 15 SP7:cluster-md-kmp-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:dlm-kmp-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:gfs2-kmp-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-devel-rt-6.4.0-150700.7.34.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-rt-devel-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-source-rt-6.4.0-150700.7.34.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-syms-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:ocfs2-kmp-rt-6.4.0-150700.7.34.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_7_34-rt-1-150700.1.3.1.x86_64",
"SUSE Real Time Module 15 SP7:cluster-md-kmp-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:dlm-kmp-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:gfs2-kmp-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-devel-rt-6.4.0-150700.7.34.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-rt-devel-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-source-rt-6.4.0-150700.7.34.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-syms-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:ocfs2-kmp-rt-6.4.0-150700.7.34.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-03-23T09:09:02Z",
"details": "moderate"
}
],
"title": "CVE-2026-23116"
},
{
"cve": "CVE-2026-23119",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2026-23119"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nbonding: provide a net pointer to __skb_flow_dissect()\n\nAfter 3cbf4ffba5ee (\"net: plumb network namespace into __skb_flow_dissect\")\nwe have to provide a net pointer to __skb_flow_dissect(),\neither via skb-\u003edev, skb-\u003esk, or a user provided pointer.\n\nIn the following case, syzbot was able to cook a bare skb.\n\nWARNING: net/core/flow_dissector.c:1131 at __skb_flow_dissect+0xb57/0x68b0 net/core/flow_dissector.c:1131, CPU#1: syz.2.1418/11053\nCall Trace:\n \u003cTASK\u003e\n bond_flow_dissect drivers/net/bonding/bond_main.c:4093 [inline]\n __bond_xmit_hash+0x2d7/0xba0 drivers/net/bonding/bond_main.c:4157\n bond_xmit_hash_xdp drivers/net/bonding/bond_main.c:4208 [inline]\n bond_xdp_xmit_3ad_xor_slave_get drivers/net/bonding/bond_main.c:5139 [inline]\n bond_xdp_get_xmit_slave+0x1fd/0x710 drivers/net/bonding/bond_main.c:5515\n xdp_master_redirect+0x13f/0x2c0 net/core/filter.c:4388\n bpf_prog_run_xdp include/net/xdp.h:700 [inline]\n bpf_test_run+0x6b2/0x7d0 net/bpf/test_run.c:421\n bpf_prog_test_run_xdp+0x795/0x10e0 net/bpf/test_run.c:1390\n bpf_prog_test_run+0x2c7/0x340 kernel/bpf/syscall.c:4703\n __sys_bpf+0x562/0x860 kernel/bpf/syscall.c:6182\n __do_sys_bpf kernel/bpf/syscall.c:6274 [inline]\n __se_sys_bpf kernel/bpf/syscall.c:6272 [inline]\n __x64_sys_bpf+0x7c/0x90 kernel/bpf/syscall.c:6272\n do_syscall_x64 arch/x86/entry/syscall_64.c:63 [inline]\n do_syscall_64+0xec/0xf80 arch/x86/entry/syscall_64.c:94",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_7_34-rt-1-150700.1.3.1.x86_64",
"SUSE Real Time Module 15 SP7:cluster-md-kmp-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:dlm-kmp-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:gfs2-kmp-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-devel-rt-6.4.0-150700.7.34.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-rt-devel-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-source-rt-6.4.0-150700.7.34.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-syms-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:ocfs2-kmp-rt-6.4.0-150700.7.34.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2026-23119",
"url": "https://www.suse.com/security/cve/CVE-2026-23119"
},
{
"category": "external",
"summary": "SUSE Bug 1258273 for CVE-2026-23119",
"url": "https://bugzilla.suse.com/1258273"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_7_34-rt-1-150700.1.3.1.x86_64",
"SUSE Real Time Module 15 SP7:cluster-md-kmp-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:dlm-kmp-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:gfs2-kmp-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-devel-rt-6.4.0-150700.7.34.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-rt-devel-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-source-rt-6.4.0-150700.7.34.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-syms-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:ocfs2-kmp-rt-6.4.0-150700.7.34.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_7_34-rt-1-150700.1.3.1.x86_64",
"SUSE Real Time Module 15 SP7:cluster-md-kmp-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:dlm-kmp-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:gfs2-kmp-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-devel-rt-6.4.0-150700.7.34.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-rt-devel-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-source-rt-6.4.0-150700.7.34.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-syms-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:ocfs2-kmp-rt-6.4.0-150700.7.34.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-03-23T09:09:02Z",
"details": "moderate"
}
],
"title": "CVE-2026-23119"
},
{
"cve": "CVE-2026-23121",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2026-23121"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nmISDN: annotate data-race around dev-\u003ework\n\ndev-\u003ework can re read locklessly in mISDN_read()\nand mISDN_poll(). Add READ_ONCE()/WRITE_ONCE() annotations.\n\nBUG: KCSAN: data-race in mISDN_ioctl / mISDN_read\n\nwrite to 0xffff88812d848280 of 4 bytes by task 10864 on cpu 1:\n misdn_add_timer drivers/isdn/mISDN/timerdev.c:175 [inline]\n mISDN_ioctl+0x2fb/0x550 drivers/isdn/mISDN/timerdev.c:233\n vfs_ioctl fs/ioctl.c:51 [inline]\n __do_sys_ioctl fs/ioctl.c:597 [inline]\n __se_sys_ioctl+0xce/0x140 fs/ioctl.c:583\n __x64_sys_ioctl+0x43/0x50 fs/ioctl.c:583\n x64_sys_call+0x14b0/0x3000 arch/x86/include/generated/asm/syscalls_64.h:17\n do_syscall_x64 arch/x86/entry/syscall_64.c:63 [inline]\n do_syscall_64+0xd8/0x2c0 arch/x86/entry/syscall_64.c:94\n entry_SYSCALL_64_after_hwframe+0x77/0x7f\n\nread to 0xffff88812d848280 of 4 bytes by task 10857 on cpu 0:\n mISDN_read+0x1f2/0x470 drivers/isdn/mISDN/timerdev.c:112\n do_loop_readv_writev fs/read_write.c:847 [inline]\n vfs_readv+0x3fb/0x690 fs/read_write.c:1020\n do_readv+0xe7/0x210 fs/read_write.c:1080\n __do_sys_readv fs/read_write.c:1165 [inline]\n __se_sys_readv fs/read_write.c:1162 [inline]\n __x64_sys_readv+0x45/0x50 fs/read_write.c:1162\n x64_sys_call+0x2831/0x3000 arch/x86/include/generated/asm/syscalls_64.h:20\n do_syscall_x64 arch/x86/entry/syscall_64.c:63 [inline]\n do_syscall_64+0xd8/0x2c0 arch/x86/entry/syscall_64.c:94\n entry_SYSCALL_64_after_hwframe+0x77/0x7f\n\nvalue changed: 0x00000000 -\u003e 0x00000001",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_7_34-rt-1-150700.1.3.1.x86_64",
"SUSE Real Time Module 15 SP7:cluster-md-kmp-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:dlm-kmp-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:gfs2-kmp-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-devel-rt-6.4.0-150700.7.34.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-rt-devel-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-source-rt-6.4.0-150700.7.34.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-syms-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:ocfs2-kmp-rt-6.4.0-150700.7.34.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2026-23121",
"url": "https://www.suse.com/security/cve/CVE-2026-23121"
},
{
"category": "external",
"summary": "SUSE Bug 1258309 for CVE-2026-23121",
"url": "https://bugzilla.suse.com/1258309"
},
{
"category": "external",
"summary": "SUSE Bug 1259135 for CVE-2026-23121",
"url": "https://bugzilla.suse.com/1259135"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_7_34-rt-1-150700.1.3.1.x86_64",
"SUSE Real Time Module 15 SP7:cluster-md-kmp-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:dlm-kmp-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:gfs2-kmp-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-devel-rt-6.4.0-150700.7.34.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-rt-devel-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-source-rt-6.4.0-150700.7.34.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-syms-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:ocfs2-kmp-rt-6.4.0-150700.7.34.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_7_34-rt-1-150700.1.3.1.x86_64",
"SUSE Real Time Module 15 SP7:cluster-md-kmp-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:dlm-kmp-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:gfs2-kmp-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-devel-rt-6.4.0-150700.7.34.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-rt-devel-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-source-rt-6.4.0-150700.7.34.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-syms-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:ocfs2-kmp-rt-6.4.0-150700.7.34.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-03-23T09:09:02Z",
"details": "important"
}
],
"title": "CVE-2026-23121"
},
{
"cve": "CVE-2026-23125",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2026-23125"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nsctp: move SCTP_CMD_ASSOC_SHKEY right after SCTP_CMD_PEER_INIT\n\nA null-ptr-deref was reported in the SCTP transmit path when SCTP-AUTH key\ninitialization fails:\n\n ==================================================================\n KASAN: null-ptr-deref in range [0x0000000000000018-0x000000000000001f]\n CPU: 0 PID: 16 Comm: ksoftirqd/0 Tainted: G W 6.6.0 #2\n RIP: 0010:sctp_packet_bundle_auth net/sctp/output.c:264 [inline]\n RIP: 0010:sctp_packet_append_chunk+0xb36/0x1260 net/sctp/output.c:401\n Call Trace:\n\n sctp_packet_transmit_chunk+0x31/0x250 net/sctp/output.c:189\n sctp_outq_flush_data+0xa29/0x26d0 net/sctp/outqueue.c:1111\n sctp_outq_flush+0xc80/0x1240 net/sctp/outqueue.c:1217\n sctp_cmd_interpreter.isra.0+0x19a5/0x62c0 net/sctp/sm_sideeffect.c:1787\n sctp_side_effects net/sctp/sm_sideeffect.c:1198 [inline]\n sctp_do_sm+0x1a3/0x670 net/sctp/sm_sideeffect.c:1169\n sctp_assoc_bh_rcv+0x33e/0x640 net/sctp/associola.c:1052\n sctp_inq_push+0x1dd/0x280 net/sctp/inqueue.c:88\n sctp_rcv+0x11ae/0x3100 net/sctp/input.c:243\n sctp6_rcv+0x3d/0x60 net/sctp/ipv6.c:1127\n\nThe issue is triggered when sctp_auth_asoc_init_active_key() fails in\nsctp_sf_do_5_1C_ack() while processing an INIT_ACK. In this case, the\ncommand sequence is currently:\n\n- SCTP_CMD_PEER_INIT\n- SCTP_CMD_TIMER_STOP (T1_INIT)\n- SCTP_CMD_TIMER_START (T1_COOKIE)\n- SCTP_CMD_NEW_STATE (COOKIE_ECHOED)\n- SCTP_CMD_ASSOC_SHKEY\n- SCTP_CMD_GEN_COOKIE_ECHO\n\nIf SCTP_CMD_ASSOC_SHKEY fails, asoc-\u003eshkey remains NULL, while\nasoc-\u003epeer.auth_capable and asoc-\u003epeer.peer_chunks have already been set by\nSCTP_CMD_PEER_INIT. This allows a DATA chunk with auth = 1 and shkey = NULL\nto be queued by sctp_datamsg_from_user().\n\nSince command interpretation stops on failure, no COOKIE_ECHO should been\nsent via SCTP_CMD_GEN_COOKIE_ECHO. However, the T1_COOKIE timer has already\nbeen started, and it may enqueue a COOKIE_ECHO into the outqueue later. As\na result, the DATA chunk can be transmitted together with the COOKIE_ECHO\nin sctp_outq_flush_data(), leading to the observed issue.\n\nSimilar to the other places where it calls sctp_auth_asoc_init_active_key()\nright after sctp_process_init(), this patch moves the SCTP_CMD_ASSOC_SHKEY\nimmediately after SCTP_CMD_PEER_INIT, before stopping T1_INIT and starting\nT1_COOKIE. This ensures that if shared key generation fails, authenticated\nDATA cannot be sent. It also allows the T1_INIT timer to retransmit INIT,\ngiving the client another chance to process INIT_ACK and retry key setup.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_7_34-rt-1-150700.1.3.1.x86_64",
"SUSE Real Time Module 15 SP7:cluster-md-kmp-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:dlm-kmp-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:gfs2-kmp-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-devel-rt-6.4.0-150700.7.34.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-rt-devel-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-source-rt-6.4.0-150700.7.34.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-syms-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:ocfs2-kmp-rt-6.4.0-150700.7.34.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2026-23125",
"url": "https://www.suse.com/security/cve/CVE-2026-23125"
},
{
"category": "external",
"summary": "SUSE Bug 1258293 for CVE-2026-23125",
"url": "https://bugzilla.suse.com/1258293"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_7_34-rt-1-150700.1.3.1.x86_64",
"SUSE Real Time Module 15 SP7:cluster-md-kmp-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:dlm-kmp-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:gfs2-kmp-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-devel-rt-6.4.0-150700.7.34.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-rt-devel-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-source-rt-6.4.0-150700.7.34.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-syms-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:ocfs2-kmp-rt-6.4.0-150700.7.34.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_7_34-rt-1-150700.1.3.1.x86_64",
"SUSE Real Time Module 15 SP7:cluster-md-kmp-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:dlm-kmp-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:gfs2-kmp-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-devel-rt-6.4.0-150700.7.34.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-rt-devel-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-source-rt-6.4.0-150700.7.34.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-syms-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:ocfs2-kmp-rt-6.4.0-150700.7.34.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-03-23T09:09:02Z",
"details": "moderate"
}
],
"title": "CVE-2026-23125"
},
{
"cve": "CVE-2026-23128",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2026-23128"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\narm64: Set __nocfi on swsusp_arch_resume()\n\nA DABT is reported[1] on an android based system when resume from hiberate.\nThis happens because swsusp_arch_suspend_exit() is marked with SYM_CODE_*()\nand does not have a CFI hash, but swsusp_arch_resume() will attempt to\nverify the CFI hash when calling a copy of swsusp_arch_suspend_exit().\n\nGiven that there\u0027s an existing requirement that the entrypoint to\nswsusp_arch_suspend_exit() is the first byte of the .hibernate_exit.text\nsection, we cannot fix this by marking swsusp_arch_suspend_exit() with\nSYM_FUNC_*(). The simplest fix for now is to disable the CFI check in\nswsusp_arch_resume().\n\nMark swsusp_arch_resume() as __nocfi to disable the CFI check.\n\n[1]\n[ 22.991934][ T1] Unable to handle kernel paging request at virtual address 0000000109170ffc\n[ 22.991934][ T1] Mem abort info:\n[ 22.991934][ T1] ESR = 0x0000000096000007\n[ 22.991934][ T1] EC = 0x25: DABT (current EL), IL = 32 bits\n[ 22.991934][ T1] SET = 0, FnV = 0\n[ 22.991934][ T1] EA = 0, S1PTW = 0\n[ 22.991934][ T1] FSC = 0x07: level 3 translation fault\n[ 22.991934][ T1] Data abort info:\n[ 22.991934][ T1] ISV = 0, ISS = 0x00000007, ISS2 = 0x00000000\n[ 22.991934][ T1] CM = 0, WnR = 0, TnD = 0, TagAccess = 0\n[ 22.991934][ T1] GCS = 0, Overlay = 0, DirtyBit = 0, Xs = 0\n[ 22.991934][ T1] [0000000109170ffc] user address but active_mm is swapper\n[ 22.991934][ T1] Internal error: Oops: 0000000096000007 [#1] PREEMPT SMP\n[ 22.991934][ T1] Dumping ftrace buffer:\n[ 22.991934][ T1] (ftrace buffer empty)\n[ 22.991934][ T1] Modules linked in:\n[ 22.991934][ T1] CPU: 0 PID: 1 Comm: swapper/0 Not tainted 6.6.98-android15-8-g0b1d2aee7fc3-dirty-4k #1 688c7060a825a3ac418fe53881730b355915a419\n[ 22.991934][ T1] Hardware name: Unisoc UMS9360-base Board (DT)\n[ 22.991934][ T1] pstate: 804000c5 (Nzcv daIF +PAN -UAO -TCO -DIT -SSBS BTYPE=--)\n[ 22.991934][ T1] pc : swsusp_arch_resume+0x2ac/0x344\n[ 22.991934][ T1] lr : swsusp_arch_resume+0x294/0x344\n[ 22.991934][ T1] sp : ffffffc08006b960\n[ 22.991934][ T1] x29: ffffffc08006b9c0 x28: 0000000000000000 x27: 0000000000000000\n[ 22.991934][ T1] x26: 0000000000000000 x25: 0000000000000000 x24: 0000000000000820\n[ 22.991934][ T1] x23: ffffffd0817e3000 x22: ffffffd0817e3000 x21: 0000000000000000\n[ 22.991934][ T1] x20: ffffff8089171000 x19: ffffffd08252c8c8 x18: ffffffc080061058\n[ 22.991934][ T1] x17: 00000000529c6ef0 x16: 00000000529c6ef0 x15: 0000000000000004\n[ 22.991934][ T1] x14: ffffff8178c88000 x13: 0000000000000006 x12: 0000000000000000\n[ 22.991934][ T1] x11: 0000000000000015 x10: 0000000000000001 x9 : ffffffd082533000\n[ 22.991934][ T1] x8 : 0000000109171000 x7 : 205b5d3433393139 x6 : 392e32322020205b\n[ 22.991934][ T1] x5 : 000000010916f000 x4 : 000000008164b000 x3 : ffffff808a4e0530\n[ 22.991934][ T1] x2 : ffffffd08058e784 x1 : 0000000082326000 x0 : 000000010a283000\n[ 22.991934][ T1] Call trace:\n[ 22.991934][ T1] swsusp_arch_resume+0x2ac/0x344\n[ 22.991934][ T1] hibernation_restore+0x158/0x18c\n[ 22.991934][ T1] load_image_and_restore+0xb0/0xec\n[ 22.991934][ T1] software_resume+0xf4/0x19c\n[ 22.991934][ T1] software_resume_initcall+0x34/0x78\n[ 22.991934][ T1] do_one_initcall+0xe8/0x370\n[ 22.991934][ T1] do_initcall_level+0xc8/0x19c\n[ 22.991934][ T1] do_initcalls+0x70/0xc0\n[ 22.991934][ T1] do_basic_setup+0x1c/0x28\n[ 22.991934][ T1] kernel_init_freeable+0xe0/0x148\n[ 22.991934][ T1] kernel_init+0x20/0x1a8\n[ 22.991934][ T1] ret_from_fork+0x10/0x20\n[ 22.991934][ T1] Code: a9400a61 f94013e0 f9438923 f9400a64 (b85fc110)\n\n[catalin.marinas@arm.com: commit log updated by Mark Rutland]",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_7_34-rt-1-150700.1.3.1.x86_64",
"SUSE Real Time Module 15 SP7:cluster-md-kmp-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:dlm-kmp-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:gfs2-kmp-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-devel-rt-6.4.0-150700.7.34.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-rt-devel-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-source-rt-6.4.0-150700.7.34.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-syms-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:ocfs2-kmp-rt-6.4.0-150700.7.34.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2026-23128",
"url": "https://www.suse.com/security/cve/CVE-2026-23128"
},
{
"category": "external",
"summary": "SUSE Bug 1258298 for CVE-2026-23128",
"url": "https://bugzilla.suse.com/1258298"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_7_34-rt-1-150700.1.3.1.x86_64",
"SUSE Real Time Module 15 SP7:cluster-md-kmp-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:dlm-kmp-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:gfs2-kmp-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-devel-rt-6.4.0-150700.7.34.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-rt-devel-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-source-rt-6.4.0-150700.7.34.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-syms-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:ocfs2-kmp-rt-6.4.0-150700.7.34.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_7_34-rt-1-150700.1.3.1.x86_64",
"SUSE Real Time Module 15 SP7:cluster-md-kmp-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:dlm-kmp-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:gfs2-kmp-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-devel-rt-6.4.0-150700.7.34.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-rt-devel-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-source-rt-6.4.0-150700.7.34.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-syms-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:ocfs2-kmp-rt-6.4.0-150700.7.34.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-03-23T09:09:02Z",
"details": "moderate"
}
],
"title": "CVE-2026-23128"
},
{
"cve": "CVE-2026-23129",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2026-23129"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\ndpll: Prevent duplicate registrations\n\nModify the internal registration helpers dpll_xa_ref_{dpll,pin}_add()\nto reject duplicate registration attempts.\n\nPreviously, if a caller attempted to register the same pin multiple\ntimes (with the same ops, priv, and cookie) on the same device, the core\nsilently increments the reference count and return success. This behavior\nis incorrect because if the caller makes these duplicate registrations\nthen for the first one dpll_pin_registration is allocated and for others\nthe associated dpll_pin_ref.refcount is incremented. During the first\nunregistration the associated dpll_pin_registration is freed and for\nothers WARN is fired.\n\nFix this by updating the logic to return `-EEXIST` if a matching\nregistration is found to enforce a strict \"register once\" policy.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_7_34-rt-1-150700.1.3.1.x86_64",
"SUSE Real Time Module 15 SP7:cluster-md-kmp-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:dlm-kmp-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:gfs2-kmp-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-devel-rt-6.4.0-150700.7.34.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-rt-devel-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-source-rt-6.4.0-150700.7.34.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-syms-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:ocfs2-kmp-rt-6.4.0-150700.7.34.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2026-23129",
"url": "https://www.suse.com/security/cve/CVE-2026-23129"
},
{
"category": "external",
"summary": "SUSE Bug 1258299 for CVE-2026-23129",
"url": "https://bugzilla.suse.com/1258299"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_7_34-rt-1-150700.1.3.1.x86_64",
"SUSE Real Time Module 15 SP7:cluster-md-kmp-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:dlm-kmp-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:gfs2-kmp-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-devel-rt-6.4.0-150700.7.34.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-rt-devel-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-source-rt-6.4.0-150700.7.34.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-syms-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:ocfs2-kmp-rt-6.4.0-150700.7.34.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_7_34-rt-1-150700.1.3.1.x86_64",
"SUSE Real Time Module 15 SP7:cluster-md-kmp-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:dlm-kmp-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:gfs2-kmp-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-devel-rt-6.4.0-150700.7.34.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-rt-devel-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-source-rt-6.4.0-150700.7.34.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-syms-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:ocfs2-kmp-rt-6.4.0-150700.7.34.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-03-23T09:09:02Z",
"details": "moderate"
}
],
"title": "CVE-2026-23129"
},
{
"cve": "CVE-2026-23131",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2026-23131"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nplatform/x86: hp-bioscfg: Fix kobject warnings for empty attribute names\n\nThe hp-bioscfg driver attempts to register kobjects with empty names when\nthe HP BIOS returns attributes with empty name strings. This causes\nmultiple kernel warnings:\n\n kobject: (00000000135fb5e6): attempted to be registered with empty name!\n WARNING: CPU: 14 PID: 3336 at lib/kobject.c:219 kobject_add_internal+0x2eb/0x310\n\nAdd validation in hp_init_bios_buffer_attribute() to check if the\nattribute name is empty after parsing it from the WMI buffer. If empty,\nlog a debug message and skip registration of that attribute, allowing the\nmodule to continue processing other valid attributes.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_7_34-rt-1-150700.1.3.1.x86_64",
"SUSE Real Time Module 15 SP7:cluster-md-kmp-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:dlm-kmp-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:gfs2-kmp-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-devel-rt-6.4.0-150700.7.34.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-rt-devel-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-source-rt-6.4.0-150700.7.34.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-syms-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:ocfs2-kmp-rt-6.4.0-150700.7.34.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2026-23131",
"url": "https://www.suse.com/security/cve/CVE-2026-23131"
},
{
"category": "external",
"summary": "SUSE Bug 1258297 for CVE-2026-23131",
"url": "https://bugzilla.suse.com/1258297"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_7_34-rt-1-150700.1.3.1.x86_64",
"SUSE Real Time Module 15 SP7:cluster-md-kmp-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:dlm-kmp-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:gfs2-kmp-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-devel-rt-6.4.0-150700.7.34.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-rt-devel-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-source-rt-6.4.0-150700.7.34.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-syms-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:ocfs2-kmp-rt-6.4.0-150700.7.34.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_7_34-rt-1-150700.1.3.1.x86_64",
"SUSE Real Time Module 15 SP7:cluster-md-kmp-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:dlm-kmp-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:gfs2-kmp-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-devel-rt-6.4.0-150700.7.34.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-rt-devel-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-source-rt-6.4.0-150700.7.34.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-syms-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:ocfs2-kmp-rt-6.4.0-150700.7.34.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-03-23T09:09:02Z",
"details": "moderate"
}
],
"title": "CVE-2026-23131"
},
{
"cve": "CVE-2026-23133",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2026-23133"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nwifi: ath10k: fix dma_free_coherent() pointer\n\ndma_alloc_coherent() allocates a DMA mapped buffer and stores the\naddresses in XXX_unaligned fields. Those should be reused when freeing\nthe buffer rather than the aligned addresses.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_7_34-rt-1-150700.1.3.1.x86_64",
"SUSE Real Time Module 15 SP7:cluster-md-kmp-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:dlm-kmp-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:gfs2-kmp-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-devel-rt-6.4.0-150700.7.34.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-rt-devel-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-source-rt-6.4.0-150700.7.34.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-syms-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:ocfs2-kmp-rt-6.4.0-150700.7.34.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2026-23133",
"url": "https://www.suse.com/security/cve/CVE-2026-23133"
},
{
"category": "external",
"summary": "SUSE Bug 1258249 for CVE-2026-23133",
"url": "https://bugzilla.suse.com/1258249"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_7_34-rt-1-150700.1.3.1.x86_64",
"SUSE Real Time Module 15 SP7:cluster-md-kmp-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:dlm-kmp-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:gfs2-kmp-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-devel-rt-6.4.0-150700.7.34.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-rt-devel-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-source-rt-6.4.0-150700.7.34.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-syms-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:ocfs2-kmp-rt-6.4.0-150700.7.34.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.7,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:L/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_7_34-rt-1-150700.1.3.1.x86_64",
"SUSE Real Time Module 15 SP7:cluster-md-kmp-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:dlm-kmp-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:gfs2-kmp-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-devel-rt-6.4.0-150700.7.34.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-rt-devel-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-source-rt-6.4.0-150700.7.34.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-syms-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:ocfs2-kmp-rt-6.4.0-150700.7.34.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-03-23T09:09:02Z",
"details": "moderate"
}
],
"title": "CVE-2026-23133"
},
{
"cve": "CVE-2026-23135",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2026-23135"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nwifi: ath12k: fix dma_free_coherent() pointer\n\ndma_alloc_coherent() allocates a DMA mapped buffer and stores the\naddresses in XXX_unaligned fields. Those should be reused when freeing\nthe buffer rather than the aligned addresses.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_7_34-rt-1-150700.1.3.1.x86_64",
"SUSE Real Time Module 15 SP7:cluster-md-kmp-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:dlm-kmp-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:gfs2-kmp-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-devel-rt-6.4.0-150700.7.34.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-rt-devel-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-source-rt-6.4.0-150700.7.34.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-syms-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:ocfs2-kmp-rt-6.4.0-150700.7.34.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2026-23135",
"url": "https://www.suse.com/security/cve/CVE-2026-23135"
},
{
"category": "external",
"summary": "SUSE Bug 1258245 for CVE-2026-23135",
"url": "https://bugzilla.suse.com/1258245"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_7_34-rt-1-150700.1.3.1.x86_64",
"SUSE Real Time Module 15 SP7:cluster-md-kmp-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:dlm-kmp-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:gfs2-kmp-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-devel-rt-6.4.0-150700.7.34.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-rt-devel-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-source-rt-6.4.0-150700.7.34.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-syms-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:ocfs2-kmp-rt-6.4.0-150700.7.34.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.7,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:L/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_7_34-rt-1-150700.1.3.1.x86_64",
"SUSE Real Time Module 15 SP7:cluster-md-kmp-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:dlm-kmp-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:gfs2-kmp-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-devel-rt-6.4.0-150700.7.34.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-rt-devel-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-source-rt-6.4.0-150700.7.34.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-syms-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:ocfs2-kmp-rt-6.4.0-150700.7.34.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-03-23T09:09:02Z",
"details": "moderate"
}
],
"title": "CVE-2026-23135"
},
{
"cve": "CVE-2026-23139",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2026-23139"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nnetfilter: nf_conncount: update last_gc only when GC has been performed\n\nCurrently last_gc is being updated everytime a new connection is\ntracked, that means that it is updated even if a GC wasn\u0027t performed.\nWith a sufficiently high packet rate, it is possible to always bypass\nthe GC, causing the list to grow infinitely.\n\nUpdate the last_gc value only when a GC has been actually performed.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_7_34-rt-1-150700.1.3.1.x86_64",
"SUSE Real Time Module 15 SP7:cluster-md-kmp-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:dlm-kmp-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:gfs2-kmp-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-devel-rt-6.4.0-150700.7.34.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-rt-devel-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-source-rt-6.4.0-150700.7.34.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-syms-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:ocfs2-kmp-rt-6.4.0-150700.7.34.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2026-23139",
"url": "https://www.suse.com/security/cve/CVE-2026-23139"
},
{
"category": "external",
"summary": "SUSE Bug 1258304 for CVE-2026-23139",
"url": "https://bugzilla.suse.com/1258304"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_7_34-rt-1-150700.1.3.1.x86_64",
"SUSE Real Time Module 15 SP7:cluster-md-kmp-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:dlm-kmp-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:gfs2-kmp-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-devel-rt-6.4.0-150700.7.34.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-rt-devel-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-source-rt-6.4.0-150700.7.34.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-syms-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:ocfs2-kmp-rt-6.4.0-150700.7.34.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_7_34-rt-1-150700.1.3.1.x86_64",
"SUSE Real Time Module 15 SP7:cluster-md-kmp-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:dlm-kmp-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:gfs2-kmp-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-devel-rt-6.4.0-150700.7.34.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-rt-devel-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-source-rt-6.4.0-150700.7.34.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-syms-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:ocfs2-kmp-rt-6.4.0-150700.7.34.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-03-23T09:09:02Z",
"details": "moderate"
}
],
"title": "CVE-2026-23139"
},
{
"cve": "CVE-2026-23141",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2026-23141"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nbtrfs: send: check for inline extents in range_is_hole_in_parent()\n\nBefore accessing the disk_bytenr field of a file extent item we need\nto check if we are dealing with an inline extent.\nThis is because for inline extents their data starts at the offset of\nthe disk_bytenr field. So accessing the disk_bytenr\nmeans we are accessing inline data or in case the inline data is less\nthan 8 bytes we can actually cause an invalid\nmemory access if this inline extent item is the first item in the leaf\nor access metadata from other items.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_7_34-rt-1-150700.1.3.1.x86_64",
"SUSE Real Time Module 15 SP7:cluster-md-kmp-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:dlm-kmp-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:gfs2-kmp-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-devel-rt-6.4.0-150700.7.34.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-rt-devel-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-source-rt-6.4.0-150700.7.34.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-syms-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:ocfs2-kmp-rt-6.4.0-150700.7.34.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2026-23141",
"url": "https://www.suse.com/security/cve/CVE-2026-23141"
},
{
"category": "external",
"summary": "SUSE Bug 1258377 for CVE-2026-23141",
"url": "https://bugzilla.suse.com/1258377"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_7_34-rt-1-150700.1.3.1.x86_64",
"SUSE Real Time Module 15 SP7:cluster-md-kmp-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:dlm-kmp-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:gfs2-kmp-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-devel-rt-6.4.0-150700.7.34.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-rt-devel-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-source-rt-6.4.0-150700.7.34.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-syms-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:ocfs2-kmp-rt-6.4.0-150700.7.34.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_7_34-rt-1-150700.1.3.1.x86_64",
"SUSE Real Time Module 15 SP7:cluster-md-kmp-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:dlm-kmp-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:gfs2-kmp-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-devel-rt-6.4.0-150700.7.34.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-rt-devel-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-source-rt-6.4.0-150700.7.34.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-syms-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:ocfs2-kmp-rt-6.4.0-150700.7.34.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-03-23T09:09:02Z",
"details": "moderate"
}
],
"title": "CVE-2026-23141"
},
{
"cve": "CVE-2026-23145",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2026-23145"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\next4: fix iloc.bh leak in ext4_xattr_inode_update_ref\n\nThe error branch for ext4_xattr_inode_update_ref forget to release the\nrefcount for iloc.bh. Find this when review code.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_7_34-rt-1-150700.1.3.1.x86_64",
"SUSE Real Time Module 15 SP7:cluster-md-kmp-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:dlm-kmp-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:gfs2-kmp-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-devel-rt-6.4.0-150700.7.34.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-rt-devel-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-source-rt-6.4.0-150700.7.34.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-syms-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:ocfs2-kmp-rt-6.4.0-150700.7.34.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2026-23145",
"url": "https://www.suse.com/security/cve/CVE-2026-23145"
},
{
"category": "external",
"summary": "SUSE Bug 1258326 for CVE-2026-23145",
"url": "https://bugzilla.suse.com/1258326"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_7_34-rt-1-150700.1.3.1.x86_64",
"SUSE Real Time Module 15 SP7:cluster-md-kmp-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:dlm-kmp-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:gfs2-kmp-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-devel-rt-6.4.0-150700.7.34.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-rt-devel-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-source-rt-6.4.0-150700.7.34.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-syms-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:ocfs2-kmp-rt-6.4.0-150700.7.34.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_7_34-rt-1-150700.1.3.1.x86_64",
"SUSE Real Time Module 15 SP7:cluster-md-kmp-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:dlm-kmp-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:gfs2-kmp-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-devel-rt-6.4.0-150700.7.34.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-rt-devel-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-source-rt-6.4.0-150700.7.34.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-syms-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:ocfs2-kmp-rt-6.4.0-150700.7.34.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-03-23T09:09:02Z",
"details": "moderate"
}
],
"title": "CVE-2026-23145"
},
{
"cve": "CVE-2026-23146",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2026-23146"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nBluetooth: hci_uart: fix null-ptr-deref in hci_uart_write_work\n\nhci_uart_set_proto() sets HCI_UART_PROTO_INIT before calling\nhci_uart_register_dev(), which calls proto-\u003eopen() to initialize\nhu-\u003epriv. However, if a TTY write wakeup occurs during this window,\nhci_uart_tx_wakeup() may schedule write_work before hu-\u003epriv is\ninitialized, leading to a NULL pointer dereference in\nhci_uart_write_work() when proto-\u003edequeue() accesses hu-\u003epriv.\n\nThe race condition is:\n\n CPU0 CPU1\n ---- ----\n hci_uart_set_proto()\n set_bit(HCI_UART_PROTO_INIT)\n hci_uart_register_dev()\n tty write wakeup\n hci_uart_tty_wakeup()\n hci_uart_tx_wakeup()\n schedule_work(\u0026hu-\u003ewrite_work)\n proto-\u003eopen(hu)\n // initializes hu-\u003epriv\n hci_uart_write_work()\n hci_uart_dequeue()\n proto-\u003edequeue(hu)\n // accesses hu-\u003epriv (NULL!)\n\nFix this by moving set_bit(HCI_UART_PROTO_INIT) after proto-\u003eopen()\nsucceeds, ensuring hu-\u003epriv is initialized before any work can be\nscheduled.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_7_34-rt-1-150700.1.3.1.x86_64",
"SUSE Real Time Module 15 SP7:cluster-md-kmp-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:dlm-kmp-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:gfs2-kmp-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-devel-rt-6.4.0-150700.7.34.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-rt-devel-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-source-rt-6.4.0-150700.7.34.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-syms-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:ocfs2-kmp-rt-6.4.0-150700.7.34.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2026-23146",
"url": "https://www.suse.com/security/cve/CVE-2026-23146"
},
{
"category": "external",
"summary": "SUSE Bug 1258234 for CVE-2026-23146",
"url": "https://bugzilla.suse.com/1258234"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_7_34-rt-1-150700.1.3.1.x86_64",
"SUSE Real Time Module 15 SP7:cluster-md-kmp-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:dlm-kmp-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:gfs2-kmp-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-devel-rt-6.4.0-150700.7.34.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-rt-devel-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-source-rt-6.4.0-150700.7.34.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-syms-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:ocfs2-kmp-rt-6.4.0-150700.7.34.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.7,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_7_34-rt-1-150700.1.3.1.x86_64",
"SUSE Real Time Module 15 SP7:cluster-md-kmp-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:dlm-kmp-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:gfs2-kmp-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-devel-rt-6.4.0-150700.7.34.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-rt-devel-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-source-rt-6.4.0-150700.7.34.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-syms-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:ocfs2-kmp-rt-6.4.0-150700.7.34.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-03-23T09:09:02Z",
"details": "moderate"
}
],
"title": "CVE-2026-23146"
},
{
"cve": "CVE-2026-23150",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2026-23150"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nnfc: llcp: Fix memleak in nfc_llcp_send_ui_frame().\n\nsyzbot reported various memory leaks related to NFC, struct\nnfc_llcp_sock, sk_buff, nfc_dev, etc. [0]\n\nThe leading log hinted that nfc_llcp_send_ui_frame() failed\nto allocate skb due to sock_error(sk) being -ENXIO.\n\nENXIO is set by nfc_llcp_socket_release() when struct\nnfc_llcp_local is destroyed by local_cleanup().\n\nThe problem is that there is no synchronisation between\nnfc_llcp_send_ui_frame() and local_cleanup(), and skb\ncould be put into local-\u003etx_queue after it was purged in\nlocal_cleanup():\n\n CPU1 CPU2\n ---- ----\n nfc_llcp_send_ui_frame() local_cleanup()\n |- do { \u0027\n |- pdu = nfc_alloc_send_skb(..., \u0026err)\n | .\n | |- nfc_llcp_socket_release(local, false, ENXIO);\n | |- skb_queue_purge(\u0026local-\u003etx_queue); |\n | \u0027 |\n |- skb_queue_tail(\u0026local-\u003etx_queue, pdu); |\n ... |\n |- pdu = nfc_alloc_send_skb(..., \u0026err) |\n ^._________________________________.\u0027\n\nlocal_cleanup() is called for struct nfc_llcp_local only\nafter nfc_llcp_remove_local() unlinks it from llcp_devices.\n\nIf we hold local-\u003etx_queue.lock then, we can synchronise\nthe thread and nfc_llcp_send_ui_frame().\n\nLet\u0027s do that and check list_empty(\u0026local-\u003elist) before\nqueuing skb to local-\u003etx_queue in nfc_llcp_send_ui_frame().\n\n[0]:\n[ 56.074943][ T6096] llcp: nfc_llcp_send_ui_frame: Could not allocate PDU (error=-6)\n[ 64.318868][ T5813] kmemleak: 6 new suspected memory leaks (see /sys/kernel/debug/kmemleak)\nBUG: memory leak\nunreferenced object 0xffff8881272f6800 (size 1024):\n comm \"syz.0.17\", pid 6096, jiffies 4294942766\n hex dump (first 32 bytes):\n 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................\n 27 00 03 40 00 00 00 00 00 00 00 00 00 00 00 00 \u0027..@............\n backtrace (crc da58d84d):\n kmemleak_alloc_recursive include/linux/kmemleak.h:44 [inline]\n slab_post_alloc_hook mm/slub.c:4979 [inline]\n slab_alloc_node mm/slub.c:5284 [inline]\n __do_kmalloc_node mm/slub.c:5645 [inline]\n __kmalloc_noprof+0x3e3/0x6b0 mm/slub.c:5658\n kmalloc_noprof include/linux/slab.h:961 [inline]\n sk_prot_alloc+0x11a/0x1b0 net/core/sock.c:2239\n sk_alloc+0x36/0x360 net/core/sock.c:2295\n nfc_llcp_sock_alloc+0x37/0x130 net/nfc/llcp_sock.c:979\n llcp_sock_create+0x71/0xd0 net/nfc/llcp_sock.c:1044\n nfc_sock_create+0xc9/0xf0 net/nfc/af_nfc.c:31\n __sock_create+0x1a9/0x340 net/socket.c:1605\n sock_create net/socket.c:1663 [inline]\n __sys_socket_create net/socket.c:1700 [inline]\n __sys_socket+0xb9/0x1a0 net/socket.c:1747\n __do_sys_socket net/socket.c:1761 [inline]\n __se_sys_socket net/socket.c:1759 [inline]\n __x64_sys_socket+0x1b/0x30 net/socket.c:1759\n do_syscall_x64 arch/x86/entry/syscall_64.c:63 [inline]\n do_syscall_64+0xa4/0xfa0 arch/x86/entry/syscall_64.c:94\n entry_SYSCALL_64_after_hwframe+0x77/0x7f\n\nBUG: memory leak\nunreferenced object 0xffff88810fbd9800 (size 240):\n comm \"syz.0.17\", pid 6096, jiffies 4294942850\n hex dump (first 32 bytes):\n 68 f0 ff 08 81 88 ff ff 68 f0 ff 08 81 88 ff ff h.......h.......\n 00 00 00 00 00 00 00 00 00 68 2f 27 81 88 ff ff .........h/\u0027....\n backtrace (crc 6cc652b1):\n kmemleak_alloc_recursive include/linux/kmemleak.h:44 [inline]\n slab_post_alloc_hook mm/slub.c:4979 [inline]\n slab_alloc_node mm/slub.c:5284 [inline]\n kmem_cache_alloc_node_noprof+0x36f/0x5e0 mm/slub.c:5336\n __alloc_skb+0x203/0x240 net/core/skbuff.c:660\n alloc_skb include/linux/skbuff.h:1383 [inline]\n alloc_skb_with_frags+0x69/0x3f0 net/core/sk\n---truncated---",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_7_34-rt-1-150700.1.3.1.x86_64",
"SUSE Real Time Module 15 SP7:cluster-md-kmp-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:dlm-kmp-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:gfs2-kmp-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-devel-rt-6.4.0-150700.7.34.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-rt-devel-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-source-rt-6.4.0-150700.7.34.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-syms-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:ocfs2-kmp-rt-6.4.0-150700.7.34.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2026-23150",
"url": "https://www.suse.com/security/cve/CVE-2026-23150"
},
{
"category": "external",
"summary": "SUSE Bug 1258354 for CVE-2026-23150",
"url": "https://bugzilla.suse.com/1258354"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_7_34-rt-1-150700.1.3.1.x86_64",
"SUSE Real Time Module 15 SP7:cluster-md-kmp-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:dlm-kmp-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:gfs2-kmp-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-devel-rt-6.4.0-150700.7.34.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-rt-devel-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-source-rt-6.4.0-150700.7.34.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-syms-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:ocfs2-kmp-rt-6.4.0-150700.7.34.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.7,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_7_34-rt-1-150700.1.3.1.x86_64",
"SUSE Real Time Module 15 SP7:cluster-md-kmp-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:dlm-kmp-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:gfs2-kmp-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-devel-rt-6.4.0-150700.7.34.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-rt-devel-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-source-rt-6.4.0-150700.7.34.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-syms-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:ocfs2-kmp-rt-6.4.0-150700.7.34.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-03-23T09:09:02Z",
"details": "moderate"
}
],
"title": "CVE-2026-23150"
},
{
"cve": "CVE-2026-23151",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2026-23151"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nBluetooth: MGMT: Fix memory leak in set_ssp_complete\n\nFix memory leak in set_ssp_complete() where mgmt_pending_cmd structures\nare not freed after being removed from the pending list.\n\nCommit 302a1f674c00 (\"Bluetooth: MGMT: Fix possible UAFs\") replaced\nmgmt_pending_foreach() calls with individual command handling but missed\nadding mgmt_pending_free() calls in both error and success paths of\nset_ssp_complete(). Other completion functions like set_le_complete()\nwere fixed correctly in the same commit.\n\nThis causes a memory leak of the mgmt_pending_cmd structure and its\nassociated parameter data for each SSP command that completes.\n\nAdd the missing mgmt_pending_free(cmd) calls in both code paths to fix\nthe memory leak. Also fix the same issue in set_advertising_complete().",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_7_34-rt-1-150700.1.3.1.x86_64",
"SUSE Real Time Module 15 SP7:cluster-md-kmp-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:dlm-kmp-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:gfs2-kmp-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-devel-rt-6.4.0-150700.7.34.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-rt-devel-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-source-rt-6.4.0-150700.7.34.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-syms-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:ocfs2-kmp-rt-6.4.0-150700.7.34.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2026-23151",
"url": "https://www.suse.com/security/cve/CVE-2026-23151"
},
{
"category": "external",
"summary": "SUSE Bug 1258237 for CVE-2026-23151",
"url": "https://bugzilla.suse.com/1258237"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_7_34-rt-1-150700.1.3.1.x86_64",
"SUSE Real Time Module 15 SP7:cluster-md-kmp-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:dlm-kmp-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:gfs2-kmp-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-devel-rt-6.4.0-150700.7.34.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-rt-devel-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-source-rt-6.4.0-150700.7.34.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-syms-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:ocfs2-kmp-rt-6.4.0-150700.7.34.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_7_34-rt-1-150700.1.3.1.x86_64",
"SUSE Real Time Module 15 SP7:cluster-md-kmp-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:dlm-kmp-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:gfs2-kmp-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-devel-rt-6.4.0-150700.7.34.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-rt-devel-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-source-rt-6.4.0-150700.7.34.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-syms-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:ocfs2-kmp-rt-6.4.0-150700.7.34.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-03-23T09:09:02Z",
"details": "moderate"
}
],
"title": "CVE-2026-23151"
},
{
"cve": "CVE-2026-23152",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2026-23152"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nwifi: mac80211: correctly decode TTLM with default link map\n\nTID-To-Link Mapping (TTLM) elements do not contain any link mapping\npresence indicator if a default mapping is used and parsing needs to be\nskipped.\n\nNote that access points should not explicitly report an advertised TTLM\nwith a default mapping as that is the implied mapping if the element is\nnot included, this is even the case when switching back to the default\nmapping. However, mac80211 would incorrectly parse the frame and would\nalso read one byte beyond the end of the element.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_7_34-rt-1-150700.1.3.1.x86_64",
"SUSE Real Time Module 15 SP7:cluster-md-kmp-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:dlm-kmp-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:gfs2-kmp-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-devel-rt-6.4.0-150700.7.34.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-rt-devel-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-source-rt-6.4.0-150700.7.34.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-syms-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:ocfs2-kmp-rt-6.4.0-150700.7.34.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2026-23152",
"url": "https://www.suse.com/security/cve/CVE-2026-23152"
},
{
"category": "external",
"summary": "SUSE Bug 1258252 for CVE-2026-23152",
"url": "https://bugzilla.suse.com/1258252"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_7_34-rt-1-150700.1.3.1.x86_64",
"SUSE Real Time Module 15 SP7:cluster-md-kmp-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:dlm-kmp-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:gfs2-kmp-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-devel-rt-6.4.0-150700.7.34.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-rt-devel-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-source-rt-6.4.0-150700.7.34.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-syms-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:ocfs2-kmp-rt-6.4.0-150700.7.34.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:A/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_7_34-rt-1-150700.1.3.1.x86_64",
"SUSE Real Time Module 15 SP7:cluster-md-kmp-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:dlm-kmp-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:gfs2-kmp-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-devel-rt-6.4.0-150700.7.34.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-rt-devel-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-source-rt-6.4.0-150700.7.34.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-syms-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:ocfs2-kmp-rt-6.4.0-150700.7.34.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-03-23T09:09:02Z",
"details": "moderate"
}
],
"title": "CVE-2026-23152"
},
{
"cve": "CVE-2026-23154",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2026-23154"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nnet: fix segmentation of forwarding fraglist GRO\n\nThis patch enhances GSO segment handling by properly checking\nthe SKB_GSO_DODGY flag for frag_list GSO packets, addressing\nlow throughput issues observed when a station accesses IPv4\nservers via hotspots with an IPv6-only upstream interface.\n\nSpecifically, it fixes a bug in GSO segmentation when forwarding\nGRO packets containing a frag_list. The function skb_segment_list\ncannot correctly process GRO skbs that have been converted by XLAT,\nsince XLAT only translates the header of the head skb. Consequently,\nskbs in the frag_list may remain untranslated, resulting in protocol\ninconsistencies and reduced throughput.\n\nTo address this, the patch explicitly sets the SKB_GSO_DODGY flag\nfor GSO packets in XLAT\u0027s IPv4/IPv6 protocol translation helpers\n(bpf_skb_proto_4_to_6 and bpf_skb_proto_6_to_4). This marks GSO\npackets as potentially modified after protocol translation. As a\nresult, GSO segmentation will avoid using skb_segment_list and\ninstead falls back to skb_segment for packets with the SKB_GSO_DODGY\nflag. This ensures that only safe and fully translated frag_list\npackets are processed by skb_segment_list, resolving protocol\ninconsistencies and improving throughput when forwarding GRO packets\nconverted by XLAT.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_7_34-rt-1-150700.1.3.1.x86_64",
"SUSE Real Time Module 15 SP7:cluster-md-kmp-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:dlm-kmp-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:gfs2-kmp-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-devel-rt-6.4.0-150700.7.34.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-rt-devel-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-source-rt-6.4.0-150700.7.34.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-syms-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:ocfs2-kmp-rt-6.4.0-150700.7.34.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2026-23154",
"url": "https://www.suse.com/security/cve/CVE-2026-23154"
},
{
"category": "external",
"summary": "SUSE Bug 1258286 for CVE-2026-23154",
"url": "https://bugzilla.suse.com/1258286"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_7_34-rt-1-150700.1.3.1.x86_64",
"SUSE Real Time Module 15 SP7:cluster-md-kmp-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:dlm-kmp-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:gfs2-kmp-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-devel-rt-6.4.0-150700.7.34.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-rt-devel-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-source-rt-6.4.0-150700.7.34.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-syms-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:ocfs2-kmp-rt-6.4.0-150700.7.34.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_7_34-rt-1-150700.1.3.1.x86_64",
"SUSE Real Time Module 15 SP7:cluster-md-kmp-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:dlm-kmp-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:gfs2-kmp-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-devel-rt-6.4.0-150700.7.34.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-rt-devel-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-source-rt-6.4.0-150700.7.34.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-syms-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:ocfs2-kmp-rt-6.4.0-150700.7.34.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-03-23T09:09:02Z",
"details": "moderate"
}
],
"title": "CVE-2026-23154"
},
{
"cve": "CVE-2026-23155",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2026-23155"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\ncan: gs_usb: gs_usb_receive_bulk_callback(): fix error message\n\nSinc commit 79a6d1bfe114 (\"can: gs_usb: gs_usb_receive_bulk_callback():\nunanchor URL on usb_submit_urb() error\") a failing resubmit URB will print\nan info message.\n\nIn the case of a short read where netdev has not yet been assigned,\ninitialize as NULL to avoid dereferencing an undefined value. Also report\nthe error value of the failed resubmit.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_7_34-rt-1-150700.1.3.1.x86_64",
"SUSE Real Time Module 15 SP7:cluster-md-kmp-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:dlm-kmp-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:gfs2-kmp-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-devel-rt-6.4.0-150700.7.34.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-rt-devel-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-source-rt-6.4.0-150700.7.34.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-syms-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:ocfs2-kmp-rt-6.4.0-150700.7.34.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2026-23155",
"url": "https://www.suse.com/security/cve/CVE-2026-23155"
},
{
"category": "external",
"summary": "SUSE Bug 1258313 for CVE-2026-23155",
"url": "https://bugzilla.suse.com/1258313"
},
{
"category": "external",
"summary": "SUSE Bug 1258315 for CVE-2026-23155",
"url": "https://bugzilla.suse.com/1258315"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_7_34-rt-1-150700.1.3.1.x86_64",
"SUSE Real Time Module 15 SP7:cluster-md-kmp-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:dlm-kmp-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:gfs2-kmp-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-devel-rt-6.4.0-150700.7.34.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-rt-devel-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-source-rt-6.4.0-150700.7.34.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-syms-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:ocfs2-kmp-rt-6.4.0-150700.7.34.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_7_34-rt-1-150700.1.3.1.x86_64",
"SUSE Real Time Module 15 SP7:cluster-md-kmp-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:dlm-kmp-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:gfs2-kmp-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-devel-rt-6.4.0-150700.7.34.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-rt-devel-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-source-rt-6.4.0-150700.7.34.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-syms-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:ocfs2-kmp-rt-6.4.0-150700.7.34.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-03-23T09:09:02Z",
"details": "important"
}
],
"title": "CVE-2026-23155"
},
{
"cve": "CVE-2026-23156",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2026-23156"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nefivarfs: fix error propagation in efivar_entry_get()\n\nefivar_entry_get() always returns success even if the underlying\n__efivar_entry_get() fails, masking errors.\n\nThis may result in uninitialized heap memory being copied to userspace\nin the efivarfs_file_read() path.\n\nFix it by returning the error from __efivar_entry_get().",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_7_34-rt-1-150700.1.3.1.x86_64",
"SUSE Real Time Module 15 SP7:cluster-md-kmp-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:dlm-kmp-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:gfs2-kmp-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-devel-rt-6.4.0-150700.7.34.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-rt-devel-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-source-rt-6.4.0-150700.7.34.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-syms-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:ocfs2-kmp-rt-6.4.0-150700.7.34.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2026-23156",
"url": "https://www.suse.com/security/cve/CVE-2026-23156"
},
{
"category": "external",
"summary": "SUSE Bug 1258317 for CVE-2026-23156",
"url": "https://bugzilla.suse.com/1258317"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_7_34-rt-1-150700.1.3.1.x86_64",
"SUSE Real Time Module 15 SP7:cluster-md-kmp-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:dlm-kmp-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:gfs2-kmp-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-devel-rt-6.4.0-150700.7.34.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-rt-devel-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-source-rt-6.4.0-150700.7.34.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-syms-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:ocfs2-kmp-rt-6.4.0-150700.7.34.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.8,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:H/A:L",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_7_34-rt-1-150700.1.3.1.x86_64",
"SUSE Real Time Module 15 SP7:cluster-md-kmp-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:dlm-kmp-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:gfs2-kmp-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-devel-rt-6.4.0-150700.7.34.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-rt-devel-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-source-rt-6.4.0-150700.7.34.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-syms-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:ocfs2-kmp-rt-6.4.0-150700.7.34.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-03-23T09:09:02Z",
"details": "moderate"
}
],
"title": "CVE-2026-23156"
},
{
"cve": "CVE-2026-23157",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2026-23157"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nbtrfs: do not strictly require dirty metadata threshold for metadata writepages\n\n[BUG]\nThere is an internal report that over 1000 processes are\nwaiting at the io_schedule_timeout() of balance_dirty_pages(), causing\na system hang and trigger a kernel coredump.\n\nThe kernel is v6.4 kernel based, but the root problem still applies to\nany upstream kernel before v6.18.\n\n[CAUSE]\nFrom Jan Kara for his wisdom on the dirty page balance behavior first.\n\n This cgroup dirty limit was what was actually playing the role here\n because the cgroup had only a small amount of memory and so the dirty\n limit for it was something like 16MB.\n\n Dirty throttling is responsible for enforcing that nobody can dirty\n (significantly) more dirty memory than there\u0027s dirty limit. Thus when\n a task is dirtying pages it periodically enters into balance_dirty_pages()\n and we let it sleep there to slow down the dirtying.\n\n When the system is over dirty limit already (either globally or within\n a cgroup of the running task), we will not let the task exit from\n balance_dirty_pages() until the number of dirty pages drops below the\n limit.\n\n So in this particular case, as I already mentioned, there was a cgroup\n with relatively small amount of memory and as a result with dirty limit\n set at 16MB. A task from that cgroup has dirtied about 28MB worth of\n pages in btrfs btree inode and these were practically the only dirty\n pages in that cgroup.\n\nSo that means the only way to reduce the dirty pages of that cgroup is\nto writeback the dirty pages of btrfs btree inode, and only after that\nthose processes can exit balance_dirty_pages().\n\nNow back to the btrfs part, btree_writepages() is responsible for\nwriting back dirty btree inode pages.\n\nThe problem here is, there is a btrfs internal threshold that if the\nbtree inode\u0027s dirty bytes are below the 32M threshold, it will not\ndo any writeback.\n\nThis behavior is to batch as much metadata as possible so we won\u0027t write\nback those tree blocks and then later re-COW them again for another\nmodification.\n\nThis internal 32MiB is higher than the existing dirty page size (28MiB),\nmeaning no writeback will happen, causing a deadlock between btrfs and\ncgroup:\n\n- Btrfs doesn\u0027t want to write back btree inode until more dirty pages\n\n- Cgroup/MM doesn\u0027t want more dirty pages for btrfs btree inode\n Thus any process touching that btree inode is put into sleep until\n the number of dirty pages is reduced.\n\nThanks Jan Kara a lot for the analysis of the root cause.\n\n[ENHANCEMENT]\nSince kernel commit b55102826d7d (\"btrfs: set AS_KERNEL_FILE on the\nbtree_inode\"), btrfs btree inode pages will only be charged to the root\ncgroup which should have a much larger limit than btrfs\u0027 32MiB\nthreshold.\nSo it should not affect newer kernels.\n\nBut for all current LTS kernels, they are all affected by this problem,\nand backporting the whole AS_KERNEL_FILE may not be a good idea.\n\nEven for newer kernels I still think it\u0027s a good idea to get\nrid of the internal threshold at btree_writepages(), since for most cases\ncgroup/MM has a better view of full system memory usage than btrfs\u0027 fixed\nthreshold.\n\nFor internal callers using btrfs_btree_balance_dirty() since that\nfunction is already doing internal threshold check, we don\u0027t need to\nbother them.\n\nBut for external callers of btree_writepages(), just respect their\nrequests and write back whatever they want, ignoring the internal\nbtrfs threshold to avoid such deadlock on btree inode dirty page\nbalancing.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_7_34-rt-1-150700.1.3.1.x86_64",
"SUSE Real Time Module 15 SP7:cluster-md-kmp-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:dlm-kmp-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:gfs2-kmp-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-devel-rt-6.4.0-150700.7.34.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-rt-devel-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-source-rt-6.4.0-150700.7.34.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-syms-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:ocfs2-kmp-rt-6.4.0-150700.7.34.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2026-23157",
"url": "https://www.suse.com/security/cve/CVE-2026-23157"
},
{
"category": "external",
"summary": "SUSE Bug 1258376 for CVE-2026-23157",
"url": "https://bugzilla.suse.com/1258376"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_7_34-rt-1-150700.1.3.1.x86_64",
"SUSE Real Time Module 15 SP7:cluster-md-kmp-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:dlm-kmp-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:gfs2-kmp-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-devel-rt-6.4.0-150700.7.34.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-rt-devel-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-source-rt-6.4.0-150700.7.34.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-syms-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:ocfs2-kmp-rt-6.4.0-150700.7.34.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_7_34-rt-1-150700.1.3.1.x86_64",
"SUSE Real Time Module 15 SP7:cluster-md-kmp-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:dlm-kmp-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:gfs2-kmp-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-devel-rt-6.4.0-150700.7.34.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-rt-devel-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-source-rt-6.4.0-150700.7.34.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-syms-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:ocfs2-kmp-rt-6.4.0-150700.7.34.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-03-23T09:09:02Z",
"details": "moderate"
}
],
"title": "CVE-2026-23157"
},
{
"cve": "CVE-2026-23163",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2026-23163"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\ndrm/amdgpu: fix NULL pointer dereference in amdgpu_gmc_filter_faults_remove\n\nOn APUs such as Raven and Renoir (GC 9.1.0, 9.2.2, 9.3.0), the ih1 and\nih2 interrupt ring buffers are not initialized. This is by design, as\nthese secondary IH rings are only available on discrete GPUs. See\nvega10_ih_sw_init() which explicitly skips ih1/ih2 initialization when\nAMD_IS_APU is set.\n\nHowever, amdgpu_gmc_filter_faults_remove() unconditionally uses ih1 to\nget the timestamp of the last interrupt entry. When retry faults are\nenabled on APUs (noretry=0), this function is called from the SVM page\nfault recovery path, resulting in a NULL pointer dereference when\namdgpu_ih_decode_iv_ts_helper() attempts to access ih-\u003ering[].\n\nThe crash manifests as:\n\n BUG: kernel NULL pointer dereference, address: 0000000000000004\n RIP: 0010:amdgpu_ih_decode_iv_ts_helper+0x22/0x40 [amdgpu]\n Call Trace:\n amdgpu_gmc_filter_faults_remove+0x60/0x130 [amdgpu]\n svm_range_restore_pages+0xae5/0x11c0 [amdgpu]\n amdgpu_vm_handle_fault+0xc8/0x340 [amdgpu]\n gmc_v9_0_process_interrupt+0x191/0x220 [amdgpu]\n amdgpu_irq_dispatch+0xed/0x2c0 [amdgpu]\n amdgpu_ih_process+0x84/0x100 [amdgpu]\n\nThis issue was exposed by commit 1446226d32a4 (\"drm/amdgpu: Remove GC HW\nIP 9.3.0 from noretry=1\") which changed the default for Renoir APU from\nnoretry=1 to noretry=0, enabling retry fault handling and thus\nexercising the buggy code path.\n\nFix this by adding a check for ih1.ring_size before attempting to use\nit. Also restore the soft_ih support from commit dd299441654f (\"drm/amdgpu:\nRework retry fault removal\"). This is needed if the hardware doesn\u0027t\nsupport secondary HW IH rings.\n\nv2: additional updates (Alex)\n\n(cherry picked from commit 6ce8d536c80aa1f059e82184f0d1994436b1d526)",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_7_34-rt-1-150700.1.3.1.x86_64",
"SUSE Real Time Module 15 SP7:cluster-md-kmp-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:dlm-kmp-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:gfs2-kmp-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-devel-rt-6.4.0-150700.7.34.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-rt-devel-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-source-rt-6.4.0-150700.7.34.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-syms-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:ocfs2-kmp-rt-6.4.0-150700.7.34.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2026-23163",
"url": "https://www.suse.com/security/cve/CVE-2026-23163"
},
{
"category": "external",
"summary": "SUSE Bug 1258544 for CVE-2026-23163",
"url": "https://bugzilla.suse.com/1258544"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_7_34-rt-1-150700.1.3.1.x86_64",
"SUSE Real Time Module 15 SP7:cluster-md-kmp-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:dlm-kmp-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:gfs2-kmp-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-devel-rt-6.4.0-150700.7.34.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-rt-devel-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-source-rt-6.4.0-150700.7.34.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-syms-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:ocfs2-kmp-rt-6.4.0-150700.7.34.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_7_34-rt-1-150700.1.3.1.x86_64",
"SUSE Real Time Module 15 SP7:cluster-md-kmp-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:dlm-kmp-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:gfs2-kmp-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-devel-rt-6.4.0-150700.7.34.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-rt-devel-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-source-rt-6.4.0-150700.7.34.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-syms-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:ocfs2-kmp-rt-6.4.0-150700.7.34.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-03-23T09:09:02Z",
"details": "moderate"
}
],
"title": "CVE-2026-23163"
},
{
"cve": "CVE-2026-23166",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2026-23166"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nice: Fix NULL pointer dereference in ice_vsi_set_napi_queues\n\nAdd NULL pointer checks in ice_vsi_set_napi_queues() to prevent crashes\nduring resume from suspend when rings[q_idx]-\u003eq_vector is NULL.\n\nTested adaptor:\n60:00.0 Ethernet controller [0200]: Intel Corporation Ethernet Controller E810-XXV for SFP [8086:159b] (rev 02)\n Subsystem: Intel Corporation Ethernet Network Adapter E810-XXV-2 [8086:4003]\n\nSR-IOV state: both disabled and enabled can reproduce this issue.\n\nkernel version: v6.18\n\nReproduce steps:\nBoot up and execute suspend like systemctl suspend or rtcwake.\n\nLog:\n\u003c1\u003e[ 231.443607] BUG: kernel NULL pointer dereference, address: 0000000000000040\n\u003c1\u003e[ 231.444052] #PF: supervisor read access in kernel mode\n\u003c1\u003e[ 231.444484] #PF: error_code(0x0000) - not-present page\n\u003c6\u003e[ 231.444913] PGD 0 P4D 0\n\u003c4\u003e[ 231.445342] Oops: Oops: 0000 [#1] SMP NOPTI\n\u003c4\u003e[ 231.446635] RIP: 0010:netif_queue_set_napi+0xa/0x170\n\u003c4\u003e[ 231.447067] Code: 31 f6 31 ff c3 cc cc cc cc 0f 1f 80 00 00 00 00 90 90 90 90 90 90 90 90 90 90 90 90 90 90 90 90 0f 1f 44 00 00 48 85 c9 74 0b \u003c48\u003e 83 79 30 00 0f 84 39 01 00 00 55 41 89 d1 49 89 f8 89 f2 48 89\n\u003c4\u003e[ 231.447513] RSP: 0018:ffffcc780fc078c0 EFLAGS: 00010202\n\u003c4\u003e[ 231.447961] RAX: ffff8b848ca30400 RBX: ffff8b848caf2028 RCX: 0000000000000010\n\u003c4\u003e[ 231.448443] RDX: 0000000000000000 RSI: 0000000000000000 RDI: ffff8b848dbd4000\n\u003c4\u003e[ 231.448896] RBP: ffffcc780fc078e8 R08: 0000000000000000 R09: 0000000000000000\n\u003c4\u003e[ 231.449345] R10: 0000000000000000 R11: 0000000000000000 R12: 0000000000000001\n\u003c4\u003e[ 231.449817] R13: ffff8b848dbd4000 R14: ffff8b84833390c8 R15: 0000000000000000\n\u003c4\u003e[ 231.450265] FS: 00007c7b29e9d740(0000) GS:ffff8b8c068e2000(0000) knlGS:0000000000000000\n\u003c4\u003e[ 231.450715] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033\n\u003c4\u003e[ 231.451179] CR2: 0000000000000040 CR3: 000000030626f004 CR4: 0000000000f72ef0\n\u003c4\u003e[ 231.451629] PKRU: 55555554\n\u003c4\u003e[ 231.452076] Call Trace:\n\u003c4\u003e[ 231.452549] \u003cTASK\u003e\n\u003c4\u003e[ 231.452996] ? ice_vsi_set_napi_queues+0x4d/0x110 [ice]\n\u003c4\u003e[ 231.453482] ice_resume+0xfd/0x220 [ice]\n\u003c4\u003e[ 231.453977] ? __pfx_pci_pm_resume+0x10/0x10\n\u003c4\u003e[ 231.454425] pci_pm_resume+0x8c/0x140\n\u003c4\u003e[ 231.454872] ? __pfx_pci_pm_resume+0x10/0x10\n\u003c4\u003e[ 231.455347] dpm_run_callback+0x5f/0x160\n\u003c4\u003e[ 231.455796] ? dpm_wait_for_superior+0x107/0x170\n\u003c4\u003e[ 231.456244] device_resume+0x177/0x270\n\u003c4\u003e[ 231.456708] dpm_resume+0x209/0x2f0\n\u003c4\u003e[ 231.457151] dpm_resume_end+0x15/0x30\n\u003c4\u003e[ 231.457596] suspend_devices_and_enter+0x1da/0x2b0\n\u003c4\u003e[ 231.458054] enter_state+0x10e/0x570\n\nAdd defensive checks for both the ring pointer and its q_vector\nbefore dereferencing, allowing the system to resume successfully even when\nq_vectors are unmapped.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_7_34-rt-1-150700.1.3.1.x86_64",
"SUSE Real Time Module 15 SP7:cluster-md-kmp-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:dlm-kmp-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:gfs2-kmp-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-devel-rt-6.4.0-150700.7.34.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-rt-devel-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-source-rt-6.4.0-150700.7.34.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-syms-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:ocfs2-kmp-rt-6.4.0-150700.7.34.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2026-23166",
"url": "https://www.suse.com/security/cve/CVE-2026-23166"
},
{
"category": "external",
"summary": "SUSE Bug 1258272 for CVE-2026-23166",
"url": "https://bugzilla.suse.com/1258272"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_7_34-rt-1-150700.1.3.1.x86_64",
"SUSE Real Time Module 15 SP7:cluster-md-kmp-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:dlm-kmp-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:gfs2-kmp-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-devel-rt-6.4.0-150700.7.34.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-rt-devel-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-source-rt-6.4.0-150700.7.34.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-syms-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:ocfs2-kmp-rt-6.4.0-150700.7.34.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_7_34-rt-1-150700.1.3.1.x86_64",
"SUSE Real Time Module 15 SP7:cluster-md-kmp-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:dlm-kmp-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:gfs2-kmp-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-devel-rt-6.4.0-150700.7.34.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-rt-devel-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-source-rt-6.4.0-150700.7.34.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-syms-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:ocfs2-kmp-rt-6.4.0-150700.7.34.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-03-23T09:09:02Z",
"details": "moderate"
}
],
"title": "CVE-2026-23166"
},
{
"cve": "CVE-2026-23167",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2026-23167"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nnfc: nci: Fix race between rfkill and nci_unregister_device().\n\nsyzbot reported the splat below [0] without a repro.\n\nIt indicates that struct nci_dev.cmd_wq had been destroyed before\nnci_close_device() was called via rfkill.\n\nnci_dev.cmd_wq is only destroyed in nci_unregister_device(), which\n(I think) was called from virtual_ncidev_close() when syzbot close()d\nan fd of virtual_ncidev.\n\nThe problem is that nci_unregister_device() destroys nci_dev.cmd_wq\nfirst and then calls nfc_unregister_device(), which removes the\ndevice from rfkill by rfkill_unregister().\n\nSo, the device is still visible via rfkill even after nci_dev.cmd_wq\nis destroyed.\n\nLet\u0027s unregister the device from rfkill first in nci_unregister_device().\n\nNote that we cannot call nfc_unregister_device() before\nnci_close_device() because\n\n 1) nfc_unregister_device() calls device_del() which frees\n all memory allocated by devm_kzalloc() and linked to\n ndev-\u003econn_info_list\n\n 2) nci_rx_work() could try to queue nci_conn_info to\n ndev-\u003econn_info_list which could be leaked\n\nThus, nfc_unregister_device() is split into two functions so we\ncan remove rfkill interfaces only before nci_close_device().\n\n[0]:\nDEBUG_LOCKS_WARN_ON(1)\nWARNING: kernel/locking/lockdep.c:238 at hlock_class kernel/locking/lockdep.c:238 [inline], CPU#0: syz.0.8675/6349\nWARNING: kernel/locking/lockdep.c:238 at check_wait_context kernel/locking/lockdep.c:4854 [inline], CPU#0: syz.0.8675/6349\nWARNING: kernel/locking/lockdep.c:238 at __lock_acquire+0x39d/0x2cf0 kernel/locking/lockdep.c:5187, CPU#0: syz.0.8675/6349\nModules linked in:\nCPU: 0 UID: 0 PID: 6349 Comm: syz.0.8675 Not tainted syzkaller #0 PREEMPT(full)\nHardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/13/2026\nRIP: 0010:hlock_class kernel/locking/lockdep.c:238 [inline]\nRIP: 0010:check_wait_context kernel/locking/lockdep.c:4854 [inline]\nRIP: 0010:__lock_acquire+0x3a4/0x2cf0 kernel/locking/lockdep.c:5187\nCode: 18 00 4c 8b 74 24 08 75 27 90 e8 17 f2 fc 02 85 c0 74 1c 83 3d 50 e0 4e 0e 00 75 13 48 8d 3d 43 f7 51 0e 48 c7 c6 8b 3a de 8d \u003c67\u003e 48 0f b9 3a 90 31 c0 0f b6 98 c4 00 00 00 41 8b 45 20 25 ff 1f\nRSP: 0018:ffffc9000c767680 EFLAGS: 00010046\nRAX: 0000000000000001 RBX: 0000000000040000 RCX: 0000000000080000\nRDX: ffffc90013080000 RSI: ffffffff8dde3a8b RDI: ffffffff8ff24ca0\nRBP: 0000000000000003 R08: ffffffff8fef35a3 R09: 1ffffffff1fde6b4\nR10: dffffc0000000000 R11: fffffbfff1fde6b5 R12: 00000000000012a2\nR13: ffff888030338ba8 R14: ffff888030338000 R15: ffff888030338b30\nFS: 00007fa5995f66c0(0000) GS:ffff8881256f8000(0000) knlGS:0000000000000000\nCS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033\nCR2: 00007f7e72f842d0 CR3: 00000000485a0000 CR4: 00000000003526f0\nCall Trace:\n \u003cTASK\u003e\n lock_acquire+0x106/0x330 kernel/locking/lockdep.c:5868\n touch_wq_lockdep_map+0xcb/0x180 kernel/workqueue.c:3940\n __flush_workqueue+0x14b/0x14f0 kernel/workqueue.c:3982\n nci_close_device+0x302/0x630 net/nfc/nci/core.c:567\n nci_dev_down+0x3b/0x50 net/nfc/nci/core.c:639\n nfc_dev_down+0x152/0x290 net/nfc/core.c:161\n nfc_rfkill_set_block+0x2d/0x100 net/nfc/core.c:179\n rfkill_set_block+0x1d2/0x440 net/rfkill/core.c:346\n rfkill_fop_write+0x461/0x5a0 net/rfkill/core.c:1301\n vfs_write+0x29a/0xb90 fs/read_write.c:684\n ksys_write+0x150/0x270 fs/read_write.c:738\n do_syscall_x64 arch/x86/entry/syscall_64.c:63 [inline]\n do_syscall_64+0xe2/0xf80 arch/x86/entry/syscall_64.c:94\n entry_SYSCALL_64_after_hwframe+0x77/0x7f\nRIP: 0033:0x7fa59b39acb9\nCode: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 \u003c48\u003e 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48\nRSP: 002b:00007fa5995f6028 EFLAGS: 00000246 ORIG_RAX: 0000000000000001\nRAX: ffffffffffffffda RBX: 00007fa59b615fa0 RCX: 00007fa59b39acb9\nRDX: 0000000000000008 RSI: 0000200000000080 RDI: 0000000000000007\nRBP: 00007fa59b408bf7 R08: \n---truncated---",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_7_34-rt-1-150700.1.3.1.x86_64",
"SUSE Real Time Module 15 SP7:cluster-md-kmp-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:dlm-kmp-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:gfs2-kmp-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-devel-rt-6.4.0-150700.7.34.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-rt-devel-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-source-rt-6.4.0-150700.7.34.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-syms-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:ocfs2-kmp-rt-6.4.0-150700.7.34.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2026-23167",
"url": "https://www.suse.com/security/cve/CVE-2026-23167"
},
{
"category": "external",
"summary": "SUSE Bug 1258374 for CVE-2026-23167",
"url": "https://bugzilla.suse.com/1258374"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_7_34-rt-1-150700.1.3.1.x86_64",
"SUSE Real Time Module 15 SP7:cluster-md-kmp-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:dlm-kmp-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:gfs2-kmp-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-devel-rt-6.4.0-150700.7.34.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-rt-devel-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-source-rt-6.4.0-150700.7.34.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-syms-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:ocfs2-kmp-rt-6.4.0-150700.7.34.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_7_34-rt-1-150700.1.3.1.x86_64",
"SUSE Real Time Module 15 SP7:cluster-md-kmp-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:dlm-kmp-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:gfs2-kmp-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-devel-rt-6.4.0-150700.7.34.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-rt-devel-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-source-rt-6.4.0-150700.7.34.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-syms-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:ocfs2-kmp-rt-6.4.0-150700.7.34.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-03-23T09:09:02Z",
"details": "moderate"
}
],
"title": "CVE-2026-23167"
},
{
"cve": "CVE-2026-23169",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2026-23169"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nmptcp: fix race in mptcp_pm_nl_flush_addrs_doit()\n\nsyzbot and Eulgyu Kim reported crashes in mptcp_pm_nl_get_local_id()\nand/or mptcp_pm_nl_is_backup()\n\nRoot cause is list_splice_init() in mptcp_pm_nl_flush_addrs_doit()\nwhich is not RCU ready.\n\nlist_splice_init_rcu() can not be called here while holding pernet-\u003elock\nspinlock.\n\nMany thanks to Eulgyu Kim for providing a repro and testing our patches.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_7_34-rt-1-150700.1.3.1.x86_64",
"SUSE Real Time Module 15 SP7:cluster-md-kmp-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:dlm-kmp-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:gfs2-kmp-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-devel-rt-6.4.0-150700.7.34.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-rt-devel-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-source-rt-6.4.0-150700.7.34.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-syms-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:ocfs2-kmp-rt-6.4.0-150700.7.34.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2026-23169",
"url": "https://www.suse.com/security/cve/CVE-2026-23169"
},
{
"category": "external",
"summary": "SUSE Bug 1258389 for CVE-2026-23169",
"url": "https://bugzilla.suse.com/1258389"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_7_34-rt-1-150700.1.3.1.x86_64",
"SUSE Real Time Module 15 SP7:cluster-md-kmp-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:dlm-kmp-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:gfs2-kmp-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-devel-rt-6.4.0-150700.7.34.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-rt-devel-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-source-rt-6.4.0-150700.7.34.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-syms-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:ocfs2-kmp-rt-6.4.0-150700.7.34.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.6,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_7_34-rt-1-150700.1.3.1.x86_64",
"SUSE Real Time Module 15 SP7:cluster-md-kmp-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:dlm-kmp-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:gfs2-kmp-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-devel-rt-6.4.0-150700.7.34.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-rt-devel-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-source-rt-6.4.0-150700.7.34.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-syms-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:ocfs2-kmp-rt-6.4.0-150700.7.34.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-03-23T09:09:02Z",
"details": "moderate"
}
],
"title": "CVE-2026-23169"
},
{
"cve": "CVE-2026-23170",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2026-23170"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\ndrm/imx/tve: fix probe device leak\n\nMake sure to drop the reference taken to the DDC device during probe on\nprobe failure (e.g. probe deferral) and on driver unbind.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_7_34-rt-1-150700.1.3.1.x86_64",
"SUSE Real Time Module 15 SP7:cluster-md-kmp-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:dlm-kmp-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:gfs2-kmp-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-devel-rt-6.4.0-150700.7.34.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-rt-devel-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-source-rt-6.4.0-150700.7.34.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-syms-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:ocfs2-kmp-rt-6.4.0-150700.7.34.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2026-23170",
"url": "https://www.suse.com/security/cve/CVE-2026-23170"
},
{
"category": "external",
"summary": "SUSE Bug 1258379 for CVE-2026-23170",
"url": "https://bugzilla.suse.com/1258379"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_7_34-rt-1-150700.1.3.1.x86_64",
"SUSE Real Time Module 15 SP7:cluster-md-kmp-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:dlm-kmp-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:gfs2-kmp-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-devel-rt-6.4.0-150700.7.34.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-rt-devel-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-source-rt-6.4.0-150700.7.34.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-syms-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:ocfs2-kmp-rt-6.4.0-150700.7.34.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_7_34-rt-1-150700.1.3.1.x86_64",
"SUSE Real Time Module 15 SP7:cluster-md-kmp-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:dlm-kmp-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:gfs2-kmp-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-devel-rt-6.4.0-150700.7.34.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-rt-devel-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-source-rt-6.4.0-150700.7.34.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-syms-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:ocfs2-kmp-rt-6.4.0-150700.7.34.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-03-23T09:09:02Z",
"details": "moderate"
}
],
"title": "CVE-2026-23170"
},
{
"cve": "CVE-2026-23171",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2026-23171"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nbonding: fix use-after-free due to enslave fail after slave array update\n\nFix a use-after-free which happens due to enslave failure after the new\nslave has been added to the array. Since the new slave can be used for Tx\nimmediately, we can use it after it has been freed by the enslave error\ncleanup path which frees the allocated slave memory. Slave update array is\nsupposed to be called last when further enslave failures are not expected.\nMove it after xdp setup to avoid any problems.\n\nIt is very easy to reproduce the problem with a simple xdp_pass prog:\n ip l add bond1 type bond mode balance-xor\n ip l set bond1 up\n ip l set dev bond1 xdp object xdp_pass.o sec xdp_pass\n ip l add dumdum type dummy\n\nThen run in parallel:\n while :; do ip l set dumdum master bond1 1\u003e/dev/null 2\u003e\u00261; done;\n mausezahn bond1 -a own -b rand -A rand -B 1.1.1.1 -c 0 -t tcp \"dp=1-1023, flags=syn\"\n\nThe crash happens almost immediately:\n [ 605.602850] Oops: general protection fault, probably for non-canonical address 0xe0e6fc2460000137: 0000 [#1] SMP KASAN NOPTI\n [ 605.602916] KASAN: maybe wild-memory-access in range [0x07380123000009b8-0x07380123000009bf]\n [ 605.602946] CPU: 0 UID: 0 PID: 2445 Comm: mausezahn Kdump: loaded Tainted: G B 6.19.0-rc6+ #21 PREEMPT(voluntary)\n [ 605.602979] Tainted: [B]=BAD_PAGE\n [ 605.602998] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014\n [ 605.603032] RIP: 0010:netdev_core_pick_tx+0xcd/0x210\n [ 605.603063] Code: 48 89 fa 48 c1 ea 03 80 3c 02 00 0f 85 3e 01 00 00 48 b8 00 00 00 00 00 fc ff df 4c 8b 6b 08 49 8d 7d 30 48 89 fa 48 c1 ea 03 \u003c80\u003e 3c 02 00 0f 85 25 01 00 00 49 8b 45 30 4c 89 e2 48 89 ee 48 89\n [ 605.603111] RSP: 0018:ffff88817b9af348 EFLAGS: 00010213\n [ 605.603145] RAX: dffffc0000000000 RBX: ffff88817d28b420 RCX: 0000000000000000\n [ 605.603172] RDX: 00e7002460000137 RSI: 0000000000000008 RDI: 07380123000009be\n [ 605.603199] RBP: ffff88817b541a00 R08: 0000000000000001 R09: fffffbfff3ed8c0c\n [ 605.603226] R10: ffffffff9f6c6067 R11: 0000000000000001 R12: 0000000000000000\n [ 605.603253] R13: 073801230000098e R14: ffff88817d28b448 R15: ffff88817b541a84\n [ 605.603286] FS: 00007f6570ef67c0(0000) GS:ffff888221dfa000(0000) knlGS:0000000000000000\n [ 605.603319] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033\n [ 605.603343] CR2: 00007f65712fae40 CR3: 000000011371b000 CR4: 0000000000350ef0\n [ 605.603373] Call Trace:\n [ 605.603392] \u003cTASK\u003e\n [ 605.603410] __dev_queue_xmit+0x448/0x32a0\n [ 605.603434] ? __pfx_vprintk_emit+0x10/0x10\n [ 605.603461] ? __pfx_vprintk_emit+0x10/0x10\n [ 605.603484] ? __pfx___dev_queue_xmit+0x10/0x10\n [ 605.603507] ? bond_start_xmit+0xbfb/0xc20 [bonding]\n [ 605.603546] ? _printk+0xcb/0x100\n [ 605.603566] ? __pfx__printk+0x10/0x10\n [ 605.603589] ? bond_start_xmit+0xbfb/0xc20 [bonding]\n [ 605.603627] ? add_taint+0x5e/0x70\n [ 605.603648] ? add_taint+0x2a/0x70\n [ 605.603670] ? end_report.cold+0x51/0x75\n [ 605.603693] ? bond_start_xmit+0xbfb/0xc20 [bonding]\n [ 605.603731] bond_start_xmit+0x623/0xc20 [bonding]",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_7_34-rt-1-150700.1.3.1.x86_64",
"SUSE Real Time Module 15 SP7:cluster-md-kmp-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:dlm-kmp-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:gfs2-kmp-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-devel-rt-6.4.0-150700.7.34.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-rt-devel-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-source-rt-6.4.0-150700.7.34.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-syms-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:ocfs2-kmp-rt-6.4.0-150700.7.34.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2026-23171",
"url": "https://www.suse.com/security/cve/CVE-2026-23171"
},
{
"category": "external",
"summary": "SUSE Bug 1258349 for CVE-2026-23171",
"url": "https://bugzilla.suse.com/1258349"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_7_34-rt-1-150700.1.3.1.x86_64",
"SUSE Real Time Module 15 SP7:cluster-md-kmp-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:dlm-kmp-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:gfs2-kmp-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-devel-rt-6.4.0-150700.7.34.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-rt-devel-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-source-rt-6.4.0-150700.7.34.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-syms-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:ocfs2-kmp-rt-6.4.0-150700.7.34.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_7_34-rt-1-150700.1.3.1.x86_64",
"SUSE Real Time Module 15 SP7:cluster-md-kmp-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:dlm-kmp-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:gfs2-kmp-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-devel-rt-6.4.0-150700.7.34.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-rt-devel-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-source-rt-6.4.0-150700.7.34.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-syms-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:ocfs2-kmp-rt-6.4.0-150700.7.34.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-03-23T09:09:02Z",
"details": "moderate"
}
],
"title": "CVE-2026-23171"
},
{
"cve": "CVE-2026-23172",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2026-23172"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nnet: wwan: t7xx: fix potential skb-\u003efrags overflow in RX path\n\nWhen receiving data in the DPMAIF RX path,\nthe t7xx_dpmaif_set_frag_to_skb() function adds\npage fragments to an skb without checking if the number of\nfragments has exceeded MAX_SKB_FRAGS. This could lead to a buffer overflow\nin skb_shinfo(skb)-\u003efrags[] array, corrupting adjacent memory and\npotentially causing kernel crashes or other undefined behavior.\n\nThis issue was identified through static code analysis by comparing with a\nsimilar vulnerability fixed in the mt76 driver commit b102f0c522cf (\"mt76:\nfix array overflow on receiving too many fragments for a packet\").\n\nThe vulnerability could be triggered if the modem firmware sends packets\nwith excessive fragments. While under normal protocol conditions (MTU 3080\nbytes, BAT buffer 3584 bytes),\na single packet should not require additional\nfragments, the kernel should not blindly trust firmware behavior.\nMalicious, buggy, or compromised firmware could potentially craft packets\nwith more fragments than the kernel expects.\n\nFix this by adding a bounds check before calling skb_add_rx_frag() to\nensure nr_frags does not exceed MAX_SKB_FRAGS.\n\nThe check must be performed before unmapping to avoid a page leak\nand double DMA unmap during device teardown.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_7_34-rt-1-150700.1.3.1.x86_64",
"SUSE Real Time Module 15 SP7:cluster-md-kmp-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:dlm-kmp-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:gfs2-kmp-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-devel-rt-6.4.0-150700.7.34.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-rt-devel-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-source-rt-6.4.0-150700.7.34.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-syms-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:ocfs2-kmp-rt-6.4.0-150700.7.34.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2026-23172",
"url": "https://www.suse.com/security/cve/CVE-2026-23172"
},
{
"category": "external",
"summary": "SUSE Bug 1258519 for CVE-2026-23172",
"url": "https://bugzilla.suse.com/1258519"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_7_34-rt-1-150700.1.3.1.x86_64",
"SUSE Real Time Module 15 SP7:cluster-md-kmp-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:dlm-kmp-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:gfs2-kmp-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-devel-rt-6.4.0-150700.7.34.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-rt-devel-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-source-rt-6.4.0-150700.7.34.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-syms-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:ocfs2-kmp-rt-6.4.0-150700.7.34.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_7_34-rt-1-150700.1.3.1.x86_64",
"SUSE Real Time Module 15 SP7:cluster-md-kmp-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:dlm-kmp-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:gfs2-kmp-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-devel-rt-6.4.0-150700.7.34.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-rt-devel-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-source-rt-6.4.0-150700.7.34.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-syms-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:ocfs2-kmp-rt-6.4.0-150700.7.34.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-03-23T09:09:02Z",
"details": "moderate"
}
],
"title": "CVE-2026-23172"
},
{
"cve": "CVE-2026-23173",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2026-23173"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nnet/mlx5e: TC, delete flows only for existing peers\n\nWhen deleting TC steering flows, iterate only over actual devcom\npeers instead of assuming all possible ports exist. This avoids\ntouching non-existent peers and ensures cleanup is limited to\ndevices the driver is currently connected to.\n\n BUG: kernel NULL pointer dereference, address: 0000000000000008\n #PF: supervisor write access in kernel mode\n #PF: error_code(0x0002) - not-present page\n PGD 133c8a067 P4D 0\n Oops: Oops: 0002 [#1] SMP\n CPU: 19 UID: 0 PID: 2169 Comm: tc Not tainted 6.18.0+ #156 NONE\n Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS rel-1.16.0-0-gd239552ce722-prebuilt.qemu.org 04/01/2014\n RIP: 0010:mlx5e_tc_del_fdb_peers_flow+0xbe/0x200 [mlx5_core]\n Code: 00 00 a8 08 74 a8 49 8b 46 18 f6 c4 02 74 9f 4c 8d bf a0 12 00 00 4c 89 ff e8 0e e7 96 e1 49 8b 44 24 08 49 8b 0c 24 4c 89 ff \u003c48\u003e 89 41 08 48 89 08 49 89 2c 24 49 89 5c 24 08 e8 7d ce 96 e1 49\n RSP: 0018:ff11000143867528 EFLAGS: 00010246\n RAX: 0000000000000000 RBX: dead000000000122 RCX: 0000000000000000\n RDX: ff11000143691580 RSI: ff110001026e5000 RDI: ff11000106f3d2a0\n RBP: dead000000000100 R08: 00000000000003fd R09: 0000000000000002\n R10: ff11000101c75690 R11: ff1100085faea178 R12: ff11000115f0ae78\n R13: 0000000000000000 R14: ff11000115f0a800 R15: ff11000106f3d2a0\n FS: 00007f35236bf740(0000) GS:ff110008dc809000(0000) knlGS:0000000000000000\n CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033\n CR2: 0000000000000008 CR3: 0000000157a01001 CR4: 0000000000373eb0\n Call Trace:\n \u003cTASK\u003e\n mlx5e_tc_del_flow+0x46/0x270 [mlx5_core]\n mlx5e_flow_put+0x25/0x50 [mlx5_core]\n mlx5e_delete_flower+0x2a6/0x3e0 [mlx5_core]\n tc_setup_cb_reoffload+0x20/0x80\n fl_reoffload+0x26f/0x2f0 [cls_flower]\n ? mlx5e_tc_reoffload_flows_work+0xc0/0xc0 [mlx5_core]\n ? mlx5e_tc_reoffload_flows_work+0xc0/0xc0 [mlx5_core]\n tcf_block_playback_offloads+0x9e/0x1c0\n tcf_block_unbind+0x7b/0xd0\n tcf_block_setup+0x186/0x1d0\n tcf_block_offload_cmd.isra.0+0xef/0x130\n tcf_block_offload_unbind+0x43/0x70\n __tcf_block_put+0x85/0x160\n ingress_destroy+0x32/0x110 [sch_ingress]\n __qdisc_destroy+0x44/0x100\n qdisc_graft+0x22b/0x610\n tc_get_qdisc+0x183/0x4d0\n rtnetlink_rcv_msg+0x2d7/0x3d0\n ? rtnl_calcit.isra.0+0x100/0x100\n netlink_rcv_skb+0x53/0x100\n netlink_unicast+0x249/0x320\n ? __alloc_skb+0x102/0x1f0\n netlink_sendmsg+0x1e3/0x420\n __sock_sendmsg+0x38/0x60\n ____sys_sendmsg+0x1ef/0x230\n ? copy_msghdr_from_user+0x6c/0xa0\n ___sys_sendmsg+0x7f/0xc0\n ? ___sys_recvmsg+0x8a/0xc0\n ? __sys_sendto+0x119/0x180\n __sys_sendmsg+0x61/0xb0\n do_syscall_64+0x55/0x640\n entry_SYSCALL_64_after_hwframe+0x4b/0x53\n RIP: 0033:0x7f35238bb764\n Code: 15 b9 86 0c 00 f7 d8 64 89 02 b8 ff ff ff ff eb bf 0f 1f 44 00 00 f3 0f 1e fa 80 3d e5 08 0d 00 00 74 13 b8 2e 00 00 00 0f 05 \u003c48\u003e 3d 00 f0 ff ff 77 4c c3 0f 1f 00 55 48 89 e5 48 83 ec 20 89 55\n RSP: 002b:00007ffed4c35638 EFLAGS: 00000202 ORIG_RAX: 000000000000002e\n RAX: ffffffffffffffda RBX: 000055a2efcc75e0 RCX: 00007f35238bb764\n RDX: 0000000000000000 RSI: 00007ffed4c356a0 RDI: 0000000000000003\n RBP: 00007ffed4c35710 R08: 0000000000000010 R09: 00007f3523984b20\n R10: 0000000000000004 R11: 0000000000000202 R12: 00007ffed4c35790\n R13: 000000006947df8f R14: 000055a2efcc75e0 R15: 00007ffed4c35780",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_7_34-rt-1-150700.1.3.1.x86_64",
"SUSE Real Time Module 15 SP7:cluster-md-kmp-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:dlm-kmp-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:gfs2-kmp-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-devel-rt-6.4.0-150700.7.34.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-rt-devel-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-source-rt-6.4.0-150700.7.34.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-syms-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:ocfs2-kmp-rt-6.4.0-150700.7.34.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2026-23173",
"url": "https://www.suse.com/security/cve/CVE-2026-23173"
},
{
"category": "external",
"summary": "SUSE Bug 1258520 for CVE-2026-23173",
"url": "https://bugzilla.suse.com/1258520"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_7_34-rt-1-150700.1.3.1.x86_64",
"SUSE Real Time Module 15 SP7:cluster-md-kmp-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:dlm-kmp-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:gfs2-kmp-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-devel-rt-6.4.0-150700.7.34.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-rt-devel-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-source-rt-6.4.0-150700.7.34.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-syms-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:ocfs2-kmp-rt-6.4.0-150700.7.34.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_7_34-rt-1-150700.1.3.1.x86_64",
"SUSE Real Time Module 15 SP7:cluster-md-kmp-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:dlm-kmp-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:gfs2-kmp-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-devel-rt-6.4.0-150700.7.34.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-rt-devel-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-source-rt-6.4.0-150700.7.34.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-syms-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:ocfs2-kmp-rt-6.4.0-150700.7.34.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-03-23T09:09:02Z",
"details": "moderate"
}
],
"title": "CVE-2026-23173"
},
{
"cve": "CVE-2026-23176",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2026-23176"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nplatform/x86: toshiba_haps: Fix memory leaks in add/remove routines\n\ntoshiba_haps_add() leaks the haps object allocated by it if it returns\nan error after allocating that object successfully.\n\ntoshiba_haps_remove() does not free the object pointed to by\ntoshiba_haps before clearing that pointer, so it becomes unreachable\nallocated memory.\n\nAddress these memory leaks by using devm_kzalloc() for allocating\nthe memory in question.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_7_34-rt-1-150700.1.3.1.x86_64",
"SUSE Real Time Module 15 SP7:cluster-md-kmp-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:dlm-kmp-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:gfs2-kmp-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-devel-rt-6.4.0-150700.7.34.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-rt-devel-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-source-rt-6.4.0-150700.7.34.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-syms-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:ocfs2-kmp-rt-6.4.0-150700.7.34.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2026-23176",
"url": "https://www.suse.com/security/cve/CVE-2026-23176"
},
{
"category": "external",
"summary": "SUSE Bug 1258256 for CVE-2026-23176",
"url": "https://bugzilla.suse.com/1258256"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_7_34-rt-1-150700.1.3.1.x86_64",
"SUSE Real Time Module 15 SP7:cluster-md-kmp-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:dlm-kmp-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:gfs2-kmp-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-devel-rt-6.4.0-150700.7.34.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-rt-devel-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-source-rt-6.4.0-150700.7.34.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-syms-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:ocfs2-kmp-rt-6.4.0-150700.7.34.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_7_34-rt-1-150700.1.3.1.x86_64",
"SUSE Real Time Module 15 SP7:cluster-md-kmp-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:dlm-kmp-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:gfs2-kmp-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-devel-rt-6.4.0-150700.7.34.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-rt-devel-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-source-rt-6.4.0-150700.7.34.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-syms-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:ocfs2-kmp-rt-6.4.0-150700.7.34.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-03-23T09:09:02Z",
"details": "moderate"
}
],
"title": "CVE-2026-23176"
},
{
"cve": "CVE-2026-23178",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2026-23178"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nHID: i2c-hid: fix potential buffer overflow in i2c_hid_get_report()\n\n`i2c_hid_xfer` is used to read `recv_len + sizeof(__le16)` bytes of data\ninto `ihid-\u003erawbuf`.\n\nThe former can come from the userspace in the hidraw driver and is only\nbounded by HID_MAX_BUFFER_SIZE(16384) by default (unless we also set\n`max_buffer_size` field of `struct hid_ll_driver` which we do not).\n\nThe latter has size determined at runtime by the maximum size of\ndifferent report types you could receive on any particular device and\ncan be a much smaller value.\n\nFix this by truncating `recv_len` to `ihid-\u003ebufsize - sizeof(__le16)`.\n\nThe impact is low since access to hidraw devices requires root.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_7_34-rt-1-150700.1.3.1.x86_64",
"SUSE Real Time Module 15 SP7:cluster-md-kmp-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:dlm-kmp-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:gfs2-kmp-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-devel-rt-6.4.0-150700.7.34.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-rt-devel-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-source-rt-6.4.0-150700.7.34.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-syms-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:ocfs2-kmp-rt-6.4.0-150700.7.34.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2026-23178",
"url": "https://www.suse.com/security/cve/CVE-2026-23178"
},
{
"category": "external",
"summary": "SUSE Bug 1258358 for CVE-2026-23178",
"url": "https://bugzilla.suse.com/1258358"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_7_34-rt-1-150700.1.3.1.x86_64",
"SUSE Real Time Module 15 SP7:cluster-md-kmp-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:dlm-kmp-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:gfs2-kmp-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-devel-rt-6.4.0-150700.7.34.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-rt-devel-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-source-rt-6.4.0-150700.7.34.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-syms-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:ocfs2-kmp-rt-6.4.0-150700.7.34.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.1,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_7_34-rt-1-150700.1.3.1.x86_64",
"SUSE Real Time Module 15 SP7:cluster-md-kmp-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:dlm-kmp-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:gfs2-kmp-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-devel-rt-6.4.0-150700.7.34.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-rt-devel-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-source-rt-6.4.0-150700.7.34.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-syms-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:ocfs2-kmp-rt-6.4.0-150700.7.34.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-03-23T09:09:02Z",
"details": "moderate"
}
],
"title": "CVE-2026-23178"
},
{
"cve": "CVE-2026-23179",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2026-23179"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nnvmet-tcp: fixup hang in nvmet_tcp_listen_data_ready()\n\nWhen the socket is closed while in TCP_LISTEN a callback is run to\nflush all outstanding packets, which in turns calls\nnvmet_tcp_listen_data_ready() with the sk_callback_lock held.\nSo we need to check if we are in TCP_LISTEN before attempting\nto get the sk_callback_lock() to avoid a deadlock.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_7_34-rt-1-150700.1.3.1.x86_64",
"SUSE Real Time Module 15 SP7:cluster-md-kmp-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:dlm-kmp-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:gfs2-kmp-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-devel-rt-6.4.0-150700.7.34.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-rt-devel-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-source-rt-6.4.0-150700.7.34.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-syms-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:ocfs2-kmp-rt-6.4.0-150700.7.34.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2026-23179",
"url": "https://www.suse.com/security/cve/CVE-2026-23179"
},
{
"category": "external",
"summary": "SUSE Bug 1258394 for CVE-2026-23179",
"url": "https://bugzilla.suse.com/1258394"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_7_34-rt-1-150700.1.3.1.x86_64",
"SUSE Real Time Module 15 SP7:cluster-md-kmp-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:dlm-kmp-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:gfs2-kmp-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-devel-rt-6.4.0-150700.7.34.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-rt-devel-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-source-rt-6.4.0-150700.7.34.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-syms-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:ocfs2-kmp-rt-6.4.0-150700.7.34.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_7_34-rt-1-150700.1.3.1.x86_64",
"SUSE Real Time Module 15 SP7:cluster-md-kmp-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:dlm-kmp-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:gfs2-kmp-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-devel-rt-6.4.0-150700.7.34.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-rt-devel-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-source-rt-6.4.0-150700.7.34.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-syms-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:ocfs2-kmp-rt-6.4.0-150700.7.34.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-03-23T09:09:02Z",
"details": "moderate"
}
],
"title": "CVE-2026-23179"
},
{
"cve": "CVE-2026-23182",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2026-23182"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nspi: tegra: Fix a memory leak in tegra_slink_probe()\n\nIn tegra_slink_probe(), when platform_get_irq() fails, it directly\nreturns from the function with an error code, which causes a memory leak.\n\nReplace it with a goto label to ensure proper cleanup.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_7_34-rt-1-150700.1.3.1.x86_64",
"SUSE Real Time Module 15 SP7:cluster-md-kmp-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:dlm-kmp-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:gfs2-kmp-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-devel-rt-6.4.0-150700.7.34.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-rt-devel-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-source-rt-6.4.0-150700.7.34.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-syms-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:ocfs2-kmp-rt-6.4.0-150700.7.34.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2026-23182",
"url": "https://www.suse.com/security/cve/CVE-2026-23182"
},
{
"category": "external",
"summary": "SUSE Bug 1258259 for CVE-2026-23182",
"url": "https://bugzilla.suse.com/1258259"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_7_34-rt-1-150700.1.3.1.x86_64",
"SUSE Real Time Module 15 SP7:cluster-md-kmp-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:dlm-kmp-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:gfs2-kmp-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-devel-rt-6.4.0-150700.7.34.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-rt-devel-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-source-rt-6.4.0-150700.7.34.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-syms-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:ocfs2-kmp-rt-6.4.0-150700.7.34.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_7_34-rt-1-150700.1.3.1.x86_64",
"SUSE Real Time Module 15 SP7:cluster-md-kmp-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:dlm-kmp-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:gfs2-kmp-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-devel-rt-6.4.0-150700.7.34.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-rt-devel-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-source-rt-6.4.0-150700.7.34.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-syms-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:ocfs2-kmp-rt-6.4.0-150700.7.34.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-03-23T09:09:02Z",
"details": "moderate"
}
],
"title": "CVE-2026-23182"
},
{
"cve": "CVE-2026-23190",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2026-23190"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nASoC: amd: fix memory leak in acp3x pdm dma ops",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_7_34-rt-1-150700.1.3.1.x86_64",
"SUSE Real Time Module 15 SP7:cluster-md-kmp-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:dlm-kmp-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:gfs2-kmp-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-devel-rt-6.4.0-150700.7.34.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-rt-devel-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-source-rt-6.4.0-150700.7.34.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-syms-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:ocfs2-kmp-rt-6.4.0-150700.7.34.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2026-23190",
"url": "https://www.suse.com/security/cve/CVE-2026-23190"
},
{
"category": "external",
"summary": "SUSE Bug 1258397 for CVE-2026-23190",
"url": "https://bugzilla.suse.com/1258397"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_7_34-rt-1-150700.1.3.1.x86_64",
"SUSE Real Time Module 15 SP7:cluster-md-kmp-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:dlm-kmp-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:gfs2-kmp-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-devel-rt-6.4.0-150700.7.34.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-rt-devel-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-source-rt-6.4.0-150700.7.34.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-syms-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:ocfs2-kmp-rt-6.4.0-150700.7.34.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_7_34-rt-1-150700.1.3.1.x86_64",
"SUSE Real Time Module 15 SP7:cluster-md-kmp-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:dlm-kmp-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:gfs2-kmp-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-devel-rt-6.4.0-150700.7.34.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-rt-devel-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-source-rt-6.4.0-150700.7.34.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-syms-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:ocfs2-kmp-rt-6.4.0-150700.7.34.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-03-23T09:09:02Z",
"details": "moderate"
}
],
"title": "CVE-2026-23190"
},
{
"cve": "CVE-2026-23191",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2026-23191"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nALSA: aloop: Fix racy access at PCM trigger\n\nThe PCM trigger callback of aloop driver tries to check the PCM state\nand stop the stream of the tied substream in the corresponding cable.\nSince both check and stop operations are performed outside the cable\nlock, this may result in UAF when a program attempts to trigger\nfrequently while opening/closing the tied stream, as spotted by\nfuzzers.\n\nFor addressing the UAF, this patch changes two things:\n- It covers the most of code in loopback_check_format() with\n cable-\u003elock spinlock, and add the proper NULL checks. This avoids\n already some racy accesses.\n- In addition, now we try to check the state of the capture PCM stream\n that may be stopped in this function, which was the major pain point\n leading to UAF.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_7_34-rt-1-150700.1.3.1.x86_64",
"SUSE Real Time Module 15 SP7:cluster-md-kmp-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:dlm-kmp-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:gfs2-kmp-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-devel-rt-6.4.0-150700.7.34.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-rt-devel-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-source-rt-6.4.0-150700.7.34.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-syms-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:ocfs2-kmp-rt-6.4.0-150700.7.34.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2026-23191",
"url": "https://www.suse.com/security/cve/CVE-2026-23191"
},
{
"category": "external",
"summary": "SUSE Bug 1258395 for CVE-2026-23191",
"url": "https://bugzilla.suse.com/1258395"
},
{
"category": "external",
"summary": "SUSE Bug 1258396 for CVE-2026-23191",
"url": "https://bugzilla.suse.com/1258396"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_7_34-rt-1-150700.1.3.1.x86_64",
"SUSE Real Time Module 15 SP7:cluster-md-kmp-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:dlm-kmp-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:gfs2-kmp-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-devel-rt-6.4.0-150700.7.34.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-rt-devel-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-source-rt-6.4.0-150700.7.34.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-syms-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:ocfs2-kmp-rt-6.4.0-150700.7.34.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.1,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_7_34-rt-1-150700.1.3.1.x86_64",
"SUSE Real Time Module 15 SP7:cluster-md-kmp-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:dlm-kmp-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:gfs2-kmp-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-devel-rt-6.4.0-150700.7.34.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-rt-devel-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-source-rt-6.4.0-150700.7.34.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-syms-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:ocfs2-kmp-rt-6.4.0-150700.7.34.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-03-23T09:09:02Z",
"details": "important"
}
],
"title": "CVE-2026-23191"
},
{
"cve": "CVE-2026-23198",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2026-23198"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nKVM: Don\u0027t clobber irqfd routing type when deassigning irqfd\n\nWhen deassigning a KVM_IRQFD, don\u0027t clobber the irqfd\u0027s copy of the IRQ\u0027s\nrouting entry as doing so breaks kvm_arch_irq_bypass_del_producer() on x86\nand arm64, which explicitly look for KVM_IRQ_ROUTING_MSI. Instead, to\nhandle a concurrent routing update, verify that the irqfd is still active\nbefore consuming the routing information. As evidenced by the x86 and\narm64 bugs, and another bug in kvm_arch_update_irqfd_routing() (see below),\nclobbering the entry type without notifying arch code is surprising and\nerror prone.\n\nAs a bonus, checking that the irqfd is active provides a convenient\nlocation for documenting _why_ KVM must not consume the routing entry for\nan irqfd that is in the process of being deassigned: once the irqfd is\ndeleted from the list (which happens *before* the eventfd is detached), it\nwill no longer receive updates via kvm_irq_routing_update(), and so KVM\ncould deliver an event using stale routing information (relative to\nKVM_SET_GSI_ROUTING returning to userspace).\n\nAs an even better bonus, explicitly checking for the irqfd being active\nfixes a similar bug to the one the clobbering is trying to prevent: if an\nirqfd is deactivated, and then its routing is changed,\nkvm_irq_routing_update() won\u0027t invoke kvm_arch_update_irqfd_routing()\n(because the irqfd isn\u0027t in the list). And so if the irqfd is in bypass\nmode, IRQs will continue to be posted using the old routing information.\n\nAs for kvm_arch_irq_bypass_del_producer(), clobbering the routing type\nresults in KVM incorrectly keeping the IRQ in bypass mode, which is\nespecially problematic on AMD as KVM tracks IRQs that are being posted to\na vCPU in a list whose lifetime is tied to the irqfd.\n\nWithout the help of KASAN to detect use-after-free, the most common\nsympton on AMD is a NULL pointer deref in amd_iommu_update_ga() due to\nthe memory for irqfd structure being re-allocated and zeroed, resulting\nin irqfd-\u003eirq_bypass_data being NULL when read by\navic_update_iommu_vcpu_affinity():\n\n BUG: kernel NULL pointer dereference, address: 0000000000000018\n #PF: supervisor read access in kernel mode\n #PF: error_code(0x0000) - not-present page\n PGD 40cf2b9067 P4D 40cf2b9067 PUD 408362a067 PMD 0\n Oops: Oops: 0000 [#1] SMP\n CPU: 6 UID: 0 PID: 40383 Comm: vfio_irq_test\n Tainted: G U W O 6.19.0-smp--5dddc257e6b2-irqfd #31 NONE\n Tainted: [U]=USER, [W]=WARN, [O]=OOT_MODULE\n Hardware name: Google, Inc. Arcadia_IT_80/Arcadia_IT_80, BIOS 34.78.2-0 09/05/2025\n RIP: 0010:amd_iommu_update_ga+0x19/0xe0\n Call Trace:\n \u003cTASK\u003e\n avic_update_iommu_vcpu_affinity+0x3d/0x90 [kvm_amd]\n __avic_vcpu_load+0xf4/0x130 [kvm_amd]\n kvm_arch_vcpu_load+0x89/0x210 [kvm]\n vcpu_load+0x30/0x40 [kvm]\n kvm_arch_vcpu_ioctl_run+0x45/0x620 [kvm]\n kvm_vcpu_ioctl+0x571/0x6a0 [kvm]\n __se_sys_ioctl+0x6d/0xb0\n do_syscall_64+0x6f/0x9d0\n entry_SYSCALL_64_after_hwframe+0x4b/0x53\n RIP: 0033:0x46893b\n \u003c/TASK\u003e\n ---[ end trace 0000000000000000 ]---\n\nIf AVIC is inhibited when the irfd is deassigned, the bug will manifest as\nlist corruption, e.g. on the next irqfd assignment.\n\n list_add corruption. next-\u003eprev should be prev (ffff8d474d5cd588),\n but was 0000000000000000. (next=ffff8d8658f86530).\n ------------[ cut here ]------------\n kernel BUG at lib/list_debug.c:31!\n Oops: invalid opcode: 0000 [#1] SMP\n CPU: 128 UID: 0 PID: 80818 Comm: vfio_irq_test\n Tainted: G U W O 6.19.0-smp--f19dc4d680ba-irqfd #28 NONE\n Tainted: [U]=USER, [W]=WARN, [O]=OOT_MODULE\n Hardware name: Google, Inc. Arcadia_IT_80/Arcadia_IT_80, BIOS 34.78.2-0 09/05/2025\n RIP: 0010:__list_add_valid_or_report+0x97/0xc0\n Call Trace:\n \u003cTASK\u003e\n avic_pi_update_irte+0x28e/0x2b0 [kvm_amd]\n kvm_pi_update_irte+0xbf/0x190 [kvm]\n kvm_arch_irq_bypass_add_producer+0x72/0x90 [kvm]\n irq_bypass_register_consumer+0xcd/0x170 [irqbypa\n---truncated---",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_7_34-rt-1-150700.1.3.1.x86_64",
"SUSE Real Time Module 15 SP7:cluster-md-kmp-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:dlm-kmp-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:gfs2-kmp-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-devel-rt-6.4.0-150700.7.34.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-rt-devel-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-source-rt-6.4.0-150700.7.34.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-syms-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:ocfs2-kmp-rt-6.4.0-150700.7.34.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2026-23198",
"url": "https://www.suse.com/security/cve/CVE-2026-23198"
},
{
"category": "external",
"summary": "SUSE Bug 1258321 for CVE-2026-23198",
"url": "https://bugzilla.suse.com/1258321"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_7_34-rt-1-150700.1.3.1.x86_64",
"SUSE Real Time Module 15 SP7:cluster-md-kmp-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:dlm-kmp-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:gfs2-kmp-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-devel-rt-6.4.0-150700.7.34.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-rt-devel-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-source-rt-6.4.0-150700.7.34.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-syms-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:ocfs2-kmp-rt-6.4.0-150700.7.34.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.7,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_7_34-rt-1-150700.1.3.1.x86_64",
"SUSE Real Time Module 15 SP7:cluster-md-kmp-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:dlm-kmp-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:gfs2-kmp-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-devel-rt-6.4.0-150700.7.34.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-rt-devel-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-source-rt-6.4.0-150700.7.34.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-syms-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:ocfs2-kmp-rt-6.4.0-150700.7.34.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-03-23T09:09:02Z",
"details": "moderate"
}
],
"title": "CVE-2026-23198"
},
{
"cve": "CVE-2026-23202",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2026-23202"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nspi: tegra210-quad: Protect curr_xfer in tegra_qspi_combined_seq_xfer\n\nThe curr_xfer field is read by the IRQ handler without holding the lock\nto check if a transfer is in progress. When clearing curr_xfer in the\ncombined sequence transfer loop, protect it with the spinlock to prevent\na race with the interrupt handler.\n\nProtect the curr_xfer clearing at the exit path of\ntegra_qspi_combined_seq_xfer() with the spinlock to prevent a race\nwith the interrupt handler that reads this field.\n\nWithout this protection, the IRQ handler could read a partially updated\ncurr_xfer value, leading to NULL pointer dereference or use-after-free.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_7_34-rt-1-150700.1.3.1.x86_64",
"SUSE Real Time Module 15 SP7:cluster-md-kmp-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:dlm-kmp-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:gfs2-kmp-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-devel-rt-6.4.0-150700.7.34.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-rt-devel-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-source-rt-6.4.0-150700.7.34.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-syms-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:ocfs2-kmp-rt-6.4.0-150700.7.34.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2026-23202",
"url": "https://www.suse.com/security/cve/CVE-2026-23202"
},
{
"category": "external",
"summary": "SUSE Bug 1258338 for CVE-2026-23202",
"url": "https://bugzilla.suse.com/1258338"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_7_34-rt-1-150700.1.3.1.x86_64",
"SUSE Real Time Module 15 SP7:cluster-md-kmp-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:dlm-kmp-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:gfs2-kmp-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-devel-rt-6.4.0-150700.7.34.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-rt-devel-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-source-rt-6.4.0-150700.7.34.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-syms-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:ocfs2-kmp-rt-6.4.0-150700.7.34.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_7_34-rt-1-150700.1.3.1.x86_64",
"SUSE Real Time Module 15 SP7:cluster-md-kmp-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:dlm-kmp-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:gfs2-kmp-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-devel-rt-6.4.0-150700.7.34.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-rt-devel-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-source-rt-6.4.0-150700.7.34.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-syms-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:ocfs2-kmp-rt-6.4.0-150700.7.34.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-03-23T09:09:02Z",
"details": "important"
}
],
"title": "CVE-2026-23202"
},
{
"cve": "CVE-2026-23204",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2026-23204"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nnet/sched: cls_u32: use skb_header_pointer_careful()\n\nskb_header_pointer() does not fully validate negative @offset values.\n\nUse skb_header_pointer_careful() instead.\n\nGangMin Kim provided a report and a repro fooling u32_classify():\n\nBUG: KASAN: slab-out-of-bounds in u32_classify+0x1180/0x11b0\nnet/sched/cls_u32.c:221",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_7_34-rt-1-150700.1.3.1.x86_64",
"SUSE Real Time Module 15 SP7:cluster-md-kmp-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:dlm-kmp-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:gfs2-kmp-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-devel-rt-6.4.0-150700.7.34.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-rt-devel-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-source-rt-6.4.0-150700.7.34.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-syms-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:ocfs2-kmp-rt-6.4.0-150700.7.34.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2026-23204",
"url": "https://www.suse.com/security/cve/CVE-2026-23204"
},
{
"category": "external",
"summary": "SUSE Bug 1258340 for CVE-2026-23204",
"url": "https://bugzilla.suse.com/1258340"
},
{
"category": "external",
"summary": "SUSE Bug 1259126 for CVE-2026-23204",
"url": "https://bugzilla.suse.com/1259126"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_7_34-rt-1-150700.1.3.1.x86_64",
"SUSE Real Time Module 15 SP7:cluster-md-kmp-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:dlm-kmp-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:gfs2-kmp-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-devel-rt-6.4.0-150700.7.34.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-rt-devel-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-source-rt-6.4.0-150700.7.34.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-syms-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:ocfs2-kmp-rt-6.4.0-150700.7.34.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_7_34-rt-1-150700.1.3.1.x86_64",
"SUSE Real Time Module 15 SP7:cluster-md-kmp-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:dlm-kmp-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:gfs2-kmp-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-devel-rt-6.4.0-150700.7.34.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-rt-devel-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-source-rt-6.4.0-150700.7.34.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-syms-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:ocfs2-kmp-rt-6.4.0-150700.7.34.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-03-23T09:09:02Z",
"details": "important"
}
],
"title": "CVE-2026-23204"
},
{
"cve": "CVE-2026-23207",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2026-23207"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nspi: tegra210-quad: Protect curr_xfer check in IRQ handler\n\nNow that all other accesses to curr_xfer are done under the lock,\nprotect the curr_xfer NULL check in tegra_qspi_isr_thread() with the\nspinlock. Without this protection, the following race can occur:\n\n CPU0 (ISR thread) CPU1 (timeout path)\n ---------------- -------------------\n if (!tqspi-\u003ecurr_xfer)\n // sees non-NULL\n spin_lock()\n tqspi-\u003ecurr_xfer = NULL\n spin_unlock()\n handle_*_xfer()\n spin_lock()\n t = tqspi-\u003ecurr_xfer // NULL!\n ... t-\u003elen ... // NULL dereference!\n\nWith this patch, all curr_xfer accesses are now properly synchronized.\n\nAlthough all accesses to curr_xfer are done under the lock, in\ntegra_qspi_isr_thread() it checks for NULL, releases the lock and\nreacquires it later in handle_cpu_based_xfer()/handle_dma_based_xfer().\nThere is a potential for an update in between, which could cause a NULL\npointer dereference.\n\nTo handle this, add a NULL check inside the handlers after acquiring\nthe lock. This ensures that if the timeout path has already cleared\ncurr_xfer, the handler will safely return without dereferencing the\nNULL pointer.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_7_34-rt-1-150700.1.3.1.x86_64",
"SUSE Real Time Module 15 SP7:cluster-md-kmp-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:dlm-kmp-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:gfs2-kmp-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-devel-rt-6.4.0-150700.7.34.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-rt-devel-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-source-rt-6.4.0-150700.7.34.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-syms-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:ocfs2-kmp-rt-6.4.0-150700.7.34.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2026-23207",
"url": "https://www.suse.com/security/cve/CVE-2026-23207"
},
{
"category": "external",
"summary": "SUSE Bug 1258524 for CVE-2026-23207",
"url": "https://bugzilla.suse.com/1258524"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_7_34-rt-1-150700.1.3.1.x86_64",
"SUSE Real Time Module 15 SP7:cluster-md-kmp-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:dlm-kmp-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:gfs2-kmp-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-devel-rt-6.4.0-150700.7.34.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-rt-devel-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-source-rt-6.4.0-150700.7.34.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-syms-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:ocfs2-kmp-rt-6.4.0-150700.7.34.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.7,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_7_34-rt-1-150700.1.3.1.x86_64",
"SUSE Real Time Module 15 SP7:cluster-md-kmp-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:dlm-kmp-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:gfs2-kmp-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-devel-rt-6.4.0-150700.7.34.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-rt-devel-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-source-rt-6.4.0-150700.7.34.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-syms-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:ocfs2-kmp-rt-6.4.0-150700.7.34.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-03-23T09:09:02Z",
"details": "moderate"
}
],
"title": "CVE-2026-23207"
},
{
"cve": "CVE-2026-23208",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2026-23208"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nALSA: usb-audio: Prevent excessive number of frames\n\nIn this case, the user constructed the parameters with maxpacksize 40\nfor rate 22050 / pps 1000, and packsize[0] 22 packsize[1] 23. The buffer\nsize for each data URB is maxpacksize * packets, which in this example\nis 40 * 6 = 240; When the user performs a write operation to send audio\ndata into the ALSA PCM playback stream, the calculated number of frames\nis packsize[0] * packets = 264, which exceeds the allocated URB buffer\nsize, triggering the out-of-bounds (OOB) issue reported by syzbot [1].\n\nAdded a check for the number of single data URB frames when calculating\nthe number of frames to prevent [1].\n\n[1]\nBUG: KASAN: slab-out-of-bounds in copy_to_urb+0x261/0x460 sound/usb/pcm.c:1487\nWrite of size 264 at addr ffff88804337e800 by task syz.0.17/5506\nCall Trace:\n copy_to_urb+0x261/0x460 sound/usb/pcm.c:1487\n prepare_playback_urb+0x953/0x13d0 sound/usb/pcm.c:1611\n prepare_outbound_urb+0x377/0xc50 sound/usb/endpoint.c:333",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_7_34-rt-1-150700.1.3.1.x86_64",
"SUSE Real Time Module 15 SP7:cluster-md-kmp-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:dlm-kmp-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:gfs2-kmp-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-devel-rt-6.4.0-150700.7.34.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-rt-devel-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-source-rt-6.4.0-150700.7.34.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-syms-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:ocfs2-kmp-rt-6.4.0-150700.7.34.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2026-23208",
"url": "https://www.suse.com/security/cve/CVE-2026-23208"
},
{
"category": "external",
"summary": "SUSE Bug 1258468 for CVE-2026-23208",
"url": "https://bugzilla.suse.com/1258468"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_7_34-rt-1-150700.1.3.1.x86_64",
"SUSE Real Time Module 15 SP7:cluster-md-kmp-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:dlm-kmp-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:gfs2-kmp-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-devel-rt-6.4.0-150700.7.34.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-rt-devel-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-source-rt-6.4.0-150700.7.34.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-syms-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:ocfs2-kmp-rt-6.4.0-150700.7.34.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.8,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_7_34-rt-1-150700.1.3.1.x86_64",
"SUSE Real Time Module 15 SP7:cluster-md-kmp-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:dlm-kmp-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:gfs2-kmp-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-devel-rt-6.4.0-150700.7.34.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-rt-devel-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-source-rt-6.4.0-150700.7.34.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-syms-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:ocfs2-kmp-rt-6.4.0-150700.7.34.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-03-23T09:09:02Z",
"details": "moderate"
}
],
"title": "CVE-2026-23208"
},
{
"cve": "CVE-2026-23209",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2026-23209"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nmacvlan: fix error recovery in macvlan_common_newlink()\n\nvalis provided a nice repro to crash the kernel:\n\nip link add p1 type veth peer p2\nip link set address 00:00:00:00:00:20 dev p1\nip link set up dev p1\nip link set up dev p2\n\nip link add mv0 link p2 type macvlan mode source\nip link add invalid% link p2 type macvlan mode source macaddr add 00:00:00:00:00:20\n\nping -c1 -I p1 1.2.3.4\n\nHe also gave a very detailed analysis:\n\n\u003cquote valis\u003e\n\nThe issue is triggered when a new macvlan link is created with\nMACVLAN_MODE_SOURCE mode and MACVLAN_MACADDR_ADD (or\nMACVLAN_MACADDR_SET) parameter, lower device already has a macvlan\nport and register_netdevice() called from macvlan_common_newlink()\nfails (e.g. because of the invalid link name).\n\nIn this case macvlan_hash_add_source is called from\nmacvlan_change_sources() / macvlan_common_newlink():\n\nThis adds a reference to vlan to the port\u0027s vlan_source_hash using\nmacvlan_source_entry.\n\nvlan is a pointer to the priv data of the link that is being created.\n\nWhen register_netdevice() fails, the error is returned from\nmacvlan_newlink() to rtnl_newlink_create():\n\n if (ops-\u003enewlink)\n err = ops-\u003enewlink(dev, \u0026params, extack);\n else\n err = register_netdevice(dev);\n if (err \u003c 0) {\n free_netdev(dev);\n goto out;\n }\n\nand free_netdev() is called, causing a kvfree() on the struct\nnet_device that is still referenced in the source entry attached to\nthe lower device\u0027s macvlan port.\n\nNow all packets sent on the macvlan port with a matching source mac\naddress will trigger a use-after-free in macvlan_forward_source().\n\n\u003c/quote valis\u003e\n\nWith all that, my fix is to make sure we call macvlan_flush_sources()\nregardless of @create value whenever \"goto destroy_macvlan_port;\"\npath is taken.\n\nMany thanks to valis for following up on this issue.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_7_34-rt-1-150700.1.3.1.x86_64",
"SUSE Real Time Module 15 SP7:cluster-md-kmp-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:dlm-kmp-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:gfs2-kmp-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-devel-rt-6.4.0-150700.7.34.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-rt-devel-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-source-rt-6.4.0-150700.7.34.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-syms-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:ocfs2-kmp-rt-6.4.0-150700.7.34.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2026-23209",
"url": "https://www.suse.com/security/cve/CVE-2026-23209"
},
{
"category": "external",
"summary": "SUSE Bug 1258518 for CVE-2026-23209",
"url": "https://bugzilla.suse.com/1258518"
},
{
"category": "external",
"summary": "SUSE Bug 1258784 for CVE-2026-23209",
"url": "https://bugzilla.suse.com/1258784"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_7_34-rt-1-150700.1.3.1.x86_64",
"SUSE Real Time Module 15 SP7:cluster-md-kmp-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:dlm-kmp-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:gfs2-kmp-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-devel-rt-6.4.0-150700.7.34.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-rt-devel-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-source-rt-6.4.0-150700.7.34.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-syms-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:ocfs2-kmp-rt-6.4.0-150700.7.34.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_7_34-rt-1-150700.1.3.1.x86_64",
"SUSE Real Time Module 15 SP7:cluster-md-kmp-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:dlm-kmp-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:gfs2-kmp-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-devel-rt-6.4.0-150700.7.34.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-rt-devel-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-source-rt-6.4.0-150700.7.34.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-syms-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:ocfs2-kmp-rt-6.4.0-150700.7.34.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-03-23T09:09:02Z",
"details": "important"
}
],
"title": "CVE-2026-23209"
},
{
"cve": "CVE-2026-23210",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2026-23210"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nice: Fix PTP NULL pointer dereference during VSI rebuild\n\nFix race condition where PTP periodic work runs while VSI is being\nrebuilt, accessing NULL vsi-\u003erx_rings.\n\nThe sequence was:\n1. ice_ptp_prepare_for_reset() cancels PTP work\n2. ice_ptp_rebuild() immediately queues PTP work\n3. VSI rebuild happens AFTER ice_ptp_rebuild()\n4. PTP work runs and accesses NULL vsi-\u003erx_rings\n\nFix: Keep PTP work cancelled during rebuild, only queue it after\nVSI rebuild completes in ice_rebuild().\n\nAdded ice_ptp_queue_work() helper function to encapsulate the logic\nfor queuing PTP work, ensuring it\u0027s only queued when PTP is supported\nand the state is ICE_PTP_READY.\n\nError log:\n[ 121.392544] ice 0000:60:00.1: PTP reset successful\n[ 121.392692] BUG: kernel NULL pointer dereference, address: 0000000000000000\n[ 121.392712] #PF: supervisor read access in kernel mode\n[ 121.392720] #PF: error_code(0x0000) - not-present page\n[ 121.392727] PGD 0\n[ 121.392734] Oops: Oops: 0000 [#1] SMP NOPTI\n[ 121.392746] CPU: 8 UID: 0 PID: 1005 Comm: ice-ptp-0000:60 Tainted: G S 6.19.0-rc6+ #4 PREEMPT(voluntary)\n[ 121.392761] Tainted: [S]=CPU_OUT_OF_SPEC\n[ 121.392773] RIP: 0010:ice_ptp_update_cached_phctime+0xbf/0x150 [ice]\n[ 121.393042] Call Trace:\n[ 121.393047] \u003cTASK\u003e\n[ 121.393055] ice_ptp_periodic_work+0x69/0x180 [ice]\n[ 121.393202] kthread_worker_fn+0xa2/0x260\n[ 121.393216] ? __pfx_ice_ptp_periodic_work+0x10/0x10 [ice]\n[ 121.393359] ? __pfx_kthread_worker_fn+0x10/0x10\n[ 121.393371] kthread+0x10d/0x230\n[ 121.393382] ? __pfx_kthread+0x10/0x10\n[ 121.393393] ret_from_fork+0x273/0x2b0\n[ 121.393407] ? __pfx_kthread+0x10/0x10\n[ 121.393417] ret_from_fork_asm+0x1a/0x30\n[ 121.393432] \u003c/TASK\u003e",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_7_34-rt-1-150700.1.3.1.x86_64",
"SUSE Real Time Module 15 SP7:cluster-md-kmp-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:dlm-kmp-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:gfs2-kmp-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-devel-rt-6.4.0-150700.7.34.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-rt-devel-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-source-rt-6.4.0-150700.7.34.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-syms-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:ocfs2-kmp-rt-6.4.0-150700.7.34.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2026-23210",
"url": "https://www.suse.com/security/cve/CVE-2026-23210"
},
{
"category": "external",
"summary": "SUSE Bug 1258517 for CVE-2026-23210",
"url": "https://bugzilla.suse.com/1258517"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_7_34-rt-1-150700.1.3.1.x86_64",
"SUSE Real Time Module 15 SP7:cluster-md-kmp-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:dlm-kmp-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:gfs2-kmp-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-devel-rt-6.4.0-150700.7.34.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-rt-devel-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-source-rt-6.4.0-150700.7.34.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-syms-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:ocfs2-kmp-rt-6.4.0-150700.7.34.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.7,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_7_34-rt-1-150700.1.3.1.x86_64",
"SUSE Real Time Module 15 SP7:cluster-md-kmp-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:dlm-kmp-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:gfs2-kmp-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-devel-rt-6.4.0-150700.7.34.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-rt-devel-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-source-rt-6.4.0-150700.7.34.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-syms-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:ocfs2-kmp-rt-6.4.0-150700.7.34.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-03-23T09:09:02Z",
"details": "moderate"
}
],
"title": "CVE-2026-23210"
},
{
"cve": "CVE-2026-23213",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2026-23213"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\ndrm/amd/pm: Disable MMIO access during SMU Mode 1 reset\n\nDuring Mode 1 reset, the ASIC undergoes a reset cycle and becomes\ntemporarily inaccessible via PCIe. Any attempt to access MMIO registers\nduring this window (e.g., from interrupt handlers or other driver threads)\ncan result in uncompleted PCIe transactions, leading to NMI panics or\nsystem hangs.\n\nTo prevent this, set the `no_hw_access` flag to true immediately after\ntriggering the reset. This signals other driver components to skip\nregister accesses while the device is offline.\n\nA memory barrier `smp_mb()` is added to ensure the flag update is\nglobally visible to all cores before the driver enters the sleep/wait\nstate.\n\n(cherry picked from commit 7edb503fe4b6d67f47d8bb0dfafb8e699bb0f8a4)",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_7_34-rt-1-150700.1.3.1.x86_64",
"SUSE Real Time Module 15 SP7:cluster-md-kmp-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:dlm-kmp-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:gfs2-kmp-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-devel-rt-6.4.0-150700.7.34.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-rt-devel-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-source-rt-6.4.0-150700.7.34.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-syms-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:ocfs2-kmp-rt-6.4.0-150700.7.34.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2026-23213",
"url": "https://www.suse.com/security/cve/CVE-2026-23213"
},
{
"category": "external",
"summary": "SUSE Bug 1258465 for CVE-2026-23213",
"url": "https://bugzilla.suse.com/1258465"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_7_34-rt-1-150700.1.3.1.x86_64",
"SUSE Real Time Module 15 SP7:cluster-md-kmp-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:dlm-kmp-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:gfs2-kmp-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-devel-rt-6.4.0-150700.7.34.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-rt-devel-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-source-rt-6.4.0-150700.7.34.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-syms-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:ocfs2-kmp-rt-6.4.0-150700.7.34.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_7_34-rt-1-150700.1.3.1.x86_64",
"SUSE Real Time Module 15 SP7:cluster-md-kmp-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:dlm-kmp-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:gfs2-kmp-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-devel-rt-6.4.0-150700.7.34.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-rt-devel-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-source-rt-6.4.0-150700.7.34.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-syms-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:ocfs2-kmp-rt-6.4.0-150700.7.34.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-03-23T09:09:02Z",
"details": "moderate"
}
],
"title": "CVE-2026-23213"
},
{
"cve": "CVE-2026-23214",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2026-23214"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nbtrfs: reject new transactions if the fs is fully read-only\n\n[BUG]\nThere is a bug report where a heavily fuzzed fs is mounted with all\nrescue mount options, which leads to the following warnings during\nunmount:\n\n BTRFS: Transaction aborted (error -22)\n Modules linked in:\n CPU: 0 UID: 0 PID: 9758 Comm: repro.out Not tainted\n 6.19.0-rc5-00002-gb71e635feefc #7 PREEMPT(full)\n Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.15.0-1 04/01/2014\n RIP: 0010:find_free_extent_update_loop fs/btrfs/extent-tree.c:4208 [inline]\n RIP: 0010:find_free_extent+0x52f0/0x5d20 fs/btrfs/extent-tree.c:4611\n Call Trace:\n \u003cTASK\u003e\n btrfs_reserve_extent+0x2cd/0x790 fs/btrfs/extent-tree.c:4705\n btrfs_alloc_tree_block+0x1e1/0x10e0 fs/btrfs/extent-tree.c:5157\n btrfs_force_cow_block+0x578/0x2410 fs/btrfs/ctree.c:517\n btrfs_cow_block+0x3c4/0xa80 fs/btrfs/ctree.c:708\n btrfs_search_slot+0xcad/0x2b50 fs/btrfs/ctree.c:2130\n btrfs_truncate_inode_items+0x45d/0x2350 fs/btrfs/inode-item.c:499\n btrfs_evict_inode+0x923/0xe70 fs/btrfs/inode.c:5628\n evict+0x5f4/0xae0 fs/inode.c:837\n __dentry_kill+0x209/0x660 fs/dcache.c:670\n finish_dput+0xc9/0x480 fs/dcache.c:879\n shrink_dcache_for_umount+0xa0/0x170 fs/dcache.c:1661\n generic_shutdown_super+0x67/0x2c0 fs/super.c:621\n kill_anon_super+0x3b/0x70 fs/super.c:1289\n btrfs_kill_super+0x41/0x50 fs/btrfs/super.c:2127\n deactivate_locked_super+0xbc/0x130 fs/super.c:474\n cleanup_mnt+0x425/0x4c0 fs/namespace.c:1318\n task_work_run+0x1d4/0x260 kernel/task_work.c:233\n exit_task_work include/linux/task_work.h:40 [inline]\n do_exit+0x694/0x22f0 kernel/exit.c:971\n do_group_exit+0x21c/0x2d0 kernel/exit.c:1112\n __do_sys_exit_group kernel/exit.c:1123 [inline]\n __se_sys_exit_group kernel/exit.c:1121 [inline]\n __x64_sys_exit_group+0x3f/0x40 kernel/exit.c:1121\n x64_sys_call+0x2210/0x2210 arch/x86/include/generated/asm/syscalls_64.h:232\n do_syscall_x64 arch/x86/entry/syscall_64.c:63 [inline]\n do_syscall_64+0xe8/0xf80 arch/x86/entry/syscall_64.c:94\n entry_SYSCALL_64_after_hwframe+0x77/0x7f\n RIP: 0033:0x44f639\n Code: Unable to access opcode bytes at 0x44f60f.\n RSP: 002b:00007ffc15c4e088 EFLAGS: 00000246 ORIG_RAX: 00000000000000e7\n RAX: ffffffffffffffda RBX: 00000000004c32f0 RCX: 000000000044f639\n RDX: 000000000000003c RSI: 00000000000000e7 RDI: 0000000000000001\n RBP: 0000000000000001 R08: ffffffffffffffc0 R09: 0000000000000000\n R10: 0000000000000000 R11: 0000000000000246 R12: 00000000004c32f0\n R13: 0000000000000001 R14: 0000000000000000 R15: 0000000000000001\n \u003c/TASK\u003e\n\nSince rescue mount options will mark the full fs read-only, there should\nbe no new transaction triggered.\n\nBut during unmount we will evict all inodes, which can trigger a new\ntransaction, and triggers warnings on a heavily corrupted fs.\n\n[CAUSE]\nBtrfs allows new transaction even on a read-only fs, this is to allow\nlog replay happen even on read-only mounts, just like what ext4/xfs do.\n\nHowever with rescue mount options, the fs is fully read-only and cannot\nbe remounted read-write, thus in that case we should also reject any new\ntransactions.\n\n[FIX]\nIf we find the fs has rescue mount options, we should treat the fs as\nerror, so that no new transaction can be started.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_7_34-rt-1-150700.1.3.1.x86_64",
"SUSE Real Time Module 15 SP7:cluster-md-kmp-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:dlm-kmp-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:gfs2-kmp-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-devel-rt-6.4.0-150700.7.34.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-rt-devel-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-source-rt-6.4.0-150700.7.34.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-syms-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:ocfs2-kmp-rt-6.4.0-150700.7.34.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2026-23214",
"url": "https://www.suse.com/security/cve/CVE-2026-23214"
},
{
"category": "external",
"summary": "SUSE Bug 1258464 for CVE-2026-23214",
"url": "https://bugzilla.suse.com/1258464"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_7_34-rt-1-150700.1.3.1.x86_64",
"SUSE Real Time Module 15 SP7:cluster-md-kmp-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:dlm-kmp-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:gfs2-kmp-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-devel-rt-6.4.0-150700.7.34.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-rt-devel-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-source-rt-6.4.0-150700.7.34.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-syms-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:ocfs2-kmp-rt-6.4.0-150700.7.34.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.6,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_7_34-rt-1-150700.1.3.1.x86_64",
"SUSE Real Time Module 15 SP7:cluster-md-kmp-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:dlm-kmp-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:gfs2-kmp-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-devel-rt-6.4.0-150700.7.34.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-rt-devel-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-source-rt-6.4.0-150700.7.34.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-syms-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:ocfs2-kmp-rt-6.4.0-150700.7.34.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-03-23T09:09:02Z",
"details": "moderate"
}
],
"title": "CVE-2026-23214"
},
{
"cve": "CVE-2026-23221",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2026-23221"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nbus: fsl-mc: fix use-after-free in driver_override_show()\n\nThe driver_override_show() function reads the driver_override string\nwithout holding the device_lock. However, driver_override_store() uses\ndriver_set_override(), which modifies and frees the string while holding\nthe device_lock.\n\nThis can result in a concurrent use-after-free if the string is freed\nby the store function while being read by the show function.\n\nFix this by holding the device_lock around the read operation.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_7_34-rt-1-150700.1.3.1.x86_64",
"SUSE Real Time Module 15 SP7:cluster-md-kmp-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:dlm-kmp-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:gfs2-kmp-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-devel-rt-6.4.0-150700.7.34.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-rt-devel-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-source-rt-6.4.0-150700.7.34.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-syms-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:ocfs2-kmp-rt-6.4.0-150700.7.34.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2026-23221",
"url": "https://www.suse.com/security/cve/CVE-2026-23221"
},
{
"category": "external",
"summary": "SUSE Bug 1258660 for CVE-2026-23221",
"url": "https://bugzilla.suse.com/1258660"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_7_34-rt-1-150700.1.3.1.x86_64",
"SUSE Real Time Module 15 SP7:cluster-md-kmp-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:dlm-kmp-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:gfs2-kmp-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-devel-rt-6.4.0-150700.7.34.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-rt-devel-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-source-rt-6.4.0-150700.7.34.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-syms-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:ocfs2-kmp-rt-6.4.0-150700.7.34.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_7_34-rt-1-150700.1.3.1.x86_64",
"SUSE Real Time Module 15 SP7:cluster-md-kmp-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:dlm-kmp-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:gfs2-kmp-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-devel-rt-6.4.0-150700.7.34.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-rt-devel-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-source-rt-6.4.0-150700.7.34.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-syms-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:ocfs2-kmp-rt-6.4.0-150700.7.34.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-03-23T09:09:02Z",
"details": "moderate"
}
],
"title": "CVE-2026-23221"
},
{
"cve": "CVE-2026-23222",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2026-23222"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\ncrypto: omap - Allocate OMAP_CRYPTO_FORCE_COPY scatterlists correctly\n\nThe existing allocation of scatterlists in omap_crypto_copy_sg_lists()\nwas allocating an array of scatterlist pointers, not scatterlist objects,\nresulting in a 4x too small allocation.\n\nUse sizeof(*new_sg) to get the correct object size.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_7_34-rt-1-150700.1.3.1.x86_64",
"SUSE Real Time Module 15 SP7:cluster-md-kmp-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:dlm-kmp-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:gfs2-kmp-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-devel-rt-6.4.0-150700.7.34.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-rt-devel-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-source-rt-6.4.0-150700.7.34.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-syms-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:ocfs2-kmp-rt-6.4.0-150700.7.34.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2026-23222",
"url": "https://www.suse.com/security/cve/CVE-2026-23222"
},
{
"category": "external",
"summary": "SUSE Bug 1258484 for CVE-2026-23222",
"url": "https://bugzilla.suse.com/1258484"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_7_34-rt-1-150700.1.3.1.x86_64",
"SUSE Real Time Module 15 SP7:cluster-md-kmp-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:dlm-kmp-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:gfs2-kmp-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-devel-rt-6.4.0-150700.7.34.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-rt-devel-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-source-rt-6.4.0-150700.7.34.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-syms-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:ocfs2-kmp-rt-6.4.0-150700.7.34.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:L",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_7_34-rt-1-150700.1.3.1.x86_64",
"SUSE Real Time Module 15 SP7:cluster-md-kmp-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:dlm-kmp-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:gfs2-kmp-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-devel-rt-6.4.0-150700.7.34.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-rt-devel-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-source-rt-6.4.0-150700.7.34.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-syms-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:ocfs2-kmp-rt-6.4.0-150700.7.34.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-03-23T09:09:02Z",
"details": "moderate"
}
],
"title": "CVE-2026-23222"
},
{
"cve": "CVE-2026-23229",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2026-23229"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\ncrypto: virtio - Add spinlock protection with virtqueue notification\n\nWhen VM boots with one virtio-crypto PCI device and builtin backend,\nrun openssl benchmark command with multiple processes, such as\n openssl speed -evp aes-128-cbc -engine afalg -seconds 10 -multi 32\n\nopenssl processes will hangup and there is error reported like this:\n virtio_crypto virtio0: dataq.0:id 3 is not a head!\n\nIt seems that the data virtqueue need protection when it is handled\nfor virtio done notification. If the spinlock protection is added\nin virtcrypto_done_task(), openssl benchmark with multiple processes\nworks well.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_7_34-rt-1-150700.1.3.1.x86_64",
"SUSE Real Time Module 15 SP7:cluster-md-kmp-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:dlm-kmp-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:gfs2-kmp-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-devel-rt-6.4.0-150700.7.34.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-rt-devel-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-source-rt-6.4.0-150700.7.34.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-syms-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:ocfs2-kmp-rt-6.4.0-150700.7.34.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2026-23229",
"url": "https://www.suse.com/security/cve/CVE-2026-23229"
},
{
"category": "external",
"summary": "SUSE Bug 1258429 for CVE-2026-23229",
"url": "https://bugzilla.suse.com/1258429"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_7_34-rt-1-150700.1.3.1.x86_64",
"SUSE Real Time Module 15 SP7:cluster-md-kmp-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:dlm-kmp-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:gfs2-kmp-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-devel-rt-6.4.0-150700.7.34.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-rt-devel-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-source-rt-6.4.0-150700.7.34.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-syms-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:ocfs2-kmp-rt-6.4.0-150700.7.34.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_7_34-rt-1-150700.1.3.1.x86_64",
"SUSE Real Time Module 15 SP7:cluster-md-kmp-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:dlm-kmp-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:gfs2-kmp-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-devel-rt-6.4.0-150700.7.34.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-rt-devel-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-source-rt-6.4.0-150700.7.34.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-syms-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:ocfs2-kmp-rt-6.4.0-150700.7.34.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-03-23T09:09:02Z",
"details": "moderate"
}
],
"title": "CVE-2026-23229"
},
{
"cve": "CVE-2026-23268",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2026-23268"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\napparmor: fix unprivileged local user can do privileged policy management\n\nAn unprivileged local user can load, replace, and remove profiles by\nopening the apparmorfs interfaces, via a confused deputy attack, by\npassing the opened fd to a privileged process, and getting the\nprivileged process to write to the interface.\n\nThis does require a privileged target that can be manipulated to do\nthe write for the unprivileged process, but once such access is\nachieved full policy management is possible and all the possible\nimplications that implies: removing confinement, DoS of system or\ntarget applications by denying all execution, by-passing the\nunprivileged user namespace restriction, to exploiting kernel bugs for\na local privilege escalation.\n\nThe policy management interface can not have its permissions simply\nchanged from 0666 to 0600 because non-root processes need to be able\nto load policy to different policy namespaces.\n\nInstead ensure the task writing the interface has privileges that\nare a subset of the task that opened the interface. This is already\ndone via policy for confined processes, but unconfined can delegate\naccess to the opened fd, by-passing the usual policy check.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_7_34-rt-1-150700.1.3.1.x86_64",
"SUSE Real Time Module 15 SP7:cluster-md-kmp-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:dlm-kmp-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:gfs2-kmp-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-devel-rt-6.4.0-150700.7.34.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-rt-devel-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-source-rt-6.4.0-150700.7.34.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-syms-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:ocfs2-kmp-rt-6.4.0-150700.7.34.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2026-23268",
"url": "https://www.suse.com/security/cve/CVE-2026-23268"
},
{
"category": "external",
"summary": "SUSE Bug 1258850 for CVE-2026-23268",
"url": "https://bugzilla.suse.com/1258850"
},
{
"category": "external",
"summary": "SUSE Bug 1259859 for CVE-2026-23268",
"url": "https://bugzilla.suse.com/1259859"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_7_34-rt-1-150700.1.3.1.x86_64",
"SUSE Real Time Module 15 SP7:cluster-md-kmp-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:dlm-kmp-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:gfs2-kmp-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-devel-rt-6.4.0-150700.7.34.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-rt-devel-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-source-rt-6.4.0-150700.7.34.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-syms-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:ocfs2-kmp-rt-6.4.0-150700.7.34.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_7_34-rt-1-150700.1.3.1.x86_64",
"SUSE Real Time Module 15 SP7:cluster-md-kmp-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:dlm-kmp-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:gfs2-kmp-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-devel-rt-6.4.0-150700.7.34.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-rt-devel-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-source-rt-6.4.0-150700.7.34.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-syms-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:ocfs2-kmp-rt-6.4.0-150700.7.34.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-03-23T09:09:02Z",
"details": "important"
}
],
"title": "CVE-2026-23268"
},
{
"cve": "CVE-2026-23269",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2026-23269"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\napparmor: validate DFA start states are in bounds in unpack_pdb\n\nStart states are read from untrusted data and used as indexes into the\nDFA state tables. The aa_dfa_next() function call in unpack_pdb() will\naccess dfa-\u003etables[YYTD_ID_BASE][start], and if the start state exceeds\nthe number of states in the DFA, this results in an out-of-bound read.\n\n==================================================================\n BUG: KASAN: slab-out-of-bounds in aa_dfa_next+0x2a1/0x360\n Read of size 4 at addr ffff88811956fb90 by task su/1097\n ...\n\nReject policies with out-of-bounds start states during unpacking\nto prevent the issue.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_7_34-rt-1-150700.1.3.1.x86_64",
"SUSE Real Time Module 15 SP7:cluster-md-kmp-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:dlm-kmp-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:gfs2-kmp-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-devel-rt-6.4.0-150700.7.34.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-rt-devel-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-source-rt-6.4.0-150700.7.34.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-syms-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:ocfs2-kmp-rt-6.4.0-150700.7.34.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2026-23269",
"url": "https://www.suse.com/security/cve/CVE-2026-23269"
},
{
"category": "external",
"summary": "SUSE Bug 1259857 for CVE-2026-23269",
"url": "https://bugzilla.suse.com/1259857"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_7_34-rt-1-150700.1.3.1.x86_64",
"SUSE Real Time Module 15 SP7:cluster-md-kmp-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:dlm-kmp-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:gfs2-kmp-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-devel-rt-6.4.0-150700.7.34.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-rt-devel-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-source-rt-6.4.0-150700.7.34.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-syms-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:ocfs2-kmp-rt-6.4.0-150700.7.34.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.1,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_7_34-rt-1-150700.1.3.1.x86_64",
"SUSE Real Time Module 15 SP7:cluster-md-kmp-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:dlm-kmp-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:gfs2-kmp-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-devel-rt-6.4.0-150700.7.34.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-rt-devel-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-source-rt-6.4.0-150700.7.34.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-syms-rt-6.4.0-150700.7.34.1.x86_64",
"SUSE Real Time Module 15 SP7:ocfs2-kmp-rt-6.4.0-150700.7.34.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-03-23T09:09:02Z",
"details": "moderate"
}
],
"title": "CVE-2026-23269"
}
]
}
SUSE-SU-2026:20021-1
Vulnerability from csaf_suse - Published: 2025-12-19 16:19 - Updated: 2025-12-19 16:19| URL | Category | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
{
"document": {
"aggregate_severity": {
"namespace": "https://www.suse.com/support/security/rating/",
"text": "important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright 2024 SUSE LLC. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Security update for the Linux Kernel",
"title": "Title of the patch"
},
{
"category": "description",
"text": "\nThe SUSE Linux Enterprise 16.0 kernel was updated to fix various security issues\n\nThe following security issues were fixed:\n\n- CVE-2022-50253: bpf: make sure skb-\u003elen != 0 when redirecting to a tunneling device (bsc#1249912).\n- CVE-2025-37916: pds_core: remove write-after-free of client_id (bsc#1243474).\n- CVE-2025-38084: mm/hugetlb: unshare page tables during VMA split, not before (bsc#1245431 bsc#1245498).\n- CVE-2025-38085: mm/hugetlb: fix huge_pmd_unshare() vs GUP-fast race (bsc#1245431 bsc#1245499).\n- CVE-2025-38321: smb: Log an error when close_all_cached_dirs fails (bsc#1246328).\n- CVE-2025-38728: smb3: fix for slab out of bounds on mount to ksmbd (bsc#1249256).\n- CVE-2025-39805: net: macb: fix unregister_netdev call order in macb_remove() (bsc#1249982).\n- CVE-2025-39819: fs/smb: Fix inconsistent refcnt update (bsc#1250176).\n- CVE-2025-39822: io_uring/kbuf: fix signedness in this_len calculation (bsc#1250034).\n- CVE-2025-39831: fbnic: Move phylink resume out of service_task and into open/close (bsc#1249977).\n- CVE-2025-39859: ptp: ocp: fix use-after-free bugs causing by ptp_ocp_watchdog (bsc#1250252).\n- CVE-2025-39897: net: xilinx: axienet: Add error handling for RX metadata pointer retrieval (bsc#1250746).\n- CVE-2025-39917: bpf: Fix out-of-bounds dynptr write in bpf_crypto_crypt (bsc#1250723).\n- CVE-2025-39944: octeontx2-pf: Fix use-after-free bugs in otx2_sync_tstamp() (bsc#1251120).\n- CVE-2025-39961: iommu/amd/pgtbl: Fix possible race while increase page table level (bsc#1251817).\n- CVE-2025-39980: nexthop: Forbid FDB status change while nexthop is in a group (bsc#1252063).\n- CVE-2025-39990: bpf: Check the helper function is valid in get_helper_proto (bsc#1252054).\n- CVE-2025-40001: scsi: mvsas: Fix use-after-free bugs in mvs_work_queue (bsc#1252303).\n- CVE-2025-40003: net: mscc: ocelot: Fix use-after-free caused by cyclic delayed work (bsc#1252301).\n- CVE-2025-40006: mm/hugetlb: fix folio is still mapped when deleted (bsc#1252342).\n- CVE-2025-40021: tracing: dynevent: Add a missing lockdown check on dynevent (bsc#1252681).\n- CVE-2025-40024: vhost: Take a reference on the task in struct vhost_task (bsc#1252686).\n- CVE-2025-40027: net/9p: fix double req put in p9_fd_cancelled (bsc#1252763).\n- CVE-2025-40031: tee: fix register_shm_helper() (bsc#1252779).\n- CVE-2025-40033: remoteproc: pru: Fix potential NULL pointer dereference in pru_rproc_set_ctable() (bsc#1252824).\n- CVE-2025-40038: KVM: SVM: Skip fastpath emulation on VM-Exit if next RIP isn\u0027t valid (bsc#1252817).\n- CVE-2025-40047: io_uring/waitid: always prune wait queue entry in io_waitid_wait() (bsc#1252790).\n- CVE-2025-40053: net: dlink: handle copy_thresh allocation failure (bsc#1252808).\n- CVE-2025-40055: ocfs2: fix double free in user_cluster_connect() (bsc#1252821).\n- CVE-2025-40059: coresight: Fix incorrect handling for return value of devm_kzalloc (bsc#1252809).\n- CVE-2025-40064: smc: Fix use-after-free in __pnet_find_base_ndev() (bsc#1252845).\n- CVE-2025-40070: pps: fix warning in pps_register_cdev when register device fail (bsc#1252836).\n- CVE-2025-40074: tcp: convert to dev_net_rcu() (bsc#1252794).\n- CVE-2025-40075: tcp_metrics: use dst_dev_net_rcu() (bsc#1252795).\n- CVE-2025-40081: perf: arm_spe: Prevent overflow in PERF_IDX2OFF() (bsc#1252776).\n- CVE-2025-40083: net/sched: sch_qfq: Fix null-deref in agg_dequeue (bsc#1252912).\n- CVE-2025-40086: drm/xe: Don\u0027t allow evicting of BOs in same VM in array of VM binds (bsc#1252923).\n- CVE-2025-40098: ALSA: hda: cs35l41: Fix NULL pointer dereference in cs35l41_get_acpi_mute_state() (bsc#1252917).\n- CVE-2025-40101: btrfs: fix memory leaks when rejecting a non SINGLE data profile without an RST (bsc#1252901).\n- CVE-2025-40102: KVM: arm64: Prevent access to vCPU events before init (bsc#1252919).\n- CVE-2025-40105: vfs: Don\u0027t leak disconnected dentries on umount (bsc#1252928).\n- CVE-2025-40133: mptcp: Call dst_release() in mptcp_active_enable() (bsc#1253328).\n- CVE-2025-40134: dm: fix NULL pointer dereference in __dm_suspend() (bsc#1253386).\n- CVE-2025-40135: ipv6: use RCU in ip6_xmit() (bsc#1253342).\n- CVE-2025-40139: smc: Use __sk_dst_get() and dst_dev_rcu() in in smc_clc_prfx_set() (bsc#1253409).\n- CVE-2025-40149: tls: Use __sk_dst_get() and dst_dev_rcu() in get_netdev_for_sock() (bsc#1253355).\n- CVE-2025-40153: mm: hugetlb: avoid soft lockup when mprotect to large memory area (bsc#1253408).\n- CVE-2025-40157: EDAC/i10nm: Skip DIMM enumeration on a disabled memory controller (bsc#1253423).\n- CVE-2025-40158: ipv6: use RCU in ip6_output() (bsc#1253402).\n- CVE-2025-40159: xsk: Harden userspace-supplied xdp_desc validation (bsc#1253403).\n- CVE-2025-40168: smc: Use __sk_dst_get() and dst_dev_rcu() in smc_clc_prfx_match() (bsc#1253427).\n- CVE-2025-40169: bpf: Reject negative offsets for ALU ops (bsc#1253416).\n- CVE-2025-40173: net/ip6_tunnel: Prevent perpetual tunnel growth (bsc#1253421).\n- CVE-2025-40175: idpf: cleanup remaining SKBs in PTP flows (bsc#1253426).\n- CVE-2025-40176: tls: wait for pending async decryptions if tls_strp_msg_hold fails (bsc#1253425).\n- CVE-2025-40178: pid: Add a judgment for ns null in pid_nr_ns (bsc#1253463).\n- CVE-2025-40185: ice: ice_adapter: release xa entry on adapter allocation failure (bsc#1253394).\n- CVE-2025-40201: kernel/sys.c: fix the racy usage of task_lock(tsk-\u003egroup_leader) in sys_prlimit64() paths (bsc#1253455).\n- CVE-2025-40203: listmount: don\u0027t call path_put() under namespace semaphore (bsc#1253457).\n\nThe following non security issues were fixed:\n\n- ACPI: scan: Update honor list for RPMI System MSI (stable-fixes).\n- ACPICA: Update dsmethod.c to get rid of unused variable warning (stable-fixes).\n- Disable CONFIG_CPU5_WDT The cpu5wdt driver doesn\u0027t implement a\n proper watchdog interface and has many code issues. It only handles\n obscure and obsolete hardware. Stop building and supporting this driver\n (jsc#PED-14062).\n- Fix \"drm/xe: Don\u0027t allow evicting of BOs in same VM in array of VM binds\" (bsc#1252923)\n- KVM: SVM: Delete IRTE link from previous vCPU before setting new IRTE (git-fixes).\n- KVM: SVM: Delete IRTE link from previous vCPU irrespective of new routing (git-fixes).\n- KVM: SVM: Mark VMCB_LBR dirty when MSR_IA32_DEBUGCTLMSR is updated (git-fixes).\n- KVM: s390: improve interrupt cpu for wakeup (bsc#1235463).\n- KVM: s390: kABI backport for \u0027last_sleep_cpu\u0027 (bsc#1252352).\n- KVM: x86/mmu: Return -EAGAIN if userspace deletes/moves memslot during prefault (git-fixes).\n- PCI/ERR: Update device error_state already after reset (stable-fixes).\n- PM: EM: Slightly reduce em_check_capacity_update() overhead (stable-fixes).\n- Revert \"net/mlx5e: Update and set Xon/Xoff upon MTU set\" (git-fixes).\n- Revert \"net/mlx5e: Update and set Xon/Xoff upon port speed set\" (git-fixes).\n- Update config files: enable zstd module decompression (jsc#PED-14115).\n- bpf/selftests: Fix test_tcpnotify_user (bsc#1253635).\n- btrfs: do not clear read-only when adding sprout device (bsc#1253238).\n- btrfs: do not update last_log_commit when logging inode due to a new name (git-fixes).\n- dm: fix queue start/stop imbalance under suspend/load/resume races (bsc#1253386)\n- drm/amd/display: Add AVI infoframe copy in copy_stream_update_to_stream (stable-fixes).\n- drm/amd/display: update color on atomic commit time (stable-fixes).\n- drm/amd/display: update dpp/disp clock from smu clock table (stable-fixes).\n- drm/radeon: delete radeon_fence_process in is_signaled, no deadlock (stable-fixes).\n- hwmon: (lenovo-ec-sensors) Update P8 supprt (stable-fixes).\n- media: amphion: Delete v4l2_fh synchronously in .release() (stable-fixes).\n- mount: handle NULL values in mnt_ns_release() (bsc#1254308)\n- net/smc: Remove validation of reserved bits in CLC Decline (bsc#1252357).\n- net: phy: move realtek PHY driver to its own subdirectory (jsc#PED-14353).\n- net: phy: realtek: add defines for shadowed c45 standard registers (jsc#PED-14353).\n- net: phy: realtek: add helper RTL822X_VND2_C22_REG (jsc#PED-14353).\n- net: phy: realtek: change order of calls in C22 read_status() (jsc#PED-14353).\n- net: phy: realtek: clear 1000Base-T link partner advertisement (jsc#PED-14353).\n- net: phy: realtek: improve mmd register access for internal PHY\u0027s (jsc#PED-14353).\n- net: phy: realtek: read duplex and gbit master from PHYSR register (jsc#PED-14353).\n- net: phy: realtek: switch from paged to MMD ops in rtl822x functions (jsc#PED-14353).\n- net: phy: realtek: use string choices helpers (jsc#PED-14353).\n- net: xilinx: axienet: Fix IRQ coalescing packet count overflow (bsc#1250746)\n- net: xilinx: axienet: Fix RX skb ring management in DMAengine mode (bsc#1250746)\n- net: xilinx: axienet: Fix Tx skb circular buffer occupancy check in dmaengine xmit (bsc#1250746)\n- nvmet-auth: update sc_c in host response (git-fixes bsc#1249397).\n- nvmet-auth: update sc_c in target host hash calculation (git-fixes).\n- perf list: Add IBM z17 event descriptions (jsc#PED-13611).\n- platform/x86:intel/pmc: Update Arrow Lake telemetry GUID (git-fixes).\n- powercap: intel_rapl: Add support for Panther Lake platform (jsc#PED-13949).\n- pwm: pca9685: Use bulk write to atomicially update registers (stable-fixes).\n- r8169: add PHY c45 ops for MDIO_MMD_VENDOR2 registers (jsc#PED-14353).\n- r8169: add support for Intel Killer E5000 (jsc#PED-14353).\n- r8169: add support for RTL8125BP rev.b (jsc#PED-14353).\n- r8169: add support for RTL8125D rev.b (jsc#PED-14353).\n- r8169: adjust version numbering for RTL8126 (jsc#PED-14353).\n- r8169: align RTL8125 EEE config with vendor driver (jsc#PED-14353).\n- r8169: align RTL8125/RTL8126 PHY config with vendor driver (jsc#PED-14353).\n- r8169: align RTL8126 EEE config with vendor driver (jsc#PED-14353).\n- r8169: align WAKE_PHY handling with r8125/r8126 vendor drivers (jsc#PED-14353).\n- r8169: avoid duplicated messages if loading firmware fails and switch to warn level (jsc#PED-14353).\n- r8169: don\u0027t take RTNL lock in rtl_task() (jsc#PED-14353).\n- r8169: enable EEE at 2.5G per default on RTL8125B (jsc#PED-14353).\n- r8169: enable RTL8168H/RTL8168EP/RTL8168FP ASPM support (jsc#PED-14353).\n- r8169: fix inconsistent indenting in rtl8169_get_eth_mac_stats (jsc#PED-14353).\n- r8169: implement additional ethtool stats ops (jsc#PED-14353).\n- r8169: improve __rtl8169_set_wol (jsc#PED-14353).\n- r8169: improve initialization of RSS registers on RTL8125/RTL8126 (jsc#PED-14353).\n- r8169: improve rtl_set_d3_pll_down (jsc#PED-14353).\n- r8169: increase max jumbo packet size on RTL8125/RTL8126 (jsc#PED-14353).\n- r8169: remove leftover locks after reverted change (jsc#PED-14353).\n- r8169: remove original workaround for RTL8125 broken rx issue (jsc#PED-14353).\n- r8169: remove rtl_dash_loop_wait_high/low (jsc#PED-14353).\n- r8169: remove support for chip version 11 (jsc#PED-14353).\n- r8169: remove unused flag RTL_FLAG_TASK_RESET_NO_QUEUE_WAKE (jsc#PED-14353).\n- r8169: replace custom flag with disable_work() et al (jsc#PED-14353).\n- r8169: switch away from deprecated pcim_iomap_table (jsc#PED-14353).\n- r8169: use helper r8169_mod_reg8_cond to simplify rtl_jumbo_config (jsc#PED-14353).\n- ring-buffer: Update pages_touched to reflect persistent buffer content (git-fixes).\n- s390/mm: Fix __ptep_rdp() inline assembly (bsc#1253643).\n- sched/fair: Get rid of sched_domains_curr_level hack for tl-\u003ecpumask() (bsc#1246843).\n- sched/fair: Have SD_SERIALIZE affect newidle balancing (bsc#1248792).\n- sched/fair: Proportional newidle balance (bsc#1248792).\n- sched/fair: Proportional newidle balance -KABI (bsc#1248792).\n- sched/fair: Revert max_newidle_lb_cost bump (bsc#1248792).\n- sched/fair: Skip sched_balance_running cmpxchg when balance is not due (bsc#1248792).\n- sched/fair: Small cleanup to sched_balance_newidle() (bsc#1248792).\n- sched/fair: Small cleanup to update_newidle_cost() (bsc#1248792).\n- scsi: lpfc: Add capability to register Platform Name ID to fabric (bsc#1254119).\n- scsi: lpfc: Allow support for BB credit recovery in point-to-point topology (bsc#1254119).\n- scsi: lpfc: Ensure unregistration of rpis for received PLOGIs (bsc#1254119).\n- scsi: lpfc: Fix leaked ndlp krefs when in point-to-point topology (bsc#1254119).\n- scsi: lpfc: Fix reusing an ndlp that is marked NLP_DROPPED during FLOGI (bsc#1254119).\n- scsi: lpfc: Modify kref handling for Fabric Controller ndlps (bsc#1254119).\n- scsi: lpfc: Remove redundant NULL ptr assignment in lpfc_els_free_iocb() (bsc#1254119).\n- scsi: lpfc: Revise discovery related function headers and comments (bsc#1254119).\n- scsi: lpfc: Update lpfc version to 14.4.0.12 (bsc#1254119).\n- scsi: lpfc: Update various NPIV diagnostic log messaging (bsc#1254119).\n- selftests/run_kselftest.sh: Add `--skip` argument option (bsc#1254221).\n- smpboot: introduce SDTL_INIT() helper to tidy sched topology setup (bsc#1246843).\n- soc/tegra: fuse: speedo-tegra210: Update speedo IDs (git-fixes).\n- spi: tegra210-quad: Check hardware status on timeout (bsc#1253155)\n- spi: tegra210-quad: Fix timeout handling (bsc#1253155)\n- spi: tegra210-quad: Refactor error handling into helper functions (bsc#1253155)\n- spi: tegra210-quad: Update dummy sequence configuration (git-fixes)\n- tcp_bpf: Call sk_msg_free() when tcp_bpf_send_verdict() fails to allocate psock-\u003ecork (bsc#1250705).\n- wifi: ath11k: Add quirk entries for Thinkpad T14s Gen3 AMD (bsc#1254181).\n- wifi: mt76: do not add wcid entries to sta poll list during MCU reset (bsc#1254315).\n- wifi: mt76: introduce mt792x_config_mac_addr_list routine (bsc#1254315).\n- wifi: mt76: mt7925: Fix logical vs bitwise typo (bsc#1254315).\n- wifi: mt76: mt7925: Remove unnecessary if-check (bsc#1254315).\n- wifi: mt76: mt7925: Simplify HIF suspend handling to avoid suspend fail (bsc#1254315).\n- wifi: mt76: mt7925: add EHT control support based on the CLC data (bsc#1254315).\n- wifi: mt76: mt7925: add handler to hif suspend/resume event (bsc#1254315).\n- wifi: mt76: mt7925: add pci restore for hibernate (bsc#1254315).\n- wifi: mt76: mt7925: config the dwell time by firmware (bsc#1254315).\n- wifi: mt76: mt7925: extend MCU support for testmode (bsc#1254315).\n- wifi: mt76: mt7925: fix CLC command timeout when suspend/resume (bsc#1254315).\n- wifi: mt76: mt7925: fix missing hdr_trans_tlv command for broadcast wtbl (bsc#1254315).\n- wifi: mt76: mt7925: fix the unfinished command of regd_notifier before suspend (bsc#1254315).\n- wifi: mt76: mt7925: refine the txpower initialization flow (bsc#1254315).\n- wifi: mt76: mt7925: replace zero-length array with flexible-array member (bsc#1254315).\n- wifi: mt76: mt7925: update the channel usage when the regd domain changed (bsc#1254315).\n- wifi: mt76: mt7925e: fix too long of wifi resume time (bsc#1254315).\n- x86/smpboot: avoid SMT domain attach/destroy if SMT is not enabled (bsc#1246843).\n- x86/smpboot: moves x86_topology to static initialize and truncate (bsc#1246843).\n- x86/smpboot: remove redundant CONFIG_SCHED_SMT (bsc#1246843).\n",
"title": "Description of the patch"
},
{
"category": "details",
"text": "SUSE-SLES-HA-16.0-113",
"title": "Patchnames"
},
{
"category": "legal_disclaimer",
"text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
"title": "Terms of use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://www.suse.com/support/security/contact/",
"name": "SUSE Product Security Team",
"namespace": "https://www.suse.com/"
},
"references": [
{
"category": "external",
"summary": "SUSE ratings",
"url": "https://www.suse.com/support/security/rating/"
},
{
"category": "self",
"summary": "URL of this CSAF notice",
"url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2026_20021-1.json"
},
{
"category": "self",
"summary": "URL for SUSE-SU-2026:20021-1",
"url": "https://www.suse.com/support/update/announcement/2026/suse-su-202620021-1/"
},
{
"category": "self",
"summary": "E-Mail link for SUSE-SU-2026:20021-1",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-January/023723.html"
},
{
"category": "self",
"summary": "SUSE Bug 1235463",
"url": "https://bugzilla.suse.com/1235463"
},
{
"category": "self",
"summary": "SUSE Bug 1243474",
"url": "https://bugzilla.suse.com/1243474"
},
{
"category": "self",
"summary": "SUSE Bug 1245193",
"url": "https://bugzilla.suse.com/1245193"
},
{
"category": "self",
"summary": "SUSE Bug 1245431",
"url": "https://bugzilla.suse.com/1245431"
},
{
"category": "self",
"summary": "SUSE Bug 1245498",
"url": "https://bugzilla.suse.com/1245498"
},
{
"category": "self",
"summary": "SUSE Bug 1245499",
"url": "https://bugzilla.suse.com/1245499"
},
{
"category": "self",
"summary": "SUSE Bug 1246328",
"url": "https://bugzilla.suse.com/1246328"
},
{
"category": "self",
"summary": "SUSE Bug 1246843",
"url": "https://bugzilla.suse.com/1246843"
},
{
"category": "self",
"summary": "SUSE Bug 1247500",
"url": "https://bugzilla.suse.com/1247500"
},
{
"category": "self",
"summary": "SUSE Bug 1248792",
"url": "https://bugzilla.suse.com/1248792"
},
{
"category": "self",
"summary": "SUSE Bug 1249256",
"url": "https://bugzilla.suse.com/1249256"
},
{
"category": "self",
"summary": "SUSE Bug 1249397",
"url": "https://bugzilla.suse.com/1249397"
},
{
"category": "self",
"summary": "SUSE Bug 1249912",
"url": "https://bugzilla.suse.com/1249912"
},
{
"category": "self",
"summary": "SUSE Bug 1249977",
"url": "https://bugzilla.suse.com/1249977"
},
{
"category": "self",
"summary": "SUSE Bug 1249982",
"url": "https://bugzilla.suse.com/1249982"
},
{
"category": "self",
"summary": "SUSE Bug 1250034",
"url": "https://bugzilla.suse.com/1250034"
},
{
"category": "self",
"summary": "SUSE Bug 1250176",
"url": "https://bugzilla.suse.com/1250176"
},
{
"category": "self",
"summary": "SUSE Bug 1250237",
"url": "https://bugzilla.suse.com/1250237"
},
{
"category": "self",
"summary": "SUSE Bug 1250252",
"url": "https://bugzilla.suse.com/1250252"
},
{
"category": "self",
"summary": "SUSE Bug 1250705",
"url": "https://bugzilla.suse.com/1250705"
},
{
"category": "self",
"summary": "SUSE Bug 1250723",
"url": "https://bugzilla.suse.com/1250723"
},
{
"category": "self",
"summary": "SUSE Bug 1250746",
"url": "https://bugzilla.suse.com/1250746"
},
{
"category": "self",
"summary": "SUSE Bug 1251120",
"url": "https://bugzilla.suse.com/1251120"
},
{
"category": "self",
"summary": "SUSE Bug 1251817",
"url": "https://bugzilla.suse.com/1251817"
},
{
"category": "self",
"summary": "SUSE Bug 1252054",
"url": "https://bugzilla.suse.com/1252054"
},
{
"category": "self",
"summary": "SUSE Bug 1252063",
"url": "https://bugzilla.suse.com/1252063"
},
{
"category": "self",
"summary": "SUSE Bug 1252301",
"url": "https://bugzilla.suse.com/1252301"
},
{
"category": "self",
"summary": "SUSE Bug 1252303",
"url": "https://bugzilla.suse.com/1252303"
},
{
"category": "self",
"summary": "SUSE Bug 1252342",
"url": "https://bugzilla.suse.com/1252342"
},
{
"category": "self",
"summary": "SUSE Bug 1252352",
"url": "https://bugzilla.suse.com/1252352"
},
{
"category": "self",
"summary": "SUSE Bug 1252357",
"url": "https://bugzilla.suse.com/1252357"
},
{
"category": "self",
"summary": "SUSE Bug 1252681",
"url": "https://bugzilla.suse.com/1252681"
},
{
"category": "self",
"summary": "SUSE Bug 1252686",
"url": "https://bugzilla.suse.com/1252686"
},
{
"category": "self",
"summary": "SUSE Bug 1252763",
"url": "https://bugzilla.suse.com/1252763"
},
{
"category": "self",
"summary": "SUSE Bug 1252776",
"url": "https://bugzilla.suse.com/1252776"
},
{
"category": "self",
"summary": "SUSE Bug 1252779",
"url": "https://bugzilla.suse.com/1252779"
},
{
"category": "self",
"summary": "SUSE Bug 1252790",
"url": "https://bugzilla.suse.com/1252790"
},
{
"category": "self",
"summary": "SUSE Bug 1252794",
"url": "https://bugzilla.suse.com/1252794"
},
{
"category": "self",
"summary": "SUSE Bug 1252795",
"url": "https://bugzilla.suse.com/1252795"
},
{
"category": "self",
"summary": "SUSE Bug 1252808",
"url": "https://bugzilla.suse.com/1252808"
},
{
"category": "self",
"summary": "SUSE Bug 1252809",
"url": "https://bugzilla.suse.com/1252809"
},
{
"category": "self",
"summary": "SUSE Bug 1252817",
"url": "https://bugzilla.suse.com/1252817"
},
{
"category": "self",
"summary": "SUSE Bug 1252821",
"url": "https://bugzilla.suse.com/1252821"
},
{
"category": "self",
"summary": "SUSE Bug 1252824",
"url": "https://bugzilla.suse.com/1252824"
},
{
"category": "self",
"summary": "SUSE Bug 1252836",
"url": "https://bugzilla.suse.com/1252836"
},
{
"category": "self",
"summary": "SUSE Bug 1252845",
"url": "https://bugzilla.suse.com/1252845"
},
{
"category": "self",
"summary": "SUSE Bug 1252901",
"url": "https://bugzilla.suse.com/1252901"
},
{
"category": "self",
"summary": "SUSE Bug 1252912",
"url": "https://bugzilla.suse.com/1252912"
},
{
"category": "self",
"summary": "SUSE Bug 1252917",
"url": "https://bugzilla.suse.com/1252917"
},
{
"category": "self",
"summary": "SUSE Bug 1252919",
"url": "https://bugzilla.suse.com/1252919"
},
{
"category": "self",
"summary": "SUSE Bug 1252923",
"url": "https://bugzilla.suse.com/1252923"
},
{
"category": "self",
"summary": "SUSE Bug 1252928",
"url": "https://bugzilla.suse.com/1252928"
},
{
"category": "self",
"summary": "SUSE Bug 1253018",
"url": "https://bugzilla.suse.com/1253018"
},
{
"category": "self",
"summary": "SUSE Bug 1253155",
"url": "https://bugzilla.suse.com/1253155"
},
{
"category": "self",
"summary": "SUSE Bug 1253176",
"url": "https://bugzilla.suse.com/1253176"
},
{
"category": "self",
"summary": "SUSE Bug 1253238",
"url": "https://bugzilla.suse.com/1253238"
},
{
"category": "self",
"summary": "SUSE Bug 1253275",
"url": "https://bugzilla.suse.com/1253275"
},
{
"category": "self",
"summary": "SUSE Bug 1253318",
"url": "https://bugzilla.suse.com/1253318"
},
{
"category": "self",
"summary": "SUSE Bug 1253324",
"url": "https://bugzilla.suse.com/1253324"
},
{
"category": "self",
"summary": "SUSE Bug 1253328",
"url": "https://bugzilla.suse.com/1253328"
},
{
"category": "self",
"summary": "SUSE Bug 1253330",
"url": "https://bugzilla.suse.com/1253330"
},
{
"category": "self",
"summary": "SUSE Bug 1253342",
"url": "https://bugzilla.suse.com/1253342"
},
{
"category": "self",
"summary": "SUSE Bug 1253348",
"url": "https://bugzilla.suse.com/1253348"
},
{
"category": "self",
"summary": "SUSE Bug 1253349",
"url": "https://bugzilla.suse.com/1253349"
},
{
"category": "self",
"summary": "SUSE Bug 1253352",
"url": "https://bugzilla.suse.com/1253352"
},
{
"category": "self",
"summary": "SUSE Bug 1253355",
"url": "https://bugzilla.suse.com/1253355"
},
{
"category": "self",
"summary": "SUSE Bug 1253360",
"url": "https://bugzilla.suse.com/1253360"
},
{
"category": "self",
"summary": "SUSE Bug 1253362",
"url": "https://bugzilla.suse.com/1253362"
},
{
"category": "self",
"summary": "SUSE Bug 1253363",
"url": "https://bugzilla.suse.com/1253363"
},
{
"category": "self",
"summary": "SUSE Bug 1253367",
"url": "https://bugzilla.suse.com/1253367"
},
{
"category": "self",
"summary": "SUSE Bug 1253369",
"url": "https://bugzilla.suse.com/1253369"
},
{
"category": "self",
"summary": "SUSE Bug 1253386",
"url": "https://bugzilla.suse.com/1253386"
},
{
"category": "self",
"summary": "SUSE Bug 1253394",
"url": "https://bugzilla.suse.com/1253394"
},
{
"category": "self",
"summary": "SUSE Bug 1253395",
"url": "https://bugzilla.suse.com/1253395"
},
{
"category": "self",
"summary": "SUSE Bug 1253402",
"url": "https://bugzilla.suse.com/1253402"
},
{
"category": "self",
"summary": "SUSE Bug 1253403",
"url": "https://bugzilla.suse.com/1253403"
},
{
"category": "self",
"summary": "SUSE Bug 1253405",
"url": "https://bugzilla.suse.com/1253405"
},
{
"category": "self",
"summary": "SUSE Bug 1253407",
"url": "https://bugzilla.suse.com/1253407"
},
{
"category": "self",
"summary": "SUSE Bug 1253408",
"url": "https://bugzilla.suse.com/1253408"
},
{
"category": "self",
"summary": "SUSE Bug 1253409",
"url": "https://bugzilla.suse.com/1253409"
},
{
"category": "self",
"summary": "SUSE Bug 1253410",
"url": "https://bugzilla.suse.com/1253410"
},
{
"category": "self",
"summary": "SUSE Bug 1253412",
"url": "https://bugzilla.suse.com/1253412"
},
{
"category": "self",
"summary": "SUSE Bug 1253416",
"url": "https://bugzilla.suse.com/1253416"
},
{
"category": "self",
"summary": "SUSE Bug 1253421",
"url": "https://bugzilla.suse.com/1253421"
},
{
"category": "self",
"summary": "SUSE Bug 1253422",
"url": "https://bugzilla.suse.com/1253422"
},
{
"category": "self",
"summary": "SUSE Bug 1253423",
"url": "https://bugzilla.suse.com/1253423"
},
{
"category": "self",
"summary": "SUSE Bug 1253424",
"url": "https://bugzilla.suse.com/1253424"
},
{
"category": "self",
"summary": "SUSE Bug 1253425",
"url": "https://bugzilla.suse.com/1253425"
},
{
"category": "self",
"summary": "SUSE Bug 1253426",
"url": "https://bugzilla.suse.com/1253426"
},
{
"category": "self",
"summary": "SUSE Bug 1253427",
"url": "https://bugzilla.suse.com/1253427"
},
{
"category": "self",
"summary": "SUSE Bug 1253428",
"url": "https://bugzilla.suse.com/1253428"
},
{
"category": "self",
"summary": "SUSE Bug 1253431",
"url": "https://bugzilla.suse.com/1253431"
},
{
"category": "self",
"summary": "SUSE Bug 1253433",
"url": "https://bugzilla.suse.com/1253433"
},
{
"category": "self",
"summary": "SUSE Bug 1253436",
"url": "https://bugzilla.suse.com/1253436"
},
{
"category": "self",
"summary": "SUSE Bug 1253438",
"url": "https://bugzilla.suse.com/1253438"
},
{
"category": "self",
"summary": "SUSE Bug 1253440",
"url": "https://bugzilla.suse.com/1253440"
},
{
"category": "self",
"summary": "SUSE Bug 1253441",
"url": "https://bugzilla.suse.com/1253441"
},
{
"category": "self",
"summary": "SUSE Bug 1253443",
"url": "https://bugzilla.suse.com/1253443"
},
{
"category": "self",
"summary": "SUSE Bug 1253445",
"url": "https://bugzilla.suse.com/1253445"
},
{
"category": "self",
"summary": "SUSE Bug 1253448",
"url": "https://bugzilla.suse.com/1253448"
},
{
"category": "self",
"summary": "SUSE Bug 1253449",
"url": "https://bugzilla.suse.com/1253449"
},
{
"category": "self",
"summary": "SUSE Bug 1253450",
"url": "https://bugzilla.suse.com/1253450"
},
{
"category": "self",
"summary": "SUSE Bug 1253451",
"url": "https://bugzilla.suse.com/1253451"
},
{
"category": "self",
"summary": "SUSE Bug 1253453",
"url": "https://bugzilla.suse.com/1253453"
},
{
"category": "self",
"summary": "SUSE Bug 1253455",
"url": "https://bugzilla.suse.com/1253455"
},
{
"category": "self",
"summary": "SUSE Bug 1253456",
"url": "https://bugzilla.suse.com/1253456"
},
{
"category": "self",
"summary": "SUSE Bug 1253457",
"url": "https://bugzilla.suse.com/1253457"
},
{
"category": "self",
"summary": "SUSE Bug 1253463",
"url": "https://bugzilla.suse.com/1253463"
},
{
"category": "self",
"summary": "SUSE Bug 1253472",
"url": "https://bugzilla.suse.com/1253472"
},
{
"category": "self",
"summary": "SUSE Bug 1253622",
"url": "https://bugzilla.suse.com/1253622"
},
{
"category": "self",
"summary": "SUSE Bug 1253624",
"url": "https://bugzilla.suse.com/1253624"
},
{
"category": "self",
"summary": "SUSE Bug 1253635",
"url": "https://bugzilla.suse.com/1253635"
},
{
"category": "self",
"summary": "SUSE Bug 1253643",
"url": "https://bugzilla.suse.com/1253643"
},
{
"category": "self",
"summary": "SUSE Bug 1253647",
"url": "https://bugzilla.suse.com/1253647"
},
{
"category": "self",
"summary": "SUSE Bug 1254119",
"url": "https://bugzilla.suse.com/1254119"
},
{
"category": "self",
"summary": "SUSE Bug 1254181",
"url": "https://bugzilla.suse.com/1254181"
},
{
"category": "self",
"summary": "SUSE Bug 1254221",
"url": "https://bugzilla.suse.com/1254221"
},
{
"category": "self",
"summary": "SUSE Bug 1254308",
"url": "https://bugzilla.suse.com/1254308"
},
{
"category": "self",
"summary": "SUSE Bug 1254315",
"url": "https://bugzilla.suse.com/1254315"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-50253 page",
"url": "https://www.suse.com/security/cve/CVE-2022-50253/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-37916 page",
"url": "https://www.suse.com/security/cve/CVE-2025-37916/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-38084 page",
"url": "https://www.suse.com/security/cve/CVE-2025-38084/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-38085 page",
"url": "https://www.suse.com/security/cve/CVE-2025-38085/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-38321 page",
"url": "https://www.suse.com/security/cve/CVE-2025-38321/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-38728 page",
"url": "https://www.suse.com/security/cve/CVE-2025-38728/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-39805 page",
"url": "https://www.suse.com/security/cve/CVE-2025-39805/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-39819 page",
"url": "https://www.suse.com/security/cve/CVE-2025-39819/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-39822 page",
"url": "https://www.suse.com/security/cve/CVE-2025-39822/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-39831 page",
"url": "https://www.suse.com/security/cve/CVE-2025-39831/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-39859 page",
"url": "https://www.suse.com/security/cve/CVE-2025-39859/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-39897 page",
"url": "https://www.suse.com/security/cve/CVE-2025-39897/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-39917 page",
"url": "https://www.suse.com/security/cve/CVE-2025-39917/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-39944 page",
"url": "https://www.suse.com/security/cve/CVE-2025-39944/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-39961 page",
"url": "https://www.suse.com/security/cve/CVE-2025-39961/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-39980 page",
"url": "https://www.suse.com/security/cve/CVE-2025-39980/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-39990 page",
"url": "https://www.suse.com/security/cve/CVE-2025-39990/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40001 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40001/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40003 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40003/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40006 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40006/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40021 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40021/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40024 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40024/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40027 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40027/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40031 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40031/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40033 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40033/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40038 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40038/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40047 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40047/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40053 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40053/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40055 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40055/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40059 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40059/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40064 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40064/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40070 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40070/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40074 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40074/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40075 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40075/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40081 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40081/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40083 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40083/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40086 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40086/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40098 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40098/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40101 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40101/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40102 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40102/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40105 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40105/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40107 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40107/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40109 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40109/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40110 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40110/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40111 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40111/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40115 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40115/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40116 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40116/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40118 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40118/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40120 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40120/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40121 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40121/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40127 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40127/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40129 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40129/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40132 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40132/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40133 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40133/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40134 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40134/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40135 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40135/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40139 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40139/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40140 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40140/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40141 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40141/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40142 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40142/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40149 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40149/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40153 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40153/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40154 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40154/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40156 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40156/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40157 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40157/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40158 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40158/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40159 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40159/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40161 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40161/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40162 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40162/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40164 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40164/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40165 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40165/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40166 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40166/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40168 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40168/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40169 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40169/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40171 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40171/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40172 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40172/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40173 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40173/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40175 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40175/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40176 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40176/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40177 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40177/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40178 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40178/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40180 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40180/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40183 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40183/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40185 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40185/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40186 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40186/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40187 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40187/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40188 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40188/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40192 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40192/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40194 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40194/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40196 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40196/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40197 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40197/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40198 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40198/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40200 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40200/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40201 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40201/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40202 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40202/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40203 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40203/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40204 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40204/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40205 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40205/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40206 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40206/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40207 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40207/"
}
],
"title": "Security update for the Linux Kernel",
"tracking": {
"current_release_date": "2025-12-19T16:19:41Z",
"generator": {
"date": "2025-12-19T16:19:41Z",
"engine": {
"name": "cve-database.git:bin/generate-csaf.pl",
"version": "1"
}
},
"id": "SUSE-SU-2026:20021-1",
"initial_release_date": "2025-12-19T16:19:41Z",
"revision_history": [
{
"date": "2025-12-19T16:19:41Z",
"number": "1",
"summary": "Current version"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"product": {
"name": "cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"product_id": "cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le"
}
},
{
"category": "product_version",
"name": "dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"product": {
"name": "dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"product_id": "dlm-kmp-default-6.12.0-160000.8.1.ppc64le"
}
},
{
"category": "product_version",
"name": "gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"product": {
"name": "gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"product_id": "gfs2-kmp-default-6.12.0-160000.8.1.ppc64le"
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"product": {
"name": "cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"product_id": "cluster-md-kmp-default-6.12.0-160000.8.1.s390x"
}
},
{
"category": "product_version",
"name": "dlm-kmp-default-6.12.0-160000.8.1.s390x",
"product": {
"name": "dlm-kmp-default-6.12.0-160000.8.1.s390x",
"product_id": "dlm-kmp-default-6.12.0-160000.8.1.s390x"
}
},
{
"category": "product_version",
"name": "gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"product": {
"name": "gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"product_id": "gfs2-kmp-default-6.12.0-160000.8.1.s390x"
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"product": {
"name": "cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"product_id": "cluster-md-kmp-default-6.12.0-160000.8.1.x86_64"
}
},
{
"category": "product_version",
"name": "dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"product": {
"name": "dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"product_id": "dlm-kmp-default-6.12.0-160000.8.1.x86_64"
}
},
{
"category": "product_version",
"name": "gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"product": {
"name": "gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"product_id": "gfs2-kmp-default-6.12.0-160000.8.1.x86_64"
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_name",
"name": "SUSE Linux Enterprise High Availability Extension 16.0",
"product": {
"name": "SUSE Linux Enterprise High Availability Extension 16.0",
"product_id": "SUSE Linux Enterprise High Availability Extension 16.0",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle-ha:16.0"
}
}
}
],
"category": "product_family",
"name": "SUSE Linux Enterprise"
}
],
"category": "vendor",
"name": "SUSE"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le as component of SUSE Linux Enterprise High Availability Extension 16.0",
"product_id": "SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le"
},
"product_reference": "cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cluster-md-kmp-default-6.12.0-160000.8.1.s390x as component of SUSE Linux Enterprise High Availability Extension 16.0",
"product_id": "SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x"
},
"product_reference": "cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cluster-md-kmp-default-6.12.0-160000.8.1.x86_64 as component of SUSE Linux Enterprise High Availability Extension 16.0",
"product_id": "SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64"
},
"product_reference": "cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dlm-kmp-default-6.12.0-160000.8.1.ppc64le as component of SUSE Linux Enterprise High Availability Extension 16.0",
"product_id": "SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le"
},
"product_reference": "dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dlm-kmp-default-6.12.0-160000.8.1.s390x as component of SUSE Linux Enterprise High Availability Extension 16.0",
"product_id": "SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x"
},
"product_reference": "dlm-kmp-default-6.12.0-160000.8.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dlm-kmp-default-6.12.0-160000.8.1.x86_64 as component of SUSE Linux Enterprise High Availability Extension 16.0",
"product_id": "SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64"
},
"product_reference": "dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "gfs2-kmp-default-6.12.0-160000.8.1.ppc64le as component of SUSE Linux Enterprise High Availability Extension 16.0",
"product_id": "SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le"
},
"product_reference": "gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "gfs2-kmp-default-6.12.0-160000.8.1.s390x as component of SUSE Linux Enterprise High Availability Extension 16.0",
"product_id": "SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x"
},
"product_reference": "gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "gfs2-kmp-default-6.12.0-160000.8.1.x86_64 as component of SUSE Linux Enterprise High Availability Extension 16.0",
"product_id": "SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64"
},
"product_reference": "gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 16.0"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2022-50253",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-50253"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nbpf: make sure skb-\u003elen != 0 when redirecting to a tunneling device\n\nsyzkaller managed to trigger another case where skb-\u003elen == 0\nwhen we enter __dev_queue_xmit:\n\nWARNING: CPU: 0 PID: 2470 at include/linux/skbuff.h:2576 skb_assert_len include/linux/skbuff.h:2576 [inline]\nWARNING: CPU: 0 PID: 2470 at include/linux/skbuff.h:2576 __dev_queue_xmit+0x2069/0x35e0 net/core/dev.c:4295\n\nCall Trace:\n dev_queue_xmit+0x17/0x20 net/core/dev.c:4406\n __bpf_tx_skb net/core/filter.c:2115 [inline]\n __bpf_redirect_no_mac net/core/filter.c:2140 [inline]\n __bpf_redirect+0x5fb/0xda0 net/core/filter.c:2163\n ____bpf_clone_redirect net/core/filter.c:2447 [inline]\n bpf_clone_redirect+0x247/0x390 net/core/filter.c:2419\n bpf_prog_48159a89cb4a9a16+0x59/0x5e\n bpf_dispatcher_nop_func include/linux/bpf.h:897 [inline]\n __bpf_prog_run include/linux/filter.h:596 [inline]\n bpf_prog_run include/linux/filter.h:603 [inline]\n bpf_test_run+0x46c/0x890 net/bpf/test_run.c:402\n bpf_prog_test_run_skb+0xbdc/0x14c0 net/bpf/test_run.c:1170\n bpf_prog_test_run+0x345/0x3c0 kernel/bpf/syscall.c:3648\n __sys_bpf+0x43a/0x6c0 kernel/bpf/syscall.c:5005\n __do_sys_bpf kernel/bpf/syscall.c:5091 [inline]\n __se_sys_bpf kernel/bpf/syscall.c:5089 [inline]\n __x64_sys_bpf+0x7c/0x90 kernel/bpf/syscall.c:5089\n do_syscall_64+0x54/0x70 arch/x86/entry/common.c:48\n entry_SYSCALL_64_after_hwframe+0x61/0xc6\n\nThe reproducer doesn\u0027t really reproduce outside of syzkaller\nenvironment, so I\u0027m taking a guess here. It looks like we\ndo generate correct ETH_HLEN-sized packet, but we redirect\nthe packet to the tunneling device. Before we do so, we\n__skb_pull l2 header and arrive again at skb-\u003elen == 0.\nDoesn\u0027t seem like we can do anything better than having\nan explicit check after __skb_pull?",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-50253",
"url": "https://www.suse.com/security/cve/CVE-2022-50253"
},
{
"category": "external",
"summary": "SUSE Bug 1249912 for CVE-2022-50253",
"url": "https://bugzilla.suse.com/1249912"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-19T16:19:41Z",
"details": "moderate"
}
],
"title": "CVE-2022-50253"
},
{
"cve": "CVE-2025-37916",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-37916"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\npds_core: remove write-after-free of client_id\n\nA use-after-free error popped up in stress testing:\n\n[Mon Apr 21 21:21:33 2025] BUG: KFENCE: use-after-free write in pdsc_auxbus_dev_del+0xef/0x160 [pds_core]\n[Mon Apr 21 21:21:33 2025] Use-after-free write at 0x000000007013ecd1 (in kfence-#47):\n[Mon Apr 21 21:21:33 2025] pdsc_auxbus_dev_del+0xef/0x160 [pds_core]\n[Mon Apr 21 21:21:33 2025] pdsc_remove+0xc0/0x1b0 [pds_core]\n[Mon Apr 21 21:21:33 2025] pci_device_remove+0x24/0x70\n[Mon Apr 21 21:21:33 2025] device_release_driver_internal+0x11f/0x180\n[Mon Apr 21 21:21:33 2025] driver_detach+0x45/0x80\n[Mon Apr 21 21:21:33 2025] bus_remove_driver+0x83/0xe0\n[Mon Apr 21 21:21:33 2025] pci_unregister_driver+0x1a/0x80\n\nThe actual device uninit usually happens on a separate thread\nscheduled after this code runs, but there is no guarantee of order\nof thread execution, so this could be a problem. There\u0027s no\nactual need to clear the client_id at this point, so simply\nremove the offending code.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-37916",
"url": "https://www.suse.com/security/cve/CVE-2025-37916"
},
{
"category": "external",
"summary": "SUSE Bug 1243474 for CVE-2025-37916",
"url": "https://bugzilla.suse.com/1243474"
},
{
"category": "external",
"summary": "SUSE Bug 1243535 for CVE-2025-37916",
"url": "https://bugzilla.suse.com/1243535"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-19T16:19:41Z",
"details": "moderate"
}
],
"title": "CVE-2025-37916"
},
{
"cve": "CVE-2025-38084",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-38084"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nmm/hugetlb: unshare page tables during VMA split, not before\n\nCurrently, __split_vma() triggers hugetlb page table unsharing through\nvm_ops-\u003emay_split(). This happens before the VMA lock and rmap locks are\ntaken - which is too early, it allows racing VMA-locked page faults in our\nprocess and racing rmap walks from other processes to cause page tables to\nbe shared again before we actually perform the split.\n\nFix it by explicitly calling into the hugetlb unshare logic from\n__split_vma() in the same place where THP splitting also happens. At that\npoint, both the VMA and the rmap(s) are write-locked.\n\nAn annoying detail is that we can now call into the helper\nhugetlb_unshare_pmds() from two different locking contexts:\n\n1. from hugetlb_split(), holding:\n - mmap lock (exclusively)\n - VMA lock\n - file rmap lock (exclusively)\n2. hugetlb_unshare_all_pmds(), which I think is designed to be able to\n call us with only the mmap lock held (in shared mode), but currently\n only runs while holding mmap lock (exclusively) and VMA lock\n\nBackporting note:\nThis commit fixes a racy protection that was introduced in commit\nb30c14cd6102 (\"hugetlb: unshare some PMDs when splitting VMAs\"); that\ncommit claimed to fix an issue introduced in 5.13, but it should actually\nalso go all the way back.\n\n[jannh@google.com: v2]",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-38084",
"url": "https://www.suse.com/security/cve/CVE-2025-38084"
},
{
"category": "external",
"summary": "SUSE Bug 1245498 for CVE-2025-38084",
"url": "https://bugzilla.suse.com/1245498"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.8,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-19T16:19:41Z",
"details": "moderate"
}
],
"title": "CVE-2025-38084"
},
{
"cve": "CVE-2025-38085",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-38085"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nmm/hugetlb: fix huge_pmd_unshare() vs GUP-fast race\n\nhuge_pmd_unshare() drops a reference on a page table that may have\npreviously been shared across processes, potentially turning it into a\nnormal page table used in another process in which unrelated VMAs can\nafterwards be installed.\n\nIf this happens in the middle of a concurrent gup_fast(), gup_fast() could\nend up walking the page tables of another process. While I don\u0027t see any\nway in which that immediately leads to kernel memory corruption, it is\nreally weird and unexpected.\n\nFix it with an explicit broadcast IPI through tlb_remove_table_sync_one(),\njust like we do in khugepaged when removing page tables for a THP\ncollapse.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-38085",
"url": "https://www.suse.com/security/cve/CVE-2025-38085"
},
{
"category": "external",
"summary": "SUSE Bug 1245499 for CVE-2025-38085",
"url": "https://bugzilla.suse.com/1245499"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.6,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-19T16:19:41Z",
"details": "moderate"
}
],
"title": "CVE-2025-38085"
},
{
"cve": "CVE-2025-38321",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-38321"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nsmb: Log an error when close_all_cached_dirs fails\n\nUnder low-memory conditions, close_all_cached_dirs() can\u0027t move the\ndentries to a separate list to dput() them once the locks are dropped.\nThis will result in a \"Dentry still in use\" error, so add an error\nmessage that makes it clear this is what happened:\n\n[ 495.281119] CIFS: VFS: \\\\otters.example.com\\share Out of memory while dropping dentries\n[ 495.281595] ------------[ cut here ]------------\n[ 495.281887] BUG: Dentry ffff888115531138{i=78,n=/} still in use (2) [unmount of cifs cifs]\n[ 495.282391] WARNING: CPU: 1 PID: 2329 at fs/dcache.c:1536 umount_check+0xc8/0xf0\n\nAlso, bail out of looping through all tcons as soon as a single\nallocation fails, since we\u0027re already in trouble, and kmalloc() attempts\nfor subseqeuent tcons are likely to fail just like the first one did.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-38321",
"url": "https://www.suse.com/security/cve/CVE-2025-38321"
},
{
"category": "external",
"summary": "SUSE Bug 1246328 for CVE-2025-38321",
"url": "https://bugzilla.suse.com/1246328"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-19T16:19:41Z",
"details": "moderate"
}
],
"title": "CVE-2025-38321"
},
{
"cve": "CVE-2025-38728",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-38728"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nsmb3: fix for slab out of bounds on mount to ksmbd\n\nWith KASAN enabled, it is possible to get a slab out of bounds\nduring mount to ksmbd due to missing check in parse_server_interfaces()\n(see below):\n\n BUG: KASAN: slab-out-of-bounds in\n parse_server_interfaces+0x14ee/0x1880 [cifs]\n Read of size 4 at addr ffff8881433dba98 by task mount/9827\n\n CPU: 5 UID: 0 PID: 9827 Comm: mount Tainted: G\n OE 6.16.0-rc2-kasan #2 PREEMPT(voluntary)\n Tainted: [O]=OOT_MODULE, [E]=UNSIGNED_MODULE\n Hardware name: Dell Inc. Precision Tower 3620/0MWYPT,\n BIOS 2.13.1 06/14/2019\n Call Trace:\n \u003cTASK\u003e\n dump_stack_lvl+0x9f/0xf0\n print_report+0xd1/0x670\n __virt_addr_valid+0x22c/0x430\n ? parse_server_interfaces+0x14ee/0x1880 [cifs]\n ? kasan_complete_mode_report_info+0x2a/0x1f0\n ? parse_server_interfaces+0x14ee/0x1880 [cifs]\n kasan_report+0xd6/0x110\n parse_server_interfaces+0x14ee/0x1880 [cifs]\n __asan_report_load_n_noabort+0x13/0x20\n parse_server_interfaces+0x14ee/0x1880 [cifs]\n ? __pfx_parse_server_interfaces+0x10/0x10 [cifs]\n ? trace_hardirqs_on+0x51/0x60\n SMB3_request_interfaces+0x1ad/0x3f0 [cifs]\n ? __pfx_SMB3_request_interfaces+0x10/0x10 [cifs]\n ? SMB2_tcon+0x23c/0x15d0 [cifs]\n smb3_qfs_tcon+0x173/0x2b0 [cifs]\n ? __pfx_smb3_qfs_tcon+0x10/0x10 [cifs]\n ? cifs_get_tcon+0x105d/0x2120 [cifs]\n ? do_raw_spin_unlock+0x5d/0x200\n ? cifs_get_tcon+0x105d/0x2120 [cifs]\n ? __pfx_smb3_qfs_tcon+0x10/0x10 [cifs]\n cifs_mount_get_tcon+0x369/0xb90 [cifs]\n ? dfs_cache_find+0xe7/0x150 [cifs]\n dfs_mount_share+0x985/0x2970 [cifs]\n ? check_path.constprop.0+0x28/0x50\n ? save_trace+0x54/0x370\n ? __pfx_dfs_mount_share+0x10/0x10 [cifs]\n ? __lock_acquire+0xb82/0x2ba0\n ? __kasan_check_write+0x18/0x20\n cifs_mount+0xbc/0x9e0 [cifs]\n ? __pfx_cifs_mount+0x10/0x10 [cifs]\n ? do_raw_spin_unlock+0x5d/0x200\n ? cifs_setup_cifs_sb+0x29d/0x810 [cifs]\n cifs_smb3_do_mount+0x263/0x1990 [cifs]",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-38728",
"url": "https://www.suse.com/security/cve/CVE-2025-38728"
},
{
"category": "external",
"summary": "SUSE Bug 1249256 for CVE-2025-38728",
"url": "https://bugzilla.suse.com/1249256"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-19T16:19:41Z",
"details": "moderate"
}
],
"title": "CVE-2025-38728"
},
{
"cve": "CVE-2025-39805",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-39805"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nnet: macb: fix unregister_netdev call order in macb_remove()\n\nWhen removing a macb device, the driver calls phy_exit() before\nunregister_netdev(). This leads to a WARN from kernfs:\n\n ------------[ cut here ]------------\n kernfs: can not remove \u0027attached_dev\u0027, no directory\n WARNING: CPU: 1 PID: 27146 at fs/kernfs/dir.c:1683\n Call trace:\n kernfs_remove_by_name_ns+0xd8/0xf0\n sysfs_remove_link+0x24/0x58\n phy_detach+0x5c/0x168\n phy_disconnect+0x4c/0x70\n phylink_disconnect_phy+0x6c/0xc0 [phylink]\n macb_close+0x6c/0x170 [macb]\n ...\n macb_remove+0x60/0x168 [macb]\n platform_remove+0x5c/0x80\n ...\n\nThe warning happens because the PHY is being exited while the netdev\nis still registered. The correct order is to unregister the netdev\nbefore shutting down the PHY and cleaning up the MDIO bus.\n\nFix this by moving unregister_netdev() ahead of phy_exit() in\nmacb_remove().",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-39805",
"url": "https://www.suse.com/security/cve/CVE-2025-39805"
},
{
"category": "external",
"summary": "SUSE Bug 1249982 for CVE-2025-39805",
"url": "https://bugzilla.suse.com/1249982"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-19T16:19:41Z",
"details": "moderate"
}
],
"title": "CVE-2025-39805"
},
{
"cve": "CVE-2025-39819",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-39819"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nfs/smb: Fix inconsistent refcnt update\n\nA possible inconsistent update of refcount was identified in `smb2_compound_op`.\nSuch inconsistent update could lead to possible resource leaks.\n\nWhy it is a possible bug:\n1. In the comment section of the function, it clearly states that the\nreference to `cfile` should be dropped after calling this function.\n2. Every control flow path would check and drop the reference to\n`cfile`, except the patched one.\n3. Existing callers would not handle refcount update of `cfile` if\n-ENOMEM is returned.\n\nTo fix the bug, an extra goto label \"out\" is added, to make sure that the\ncleanup logic would always be respected. As the problem is caused by the\nallocation failure of `vars`, the cleanup logic between label \"finished\"\nand \"out\" can be safely ignored. According to the definition of function\n`is_replayable_error`, the error code of \"-ENOMEM\" is not recoverable.\nTherefore, the replay logic also gets ignored.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-39819",
"url": "https://www.suse.com/security/cve/CVE-2025-39819"
},
{
"category": "external",
"summary": "SUSE Bug 1250176 for CVE-2025-39819",
"url": "https://bugzilla.suse.com/1250176"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-19T16:19:41Z",
"details": "moderate"
}
],
"title": "CVE-2025-39819"
},
{
"cve": "CVE-2025-39822",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-39822"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nio_uring/kbuf: fix signedness in this_len calculation\n\nWhen importing and using buffers, buf-\u003elen is considered unsigned.\nHowever, buf-\u003elen is converted to signed int when committing. This can\nlead to unexpected behavior if the buffer is large enough to be\ninterpreted as a negative value. Make min_t calculation unsigned.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-39822",
"url": "https://www.suse.com/security/cve/CVE-2025-39822"
},
{
"category": "external",
"summary": "SUSE Bug 1250034 for CVE-2025-39822",
"url": "https://bugzilla.suse.com/1250034"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-19T16:19:41Z",
"details": "moderate"
}
],
"title": "CVE-2025-39822"
},
{
"cve": "CVE-2025-39831",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-39831"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nfbnic: Move phylink resume out of service_task and into open/close\n\nThe fbnic driver was presenting with the following locking assert coming\nout of a PM resume:\n[ 42.208116][ T164] RTNL: assertion failed at drivers/net/phy/phylink.c (2611)\n[ 42.208492][ T164] WARNING: CPU: 1 PID: 164 at drivers/net/phy/phylink.c:2611 phylink_resume+0x190/0x1e0\n[ 42.208872][ T164] Modules linked in:\n[ 42.209140][ T164] CPU: 1 UID: 0 PID: 164 Comm: bash Not tainted 6.17.0-rc2-virtme #134 PREEMPT(full)\n[ 42.209496][ T164] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.17.0-5.fc42 04/01/2014\n[ 42.209861][ T164] RIP: 0010:phylink_resume+0x190/0x1e0\n[ 42.210057][ T164] Code: 83 e5 01 0f 85 b0 fe ff ff c6 05 1c cd 3e 02 01 90 ba 33 0a 00 00 48 c7 c6 20 3a 1d a5 48 c7 c7 e0 3e 1d a5 e8 21 b8 90 fe 90 \u003c0f\u003e 0b 90 90 e9 86 fe ff ff e8 42 ea 1f ff e9 e2 fe ff ff 48 89 ef\n[ 42.210708][ T164] RSP: 0018:ffffc90000affbd8 EFLAGS: 00010296\n[ 42.210983][ T164] RAX: 0000000000000000 RBX: ffff8880078d8400 RCX: 0000000000000000\n[ 42.211235][ T164] RDX: 0000000000000000 RSI: 1ffffffff4f10938 RDI: 0000000000000001\n[ 42.211466][ T164] RBP: 0000000000000000 R08: ffffffffa2ae79ea R09: fffffbfff4b3eb84\n[ 42.211707][ T164] R10: 0000000000000003 R11: 0000000000000000 R12: ffff888007ad8000\n[ 42.211997][ T164] R13: 0000000000000002 R14: ffff888006a18800 R15: ffffffffa34c59e0\n[ 42.212234][ T164] FS: 00007f0dc8e39740(0000) GS:ffff88808f51f000(0000) knlGS:0000000000000000\n[ 42.212505][ T164] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033\n[ 42.212704][ T164] CR2: 00007f0dc8e9fe10 CR3: 000000000b56d003 CR4: 0000000000772ef0\n[ 42.213227][ T164] PKRU: 55555554\n[ 42.213366][ T164] Call Trace:\n[ 42.213483][ T164] \u003cTASK\u003e\n[ 42.213565][ T164] __fbnic_pm_attach.isra.0+0x8e/0xa0\n[ 42.213725][ T164] pci_reset_function+0x116/0x1d0\n[ 42.213895][ T164] reset_store+0xa0/0x100\n[ 42.214025][ T164] ? pci_dev_reset_attr_is_visible+0x50/0x50\n[ 42.214221][ T164] ? sysfs_file_kobj+0xc1/0x1e0\n[ 42.214374][ T164] ? sysfs_kf_write+0x65/0x160\n[ 42.214526][ T164] kernfs_fop_write_iter+0x2f8/0x4c0\n[ 42.214677][ T164] ? kernfs_vma_page_mkwrite+0x1f0/0x1f0\n[ 42.214836][ T164] new_sync_write+0x308/0x6f0\n[ 42.214987][ T164] ? __lock_acquire+0x34c/0x740\n[ 42.215135][ T164] ? new_sync_read+0x6f0/0x6f0\n[ 42.215288][ T164] ? lock_acquire.part.0+0xbc/0x260\n[ 42.215440][ T164] ? ksys_write+0xff/0x200\n[ 42.215590][ T164] ? perf_trace_sched_switch+0x6d0/0x6d0\n[ 42.215742][ T164] vfs_write+0x65e/0xbb0\n[ 42.215876][ T164] ksys_write+0xff/0x200\n[ 42.215994][ T164] ? __ia32_sys_read+0xc0/0xc0\n[ 42.216141][ T164] ? do_user_addr_fault+0x269/0x9f0\n[ 42.216292][ T164] ? rcu_is_watching+0x15/0xd0\n[ 42.216442][ T164] do_syscall_64+0xbb/0x360\n[ 42.216591][ T164] entry_SYSCALL_64_after_hwframe+0x4b/0x53\n[ 42.216784][ T164] RIP: 0033:0x7f0dc8ea9986\n\nA bit of digging showed that we were invoking the phylink_resume as a part\nof the fbnic_up path when we were enabling the service task while not\nholding the RTNL lock. We should be enabling this sooner as a part of the\nndo_open path and then just letting the service task come online later.\nThis will help to enforce the correct locking and brings the phylink\ninterface online at the same time as the network interface, instead of at a\nlater time.\n\nI tested this on QEMU to verify this was working by putting the system to\nsleep using \"echo mem \u003e /sys/power/state\" to put the system to sleep in the\nguest and then using the command \"system_wakeup\" in the QEMU monitor.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-39831",
"url": "https://www.suse.com/security/cve/CVE-2025-39831"
},
{
"category": "external",
"summary": "SUSE Bug 1249977 for CVE-2025-39831",
"url": "https://bugzilla.suse.com/1249977"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-19T16:19:41Z",
"details": "moderate"
}
],
"title": "CVE-2025-39831"
},
{
"cve": "CVE-2025-39859",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-39859"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nptp: ocp: fix use-after-free bugs causing by ptp_ocp_watchdog\n\nThe ptp_ocp_detach() only shuts down the watchdog timer if it is\npending. However, if the timer handler is already running, the\ntimer_delete_sync() is not called. This leads to race conditions\nwhere the devlink that contains the ptp_ocp is deallocated while\nthe timer handler is still accessing it, resulting in use-after-free\nbugs. The following details one of the race scenarios.\n\n(thread 1) | (thread 2)\nptp_ocp_remove() |\n ptp_ocp_detach() | ptp_ocp_watchdog()\n if (timer_pending(\u0026bp-\u003ewatchdog))| bp = timer_container_of()\n timer_delete_sync() |\n |\n devlink_free(devlink) //free |\n | bp-\u003e //use\n\nResolve this by unconditionally calling timer_delete_sync() to ensure\nthe timer is reliably deactivated, preventing any access after free.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-39859",
"url": "https://www.suse.com/security/cve/CVE-2025-39859"
},
{
"category": "external",
"summary": "SUSE Bug 1250252 for CVE-2025-39859",
"url": "https://bugzilla.suse.com/1250252"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-19T16:19:41Z",
"details": "moderate"
}
],
"title": "CVE-2025-39859"
},
{
"cve": "CVE-2025-39897",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-39897"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nnet: xilinx: axienet: Add error handling for RX metadata pointer retrieval\n\nAdd proper error checking for dmaengine_desc_get_metadata_ptr() which\ncan return an error pointer and lead to potential crashes or undefined\nbehaviour if the pointer retrieval fails.\n\nProperly handle the error by unmapping DMA buffer, freeing the skb and\nreturning early to prevent further processing with invalid data.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-39897",
"url": "https://www.suse.com/security/cve/CVE-2025-39897"
},
{
"category": "external",
"summary": "SUSE Bug 1250746 for CVE-2025-39897",
"url": "https://bugzilla.suse.com/1250746"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.6,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-19T16:19:41Z",
"details": "moderate"
}
],
"title": "CVE-2025-39897"
},
{
"cve": "CVE-2025-39917",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-39917"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nbpf: Fix out-of-bounds dynptr write in bpf_crypto_crypt\n\nStanislav reported that in bpf_crypto_crypt() the destination dynptr\u0027s\nsize is not validated to be at least as large as the source dynptr\u0027s\nsize before calling into the crypto backend with \u0027len = src_len\u0027. This\ncan result in an OOB write when the destination is smaller than the\nsource.\n\nConcretely, in mentioned function, psrc and pdst are both linear\nbuffers fetched from each dynptr:\n\n psrc = __bpf_dynptr_data(src, src_len);\n [...]\n pdst = __bpf_dynptr_data_rw(dst, dst_len);\n [...]\n err = decrypt ?\n ctx-\u003etype-\u003edecrypt(ctx-\u003etfm, psrc, pdst, src_len, piv) :\n ctx-\u003etype-\u003eencrypt(ctx-\u003etfm, psrc, pdst, src_len, piv);\n\nThe crypto backend expects pdst to be large enough with a src_len length\nthat can be written. Add an additional src_len \u003e dst_len check and bail\nout if it\u0027s the case. Note that these kfuncs are accessible under root\nprivileges only.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-39917",
"url": "https://www.suse.com/security/cve/CVE-2025-39917"
},
{
"category": "external",
"summary": "SUSE Bug 1250723 for CVE-2025-39917",
"url": "https://bugzilla.suse.com/1250723"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:H/A:N",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-19T16:19:41Z",
"details": "moderate"
}
],
"title": "CVE-2025-39917"
},
{
"cve": "CVE-2025-39944",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-39944"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nocteontx2-pf: Fix use-after-free bugs in otx2_sync_tstamp()\n\nThe original code relies on cancel_delayed_work() in otx2_ptp_destroy(),\nwhich does not ensure that the delayed work item synctstamp_work has fully\ncompleted if it was already running. This leads to use-after-free scenarios\nwhere otx2_ptp is deallocated by otx2_ptp_destroy(), while synctstamp_work\nremains active and attempts to dereference otx2_ptp in otx2_sync_tstamp().\nFurthermore, the synctstamp_work is cyclic, the likelihood of triggering\nthe bug is nonnegligible.\n\nA typical race condition is illustrated below:\n\nCPU 0 (cleanup) | CPU 1 (delayed work callback)\notx2_remove() |\n otx2_ptp_destroy() | otx2_sync_tstamp()\n cancel_delayed_work() |\n kfree(ptp) |\n | ptp = container_of(...); //UAF\n | ptp-\u003e //UAF\n\nThis is confirmed by a KASAN report:\n\nBUG: KASAN: slab-use-after-free in __run_timer_base.part.0+0x7d7/0x8c0\nWrite of size 8 at addr ffff88800aa09a18 by task bash/136\n...\nCall Trace:\n \u003cIRQ\u003e\n dump_stack_lvl+0x55/0x70\n print_report+0xcf/0x610\n ? __run_timer_base.part.0+0x7d7/0x8c0\n kasan_report+0xb8/0xf0\n ? __run_timer_base.part.0+0x7d7/0x8c0\n __run_timer_base.part.0+0x7d7/0x8c0\n ? __pfx___run_timer_base.part.0+0x10/0x10\n ? __pfx_read_tsc+0x10/0x10\n ? ktime_get+0x60/0x140\n ? lapic_next_event+0x11/0x20\n ? clockevents_program_event+0x1d4/0x2a0\n run_timer_softirq+0xd1/0x190\n handle_softirqs+0x16a/0x550\n irq_exit_rcu+0xaf/0xe0\n sysvec_apic_timer_interrupt+0x70/0x80\n \u003c/IRQ\u003e\n...\nAllocated by task 1:\n kasan_save_stack+0x24/0x50\n kasan_save_track+0x14/0x30\n __kasan_kmalloc+0x7f/0x90\n otx2_ptp_init+0xb1/0x860\n otx2_probe+0x4eb/0xc30\n local_pci_probe+0xdc/0x190\n pci_device_probe+0x2fe/0x470\n really_probe+0x1ca/0x5c0\n __driver_probe_device+0x248/0x310\n driver_probe_device+0x44/0x120\n __driver_attach+0xd2/0x310\n bus_for_each_dev+0xed/0x170\n bus_add_driver+0x208/0x500\n driver_register+0x132/0x460\n do_one_initcall+0x89/0x300\n kernel_init_freeable+0x40d/0x720\n kernel_init+0x1a/0x150\n ret_from_fork+0x10c/0x1a0\n ret_from_fork_asm+0x1a/0x30\n\nFreed by task 136:\n kasan_save_stack+0x24/0x50\n kasan_save_track+0x14/0x30\n kasan_save_free_info+0x3a/0x60\n __kasan_slab_free+0x3f/0x50\n kfree+0x137/0x370\n otx2_ptp_destroy+0x38/0x80\n otx2_remove+0x10d/0x4c0\n pci_device_remove+0xa6/0x1d0\n device_release_driver_internal+0xf8/0x210\n pci_stop_bus_device+0x105/0x150\n pci_stop_and_remove_bus_device_locked+0x15/0x30\n remove_store+0xcc/0xe0\n kernfs_fop_write_iter+0x2c3/0x440\n vfs_write+0x871/0xd70\n ksys_write+0xee/0x1c0\n do_syscall_64+0xac/0x280\n entry_SYSCALL_64_after_hwframe+0x77/0x7f\n...\n\nReplace cancel_delayed_work() with cancel_delayed_work_sync() to ensure\nthat the delayed work item is properly canceled before the otx2_ptp is\ndeallocated.\n\nThis bug was initially identified through static analysis. To reproduce\nand test it, I simulated the OcteonTX2 PCI device in QEMU and introduced\nartificial delays within the otx2_sync_tstamp() function to increase the\nlikelihood of triggering the bug.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-39944",
"url": "https://www.suse.com/security/cve/CVE-2025-39944"
},
{
"category": "external",
"summary": "SUSE Bug 1251120 for CVE-2025-39944",
"url": "https://bugzilla.suse.com/1251120"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-19T16:19:41Z",
"details": "moderate"
}
],
"title": "CVE-2025-39944"
},
{
"cve": "CVE-2025-39961",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-39961"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\niommu/amd/pgtbl: Fix possible race while increase page table level\n\nThe AMD IOMMU host page table implementation supports dynamic page table levels\n(up to 6 levels), starting with a 3-level configuration that expands based on\nIOVA address. The kernel maintains a root pointer and current page table level\nto enable proper page table walks in alloc_pte()/fetch_pte() operations.\n\nThe IOMMU IOVA allocator initially starts with 32-bit address and onces its\nexhuasted it switches to 64-bit address (max address is determined based\non IOMMU and device DMA capability). To support larger IOVA, AMD IOMMU\ndriver increases page table level.\n\nBut in unmap path (iommu_v1_unmap_pages()), fetch_pte() reads\npgtable-\u003e[root/mode] without lock. So its possible that in exteme corner case,\nwhen increase_address_space() is updating pgtable-\u003e[root/mode], fetch_pte()\nreads wrong page table level (pgtable-\u003emode). It does compare the value with\nlevel encoded in page table and returns NULL. This will result is\niommu_unmap ops to fail and upper layer may retry/log WARN_ON.\n\nCPU 0 CPU 1\n------ ------\nmap pages unmap pages\nalloc_pte() -\u003e increase_address_space() iommu_v1_unmap_pages() -\u003e fetch_pte()\n pgtable-\u003eroot = pte (new root value)\n READ pgtable-\u003e[mode/root]\n\t\t\t\t\t Reads new root, old mode\n Updates mode (pgtable-\u003emode += 1)\n\nSince Page table level updates are infrequent and already synchronized with a\nspinlock, implement seqcount to enable lock-free read operations on the read path.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-39961",
"url": "https://www.suse.com/security/cve/CVE-2025-39961"
},
{
"category": "external",
"summary": "SUSE Bug 1251817 for CVE-2025-39961",
"url": "https://bugzilla.suse.com/1251817"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.8,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-19T16:19:41Z",
"details": "moderate"
}
],
"title": "CVE-2025-39961"
},
{
"cve": "CVE-2025-39980",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-39980"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nnexthop: Forbid FDB status change while nexthop is in a group\n\nThe kernel forbids the creation of non-FDB nexthop groups with FDB\nnexthops:\n\n # ip nexthop add id 1 via 192.0.2.1 fdb\n # ip nexthop add id 2 group 1\n Error: Non FDB nexthop group cannot have fdb nexthops.\n\nAnd vice versa:\n\n # ip nexthop add id 3 via 192.0.2.2 dev dummy1\n # ip nexthop add id 4 group 3 fdb\n Error: FDB nexthop group can only have fdb nexthops.\n\nHowever, as long as no routes are pointing to a non-FDB nexthop group,\nthe kernel allows changing the type of a nexthop from FDB to non-FDB and\nvice versa:\n\n # ip nexthop add id 5 via 192.0.2.2 dev dummy1\n # ip nexthop add id 6 group 5\n # ip nexthop replace id 5 via 192.0.2.2 fdb\n # echo $?\n 0\n\nThis configuration is invalid and can result in a NPD [1] since FDB\nnexthops are not associated with a nexthop device:\n\n # ip route add 198.51.100.1/32 nhid 6\n # ping 198.51.100.1\n\nFix by preventing nexthop FDB status change while the nexthop is in a\ngroup:\n\n # ip nexthop add id 7 via 192.0.2.2 dev dummy1\n # ip nexthop add id 8 group 7\n # ip nexthop replace id 7 via 192.0.2.2 fdb\n Error: Cannot change nexthop FDB status while in a group.\n\n[1]\nBUG: kernel NULL pointer dereference, address: 00000000000003c0\n[...]\nOops: Oops: 0000 [#1] SMP\nCPU: 6 UID: 0 PID: 367 Comm: ping Not tainted 6.17.0-rc6-virtme-gb65678cacc03 #1 PREEMPT(voluntary)\nHardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.17.0-4.fc41 04/01/2014\nRIP: 0010:fib_lookup_good_nhc+0x1e/0x80\n[...]\nCall Trace:\n \u003cTASK\u003e\n fib_table_lookup+0x541/0x650\n ip_route_output_key_hash_rcu+0x2ea/0x970\n ip_route_output_key_hash+0x55/0x80\n __ip4_datagram_connect+0x250/0x330\n udp_connect+0x2b/0x60\n __sys_connect+0x9c/0xd0\n __x64_sys_connect+0x18/0x20\n do_syscall_64+0xa4/0x2a0\n entry_SYSCALL_64_after_hwframe+0x4b/0x53",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-39980",
"url": "https://www.suse.com/security/cve/CVE-2025-39980"
},
{
"category": "external",
"summary": "SUSE Bug 1252063 for CVE-2025-39980",
"url": "https://bugzilla.suse.com/1252063"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-19T16:19:41Z",
"details": "moderate"
}
],
"title": "CVE-2025-39980"
},
{
"cve": "CVE-2025-39990",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-39990"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nbpf: Check the helper function is valid in get_helper_proto\n\nkernel test robot reported verifier bug [1] where the helper func\npointer could be NULL due to disabled config option.\n\nAs Alexei suggested we could check on that in get_helper_proto\ndirectly. Marking tail_call helper func with BPF_PTR_POISON,\nbecause it is unused by design.\n\n [1] https://lore.kernel.org/oe-lkp/202507160818.68358831-lkp@intel.com",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-39990",
"url": "https://www.suse.com/security/cve/CVE-2025-39990"
},
{
"category": "external",
"summary": "SUSE Bug 1252054 for CVE-2025-39990",
"url": "https://bugzilla.suse.com/1252054"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-19T16:19:41Z",
"details": "moderate"
}
],
"title": "CVE-2025-39990"
},
{
"cve": "CVE-2025-40001",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40001"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nscsi: mvsas: Fix use-after-free bugs in mvs_work_queue\n\nDuring the detaching of Marvell\u0027s SAS/SATA controller, the original code\ncalls cancel_delayed_work() in mvs_free() to cancel the delayed work\nitem mwq-\u003ework_q. However, if mwq-\u003ework_q is already running, the\ncancel_delayed_work() may fail to cancel it. This can lead to\nuse-after-free scenarios where mvs_free() frees the mvs_info while\nmvs_work_queue() is still executing and attempts to access the\nalready-freed mvs_info.\n\nA typical race condition is illustrated below:\n\nCPU 0 (remove) | CPU 1 (delayed work callback)\nmvs_pci_remove() |\n mvs_free() | mvs_work_queue()\n cancel_delayed_work() |\n kfree(mvi) |\n | mvi-\u003e // UAF\n\nReplace cancel_delayed_work() with cancel_delayed_work_sync() to ensure\nthat the delayed work item is properly canceled and any executing\ndelayed work item completes before the mvs_info is deallocated.\n\nThis bug was found by static analysis.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40001",
"url": "https://www.suse.com/security/cve/CVE-2025-40001"
},
{
"category": "external",
"summary": "SUSE Bug 1252303 for CVE-2025-40001",
"url": "https://bugzilla.suse.com/1252303"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.8,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-19T16:19:41Z",
"details": "moderate"
}
],
"title": "CVE-2025-40001"
},
{
"cve": "CVE-2025-40003",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40003"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nnet: mscc: ocelot: Fix use-after-free caused by cyclic delayed work\n\nThe origin code calls cancel_delayed_work() in ocelot_stats_deinit()\nto cancel the cyclic delayed work item ocelot-\u003estats_work. However,\ncancel_delayed_work() may fail to cancel the work item if it is already\nexecuting. While destroy_workqueue() does wait for all pending work items\nin the work queue to complete before destroying the work queue, it cannot\nprevent the delayed work item from being rescheduled within the\nocelot_check_stats_work() function. This limitation exists because the\ndelayed work item is only enqueued into the work queue after its timer\nexpires. Before the timer expiration, destroy_workqueue() has no visibility\nof this pending work item. Once the work queue appears empty,\ndestroy_workqueue() proceeds with destruction. When the timer eventually\nexpires, the delayed work item gets queued again, leading to the following\nwarning:\n\nworkqueue: cannot queue ocelot_check_stats_work on wq ocelot-switch-stats\nWARNING: CPU: 2 PID: 0 at kernel/workqueue.c:2255 __queue_work+0x875/0xaf0\n...\nRIP: 0010:__queue_work+0x875/0xaf0\n...\nRSP: 0018:ffff88806d108b10 EFLAGS: 00010086\nRAX: 0000000000000000 RBX: 0000000000000101 RCX: 0000000000000027\nRDX: 0000000000000027 RSI: 0000000000000004 RDI: ffff88806d123e88\nRBP: ffffffff813c3170 R08: 0000000000000000 R09: ffffed100da247d2\nR10: ffffed100da247d1 R11: ffff88806d123e8b R12: ffff88800c00f000\nR13: ffff88800d7285c0 R14: ffff88806d0a5580 R15: ffff88800d7285a0\nFS: 0000000000000000(0000) GS:ffff8880e5725000(0000) knlGS:0000000000000000\nCS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033\nCR2: 00007fe18e45ea10 CR3: 0000000005e6c000 CR4: 00000000000006f0\nCall Trace:\n \u003cIRQ\u003e\n ? kasan_report+0xc6/0xf0\n ? __pfx_delayed_work_timer_fn+0x10/0x10\n ? __pfx_delayed_work_timer_fn+0x10/0x10\n call_timer_fn+0x25/0x1c0\n __run_timer_base.part.0+0x3be/0x8c0\n ? __pfx_delayed_work_timer_fn+0x10/0x10\n ? rcu_sched_clock_irq+0xb06/0x27d0\n ? __pfx___run_timer_base.part.0+0x10/0x10\n ? try_to_wake_up+0xb15/0x1960\n ? _raw_spin_lock_irq+0x80/0xe0\n ? __pfx__raw_spin_lock_irq+0x10/0x10\n tmigr_handle_remote_up+0x603/0x7e0\n ? __pfx_tmigr_handle_remote_up+0x10/0x10\n ? sched_balance_trigger+0x1c0/0x9f0\n ? sched_tick+0x221/0x5a0\n ? _raw_spin_lock_irq+0x80/0xe0\n ? __pfx__raw_spin_lock_irq+0x10/0x10\n ? tick_nohz_handler+0x339/0x440\n ? __pfx_tmigr_handle_remote_up+0x10/0x10\n __walk_groups.isra.0+0x42/0x150\n tmigr_handle_remote+0x1f4/0x2e0\n ? __pfx_tmigr_handle_remote+0x10/0x10\n ? ktime_get+0x60/0x140\n ? lapic_next_event+0x11/0x20\n ? clockevents_program_event+0x1d4/0x2a0\n ? hrtimer_interrupt+0x322/0x780\n handle_softirqs+0x16a/0x550\n irq_exit_rcu+0xaf/0xe0\n sysvec_apic_timer_interrupt+0x70/0x80\n \u003c/IRQ\u003e\n...\n\nThe following diagram reveals the cause of the above warning:\n\nCPU 0 (remove) | CPU 1 (delayed work callback)\nmscc_ocelot_remove() |\n ocelot_deinit() | ocelot_check_stats_work()\n ocelot_stats_deinit() |\n cancel_delayed_work()| ...\n | queue_delayed_work()\n destroy_workqueue() | (wait a time)\n | __queue_work() //UAF\n\nThe above scenario actually constitutes a UAF vulnerability.\n\nThe ocelot_stats_deinit() is only invoked when initialization\nfailure or resource destruction, so we must ensure that any\ndelayed work items cannot be rescheduled.\n\nReplace cancel_delayed_work() with disable_delayed_work_sync()\nto guarantee proper cancellation of the delayed work item and\nensure completion of any currently executing work before the\nworkqueue is deallocated.\n\nA deadlock concern was considered: ocelot_stats_deinit() is called\nin a process context and is not holding any locks that the delayed\nwork item might also need. Therefore, the use of the _sync() variant\nis safe here.\n\nThis bug was identified through static analysis. To reproduce the\nissue and validate the fix, I simulated ocelot-swit\n---truncated---",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40003",
"url": "https://www.suse.com/security/cve/CVE-2025-40003"
},
{
"category": "external",
"summary": "SUSE Bug 1252301 for CVE-2025-40003",
"url": "https://bugzilla.suse.com/1252301"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-19T16:19:41Z",
"details": "moderate"
}
],
"title": "CVE-2025-40003"
},
{
"cve": "CVE-2025-40006",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40006"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nmm/hugetlb: fix folio is still mapped when deleted\n\nMigration may be raced with fallocating hole. remove_inode_single_folio\nwill unmap the folio if the folio is still mapped. However, it\u0027s called\nwithout folio lock. If the folio is migrated and the mapped pte has been\nconverted to migration entry, folio_mapped() returns false, and won\u0027t\nunmap it. Due to extra refcount held by remove_inode_single_folio,\nmigration fails, restores migration entry to normal pte, and the folio is\nmapped again. As a result, we triggered BUG in filemap_unaccount_folio.\n\nThe log is as follows:\n BUG: Bad page cache in process hugetlb pfn:156c00\n page: refcount:515 mapcount:0 mapping:0000000099fef6e1 index:0x0 pfn:0x156c00\n head: order:9 mapcount:1 entire_mapcount:1 nr_pages_mapped:0 pincount:0\n aops:hugetlbfs_aops ino:dcc dentry name(?):\"my_hugepage_file\"\n flags: 0x17ffffc00000c1(locked|waiters|head|node=0|zone=2|lastcpupid=0x1fffff)\n page_type: f4(hugetlb)\n page dumped because: still mapped when deleted\n CPU: 1 UID: 0 PID: 395 Comm: hugetlb Not tainted 6.17.0-rc5-00044-g7aac71907bde-dirty #484 NONE\n Hardware name: QEMU Ubuntu 24.04 PC (i440FX + PIIX, 1996), BIOS 0.0.0 02/06/2015\n Call Trace:\n \u003cTASK\u003e\n dump_stack_lvl+0x4f/0x70\n filemap_unaccount_folio+0xc4/0x1c0\n __filemap_remove_folio+0x38/0x1c0\n filemap_remove_folio+0x41/0xd0\n remove_inode_hugepages+0x142/0x250\n hugetlbfs_fallocate+0x471/0x5a0\n vfs_fallocate+0x149/0x380\n\nHold folio lock before checking if the folio is mapped to avold race with\nmigration.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40006",
"url": "https://www.suse.com/security/cve/CVE-2025-40006"
},
{
"category": "external",
"summary": "SUSE Bug 1252342 for CVE-2025-40006",
"url": "https://bugzilla.suse.com/1252342"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.7,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-19T16:19:41Z",
"details": "moderate"
}
],
"title": "CVE-2025-40006"
},
{
"cve": "CVE-2025-40021",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40021"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\ntracing: dynevent: Add a missing lockdown check on dynevent\n\nSince dynamic_events interface on tracefs is compatible with\nkprobe_events and uprobe_events, it should also check the lockdown\nstatus and reject if it is set.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40021",
"url": "https://www.suse.com/security/cve/CVE-2025-40021"
},
{
"category": "external",
"summary": "SUSE Bug 1252681 for CVE-2025-40021",
"url": "https://bugzilla.suse.com/1252681"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-19T16:19:41Z",
"details": "moderate"
}
],
"title": "CVE-2025-40021"
},
{
"cve": "CVE-2025-40024",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40024"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nvhost: Take a reference on the task in struct vhost_task.\n\nvhost_task_create() creates a task and keeps a reference to its\ntask_struct. That task may exit early via a signal and its task_struct\nwill be released.\nA pending vhost_task_wake() will then attempt to wake the task and\naccess a task_struct which is no longer there.\n\nAcquire a reference on the task_struct while creating the thread and\nrelease the reference while the struct vhost_task itself is removed.\nIf the task exits early due to a signal, then the vhost_task_wake() will\nstill access a valid task_struct. The wake is safe and will be skipped\nin this case.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40024",
"url": "https://www.suse.com/security/cve/CVE-2025-40024"
},
{
"category": "external",
"summary": "SUSE Bug 1252686 for CVE-2025-40024",
"url": "https://bugzilla.suse.com/1252686"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-19T16:19:41Z",
"details": "moderate"
}
],
"title": "CVE-2025-40024"
},
{
"cve": "CVE-2025-40027",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40027"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nnet/9p: fix double req put in p9_fd_cancelled\n\nSyzkaller reports a KASAN issue as below:\n\ngeneral protection fault, probably for non-canonical address 0xfbd59c0000000021: 0000 [#1] PREEMPT SMP KASAN NOPTI\nKASAN: maybe wild-memory-access in range [0xdead000000000108-0xdead00000000010f]\nCPU: 0 PID: 5083 Comm: syz-executor.2 Not tainted 6.1.134-syzkaller-00037-g855bd1d7d838 #0\nHardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014\nRIP: 0010:__list_del include/linux/list.h:114 [inline]\nRIP: 0010:__list_del_entry include/linux/list.h:137 [inline]\nRIP: 0010:list_del include/linux/list.h:148 [inline]\nRIP: 0010:p9_fd_cancelled+0xe9/0x200 net/9p/trans_fd.c:734\n\nCall Trace:\n \u003cTASK\u003e\n p9_client_flush+0x351/0x440 net/9p/client.c:614\n p9_client_rpc+0xb6b/0xc70 net/9p/client.c:734\n p9_client_version net/9p/client.c:920 [inline]\n p9_client_create+0xb51/0x1240 net/9p/client.c:1027\n v9fs_session_init+0x1f0/0x18f0 fs/9p/v9fs.c:408\n v9fs_mount+0xba/0xcb0 fs/9p/vfs_super.c:126\n legacy_get_tree+0x108/0x220 fs/fs_context.c:632\n vfs_get_tree+0x8e/0x300 fs/super.c:1573\n do_new_mount fs/namespace.c:3056 [inline]\n path_mount+0x6a6/0x1e90 fs/namespace.c:3386\n do_mount fs/namespace.c:3399 [inline]\n __do_sys_mount fs/namespace.c:3607 [inline]\n __se_sys_mount fs/namespace.c:3584 [inline]\n __x64_sys_mount+0x283/0x300 fs/namespace.c:3584\n do_syscall_x64 arch/x86/entry/common.c:51 [inline]\n do_syscall_64+0x35/0x80 arch/x86/entry/common.c:81\n entry_SYSCALL_64_after_hwframe+0x6e/0xd8\n\nThis happens because of a race condition between:\n\n- The 9p client sending an invalid flush request and later cleaning it up;\n- The 9p client in p9_read_work() canceled all pending requests.\n\n Thread 1 Thread 2\n ...\n p9_client_create()\n ...\n p9_fd_create()\n ...\n p9_conn_create()\n ...\n // start Thread 2\n INIT_WORK(\u0026m-\u003erq, p9_read_work);\n p9_read_work()\n ...\n p9_client_rpc()\n ...\n ...\n p9_conn_cancel()\n ...\n spin_lock(\u0026m-\u003ereq_lock);\n ...\n p9_fd_cancelled()\n ...\n ...\n spin_unlock(\u0026m-\u003ereq_lock);\n // status rewrite\n p9_client_cb(m-\u003eclient, req, REQ_STATUS_ERROR)\n // first remove\n list_del(\u0026req-\u003ereq_list);\n ...\n\n spin_lock(\u0026m-\u003ereq_lock)\n ...\n // second remove\n list_del(\u0026req-\u003ereq_list);\n spin_unlock(\u0026m-\u003ereq_lock)\n ...\n\nCommit 74d6a5d56629 (\"9p/trans_fd: Fix concurrency del of req_list in\np9_fd_cancelled/p9_read_work\") fixes a concurrency issue in the 9p filesystem\nclient where the req_list could be deleted simultaneously by both\np9_read_work and p9_fd_cancelled functions, but for the case where req-\u003estatus\nequals REQ_STATUS_RCVD.\n\nUpdate the check for req-\u003estatus in p9_fd_cancelled to skip processing not\njust received requests, but anything that is not SENT, as whatever\nchanged the state from SENT also removed the request from its list.\n\nFound by Linux Verification Center (linuxtesting.org) with Syzkaller.\n\n[updated the check from status == RECV || status == ERROR to status != SENT]",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40027",
"url": "https://www.suse.com/security/cve/CVE-2025-40027"
},
{
"category": "external",
"summary": "SUSE Bug 1252763 for CVE-2025-40027",
"url": "https://bugzilla.suse.com/1252763"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-19T16:19:41Z",
"details": "moderate"
}
],
"title": "CVE-2025-40027"
},
{
"cve": "CVE-2025-40031",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40031"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\ntee: fix register_shm_helper()\n\nIn register_shm_helper(), fix incorrect error handling for a call to\niov_iter_extract_pages(). A case is missing for when\niov_iter_extract_pages() only got some pages and return a number larger\nthan 0, but not the requested amount.\n\nThis fixes a possible NULL pointer dereference following a bad input from\nioctl(TEE_IOC_SHM_REGISTER) where parts of the buffer isn\u0027t mapped.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40031",
"url": "https://www.suse.com/security/cve/CVE-2025-40031"
},
{
"category": "external",
"summary": "SUSE Bug 1252779 for CVE-2025-40031",
"url": "https://bugzilla.suse.com/1252779"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-19T16:19:41Z",
"details": "moderate"
}
],
"title": "CVE-2025-40031"
},
{
"cve": "CVE-2025-40033",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40033"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nremoteproc: pru: Fix potential NULL pointer dereference in pru_rproc_set_ctable()\n\npru_rproc_set_ctable() accessed rproc-\u003epriv before the IS_ERR_OR_NULL\ncheck, which could lead to a null pointer dereference. Move the pru\nassignment, ensuring we never dereference a NULL rproc pointer.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40033",
"url": "https://www.suse.com/security/cve/CVE-2025-40033"
},
{
"category": "external",
"summary": "SUSE Bug 1252824 for CVE-2025-40033",
"url": "https://bugzilla.suse.com/1252824"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-19T16:19:41Z",
"details": "moderate"
}
],
"title": "CVE-2025-40033"
},
{
"cve": "CVE-2025-40038",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40038"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nKVM: SVM: Skip fastpath emulation on VM-Exit if next RIP isn\u0027t valid\n\nSkip the WRMSR and HLT fastpaths in SVM\u0027s VM-Exit handler if the next RIP\nisn\u0027t valid, e.g. because KVM is running with nrips=false. SVM must\ndecode and emulate to skip the instruction if the CPU doesn\u0027t provide the\nnext RIP, and getting the instruction bytes to decode requires reading\nguest memory. Reading guest memory through the emulator can fault, i.e.\ncan sleep, which is disallowed since the fastpath handlers run with IRQs\ndisabled.\n\n BUG: sleeping function called from invalid context at ./include/linux/uaccess.h:106\n in_atomic(): 1, irqs_disabled(): 1, non_block: 0, pid: 32611, name: qemu\n preempt_count: 1, expected: 0\n INFO: lockdep is turned off.\n irq event stamp: 30580\n hardirqs last enabled at (30579): [\u003cffffffffc08b2527\u003e] vcpu_run+0x1787/0x1db0 [kvm]\n hardirqs last disabled at (30580): [\u003cffffffffb4f62e32\u003e] __schedule+0x1e2/0xed0\n softirqs last enabled at (30570): [\u003cffffffffb4247a64\u003e] fpu_swap_kvm_fpstate+0x44/0x210\n softirqs last disabled at (30568): [\u003cffffffffb4247a64\u003e] fpu_swap_kvm_fpstate+0x44/0x210\n CPU: 298 UID: 0 PID: 32611 Comm: qemu Tainted: G U 6.16.0-smp--e6c618b51cfe-sleep #782 NONE\n Tainted: [U]=USER\n Hardware name: Google Astoria-Turin/astoria, BIOS 0.20241223.2-0 01/17/2025\n Call Trace:\n \u003cTASK\u003e\n dump_stack_lvl+0x7d/0xb0\n __might_resched+0x271/0x290\n __might_fault+0x28/0x80\n kvm_vcpu_read_guest_page+0x8d/0xc0 [kvm]\n kvm_fetch_guest_virt+0x92/0xc0 [kvm]\n __do_insn_fetch_bytes+0xf3/0x1e0 [kvm]\n x86_decode_insn+0xd1/0x1010 [kvm]\n x86_emulate_instruction+0x105/0x810 [kvm]\n __svm_skip_emulated_instruction+0xc4/0x140 [kvm_amd]\n handle_fastpath_invd+0xc4/0x1a0 [kvm]\n vcpu_run+0x11a1/0x1db0 [kvm]\n kvm_arch_vcpu_ioctl_run+0x5cc/0x730 [kvm]\n kvm_vcpu_ioctl+0x578/0x6a0 [kvm]\n __se_sys_ioctl+0x6d/0xb0\n do_syscall_64+0x8a/0x2c0\n entry_SYSCALL_64_after_hwframe+0x4b/0x53\n RIP: 0033:0x7f479d57a94b\n \u003c/TASK\u003e\n\nNote, this is essentially a reapply of commit 5c30e8101e8d (\"KVM: SVM:\nSkip WRMSR fastpath on VM-Exit if next RIP isn\u0027t valid\"), but with\ndifferent justification (KVM now grabs SRCU when skipping the instruction\nfor other reasons).",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40038",
"url": "https://www.suse.com/security/cve/CVE-2025-40038"
},
{
"category": "external",
"summary": "SUSE Bug 1252817 for CVE-2025-40038",
"url": "https://bugzilla.suse.com/1252817"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-19T16:19:41Z",
"details": "moderate"
}
],
"title": "CVE-2025-40038"
},
{
"cve": "CVE-2025-40047",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40047"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nio_uring/waitid: always prune wait queue entry in io_waitid_wait()\n\nFor a successful return, always remove our entry from the wait queue\nentry list. Previously this was skipped if a cancelation was in\nprogress, but this can race with another invocation of the wait queue\nentry callback.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40047",
"url": "https://www.suse.com/security/cve/CVE-2025-40047"
},
{
"category": "external",
"summary": "SUSE Bug 1252790 for CVE-2025-40047",
"url": "https://bugzilla.suse.com/1252790"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.7,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-19T16:19:41Z",
"details": "moderate"
}
],
"title": "CVE-2025-40047"
},
{
"cve": "CVE-2025-40053",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40053"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nnet: dlink: handle copy_thresh allocation failure\n\nThe driver did not handle failure of `netdev_alloc_skb_ip_align()`.\nIf the allocation failed, dereferencing `skb-\u003eprotocol` could lead to\na NULL pointer dereference.\n\nThis patch tries to allocate `skb`. If the allocation fails, it falls\nback to the normal path.\n\nTested-on: D-Link DGE-550T Rev-A3",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40053",
"url": "https://www.suse.com/security/cve/CVE-2025-40053"
},
{
"category": "external",
"summary": "SUSE Bug 1252808 for CVE-2025-40053",
"url": "https://bugzilla.suse.com/1252808"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-19T16:19:41Z",
"details": "moderate"
}
],
"title": "CVE-2025-40053"
},
{
"cve": "CVE-2025-40055",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40055"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nocfs2: fix double free in user_cluster_connect()\n\nuser_cluster_disconnect() frees \"conn-\u003ecc_private\" which is \"lc\" but then\nthe error handling frees \"lc\" a second time. Set \"lc\" to NULL on this\npath to avoid a double free.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40055",
"url": "https://www.suse.com/security/cve/CVE-2025-40055"
},
{
"category": "external",
"summary": "SUSE Bug 1252821 for CVE-2025-40055",
"url": "https://bugzilla.suse.com/1252821"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-19T16:19:41Z",
"details": "moderate"
}
],
"title": "CVE-2025-40055"
},
{
"cve": "CVE-2025-40059",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40059"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\ncoresight: Fix incorrect handling for return value of devm_kzalloc\n\nThe return value of devm_kzalloc could be an null pointer,\nuse \"!desc.pdata\" to fix incorrect handling return value\nof devm_kzalloc.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40059",
"url": "https://www.suse.com/security/cve/CVE-2025-40059"
},
{
"category": "external",
"summary": "SUSE Bug 1252809 for CVE-2025-40059",
"url": "https://bugzilla.suse.com/1252809"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-19T16:19:41Z",
"details": "moderate"
}
],
"title": "CVE-2025-40059"
},
{
"cve": "CVE-2025-40064",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40064"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nsmc: Fix use-after-free in __pnet_find_base_ndev().\n\nsyzbot reported use-after-free of net_device in __pnet_find_base_ndev(),\nwhich was called during connect(). [0]\n\nsmc_pnet_find_ism_resource() fetches sk_dst_get(sk)-\u003edev and passes\ndown to pnet_find_base_ndev(), where RTNL is held. Then, UAF happened\nat __pnet_find_base_ndev() when the dev is first used.\n\nThis means dev had already been freed before acquiring RTNL in\npnet_find_base_ndev().\n\nWhile dev is going away, dst-\u003edev could be swapped with blackhole_netdev,\nand the dev\u0027s refcnt by dst will be released.\n\nWe must hold dev\u0027s refcnt before calling smc_pnet_find_ism_resource().\n\nAlso, smc_pnet_find_roce_resource() has the same problem.\n\nLet\u0027s use __sk_dst_get() and dst_dev_rcu() in the two functions.\n\n[0]:\nBUG: KASAN: use-after-free in __pnet_find_base_ndev+0x1b1/0x1c0 net/smc/smc_pnet.c:926\nRead of size 1 at addr ffff888036bac33a by task syz.0.3632/18609\n\nCPU: 1 UID: 0 PID: 18609 Comm: syz.0.3632 Not tainted syzkaller #0 PREEMPT(full)\nHardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/18/2025\nCall Trace:\n \u003cTASK\u003e\n dump_stack_lvl+0x189/0x250 lib/dump_stack.c:120\n print_address_description mm/kasan/report.c:378 [inline]\n print_report+0xca/0x240 mm/kasan/report.c:482\n kasan_report+0x118/0x150 mm/kasan/report.c:595\n __pnet_find_base_ndev+0x1b1/0x1c0 net/smc/smc_pnet.c:926\n pnet_find_base_ndev net/smc/smc_pnet.c:946 [inline]\n smc_pnet_find_ism_by_pnetid net/smc/smc_pnet.c:1103 [inline]\n smc_pnet_find_ism_resource+0xef/0x390 net/smc/smc_pnet.c:1154\n smc_find_ism_device net/smc/af_smc.c:1030 [inline]\n smc_find_proposal_devices net/smc/af_smc.c:1115 [inline]\n __smc_connect+0x372/0x1890 net/smc/af_smc.c:1545\n smc_connect+0x877/0xd90 net/smc/af_smc.c:1715\n __sys_connect_file net/socket.c:2086 [inline]\n __sys_connect+0x313/0x440 net/socket.c:2105\n __do_sys_connect net/socket.c:2111 [inline]\n __se_sys_connect net/socket.c:2108 [inline]\n __x64_sys_connect+0x7a/0x90 net/socket.c:2108\n do_syscall_x64 arch/x86/entry/syscall_64.c:63 [inline]\n do_syscall_64+0xfa/0x3b0 arch/x86/entry/syscall_64.c:94\n entry_SYSCALL_64_after_hwframe+0x77/0x7f\nRIP: 0033:0x7f47cbf8eba9\nCode: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 \u003c48\u003e 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48\nRSP: 002b:00007f47ccdb1038 EFLAGS: 00000246 ORIG_RAX: 000000000000002a\nRAX: ffffffffffffffda RBX: 00007f47cc1d5fa0 RCX: 00007f47cbf8eba9\nRDX: 0000000000000010 RSI: 0000200000000280 RDI: 000000000000000b\nRBP: 00007f47cc011e19 R08: 0000000000000000 R09: 0000000000000000\nR10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000\nR13: 00007f47cc1d6038 R14: 00007f47cc1d5fa0 R15: 00007ffc512f8aa8\n \u003c/TASK\u003e\n\nThe buggy address belongs to the physical page:\npage: refcount:0 mapcount:0 mapping:0000000000000000 index:0xffff888036bacd00 pfn:0x36bac\nflags: 0xfff00000000000(node=0|zone=1|lastcpupid=0x7ff)\nraw: 00fff00000000000 ffffea0001243d08 ffff8880b863fdc0 0000000000000000\nraw: ffff888036bacd00 0000000000000000 00000000ffffffff 0000000000000000\npage dumped because: kasan: bad access detected\npage_owner tracks the page as freed\npage last allocated via order 2, migratetype Unmovable, gfp_mask 0x446dc0(GFP_KERNEL_ACCOUNT|__GFP_ZERO|__GFP_NOWARN|__GFP_RETRY_MAYFAIL|__GFP_COMP), pid 16741, tgid 16741 (syz-executor), ts 343313197788, free_ts 380670750466\n set_page_owner include/linux/page_owner.h:32 [inline]\n post_alloc_hook+0x240/0x2a0 mm/page_alloc.c:1851\n prep_new_page mm/page_alloc.c:1859 [inline]\n get_page_from_freelist+0x21e4/0x22c0 mm/page_alloc.c:3858\n __alloc_frozen_pages_noprof+0x181/0x370 mm/page_alloc.c:5148\n alloc_pages_mpol+0x232/0x4a0 mm/mempolicy.c:2416\n ___kmalloc_large_node+0x5f/0x1b0 mm/slub.c:4317\n __kmalloc_large_node_noprof+0x18/0x90 mm/slub.c:4348\n __do_kmalloc_node mm/slub.c:4364 [inline]\n __kvmalloc_node\n---truncated---",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40064",
"url": "https://www.suse.com/security/cve/CVE-2025-40064"
},
{
"category": "external",
"summary": "SUSE Bug 1252845 for CVE-2025-40064",
"url": "https://bugzilla.suse.com/1252845"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-19T16:19:41Z",
"details": "moderate"
}
],
"title": "CVE-2025-40064"
},
{
"cve": "CVE-2025-40070",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40070"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\npps: fix warning in pps_register_cdev when register device fail\n\nSimilar to previous commit 2a934fdb01db (\"media: v4l2-dev: fix error\nhandling in __video_register_device()\"), the release hook should be set\nbefore device_register(). Otherwise, when device_register() return error\nand put_device() try to callback the release function, the below warning\nmay happen.\n\n ------------[ cut here ]------------\n WARNING: CPU: 1 PID: 4760 at drivers/base/core.c:2567 device_release+0x1bd/0x240 drivers/base/core.c:2567\n Modules linked in:\n CPU: 1 UID: 0 PID: 4760 Comm: syz.4.914 Not tainted 6.17.0-rc3+ #1 NONE\n RIP: 0010:device_release+0x1bd/0x240 drivers/base/core.c:2567\n Call Trace:\n \u003cTASK\u003e\n kobject_cleanup+0x136/0x410 lib/kobject.c:689\n kobject_release lib/kobject.c:720 [inline]\n kref_put include/linux/kref.h:65 [inline]\n kobject_put+0xe9/0x130 lib/kobject.c:737\n put_device+0x24/0x30 drivers/base/core.c:3797\n pps_register_cdev+0x2da/0x370 drivers/pps/pps.c:402\n pps_register_source+0x2f6/0x480 drivers/pps/kapi.c:108\n pps_tty_open+0x190/0x310 drivers/pps/clients/pps-ldisc.c:57\n tty_ldisc_open+0xa7/0x120 drivers/tty/tty_ldisc.c:432\n tty_set_ldisc+0x333/0x780 drivers/tty/tty_ldisc.c:563\n tiocsetd drivers/tty/tty_io.c:2429 [inline]\n tty_ioctl+0x5d1/0x1700 drivers/tty/tty_io.c:2728\n vfs_ioctl fs/ioctl.c:51 [inline]\n __do_sys_ioctl fs/ioctl.c:598 [inline]\n __se_sys_ioctl fs/ioctl.c:584 [inline]\n __x64_sys_ioctl+0x194/0x210 fs/ioctl.c:584\n do_syscall_x64 arch/x86/entry/syscall_64.c:63 [inline]\n do_syscall_64+0x5f/0x2a0 arch/x86/entry/syscall_64.c:94\n entry_SYSCALL_64_after_hwframe+0x76/0x7e\n \u003c/TASK\u003e\n\nBefore commit c79a39dc8d06 (\"pps: Fix a use-after-free\"),\npps_register_cdev() call device_create() to create pps-\u003edev, which will\ninit dev-\u003erelease to device_create_release(). Now the comment is outdated,\njust remove it.\n\nThanks for the reminder from Calvin Owens, \u0027kfree_pps\u0027 should be removed\nin pps_register_source() to avoid a double free in the failure case.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40070",
"url": "https://www.suse.com/security/cve/CVE-2025-40070"
},
{
"category": "external",
"summary": "SUSE Bug 1252836 for CVE-2025-40070",
"url": "https://bugzilla.suse.com/1252836"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-19T16:19:41Z",
"details": "moderate"
}
],
"title": "CVE-2025-40070"
},
{
"cve": "CVE-2025-40074",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40074"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nipv4: start using dst_dev_rcu()\n\nChange icmpv4_xrlim_allow(), ip_defrag() to prevent possible UAF.\n\nChange ipmr_prepare_xmit(), ipmr_queue_fwd_xmit(), ip_mr_output(),\nipv4_neigh_lookup() to use lockdep enabled dst_dev_rcu().",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40074",
"url": "https://www.suse.com/security/cve/CVE-2025-40074"
},
{
"category": "external",
"summary": "SUSE Bug 1252794 for CVE-2025-40074",
"url": "https://bugzilla.suse.com/1252794"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-19T16:19:41Z",
"details": "moderate"
}
],
"title": "CVE-2025-40074"
},
{
"cve": "CVE-2025-40075",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40075"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\ntcp_metrics: use dst_dev_net_rcu()\n\nReplace three dst_dev() with a lockdep enabled helper.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40075",
"url": "https://www.suse.com/security/cve/CVE-2025-40075"
},
{
"category": "external",
"summary": "SUSE Bug 1252795 for CVE-2025-40075",
"url": "https://bugzilla.suse.com/1252795"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-19T16:19:41Z",
"details": "moderate"
}
],
"title": "CVE-2025-40075"
},
{
"cve": "CVE-2025-40081",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40081"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nperf: arm_spe: Prevent overflow in PERF_IDX2OFF()\n\nCast nr_pages to unsigned long to avoid overflow when handling large\nAUX buffer sizes (\u003e= 2 GiB).",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40081",
"url": "https://www.suse.com/security/cve/CVE-2025-40081"
},
{
"category": "external",
"summary": "SUSE Bug 1252776 for CVE-2025-40081",
"url": "https://bugzilla.suse.com/1252776"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-19T16:19:41Z",
"details": "moderate"
}
],
"title": "CVE-2025-40081"
},
{
"cve": "CVE-2025-40083",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40083"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nnet/sched: sch_qfq: Fix null-deref in agg_dequeue\n\nTo prevent a potential crash in agg_dequeue (net/sched/sch_qfq.c)\nwhen cl-\u003eqdisc-\u003eops-\u003epeek(cl-\u003eqdisc) returns NULL, we check the return\nvalue before using it, similar to the existing approach in sch_hfsc.c.\n\nTo avoid code duplication, the following changes are made:\n\n1. Changed qdisc_warn_nonwc(include/net/pkt_sched.h) into a static\ninline function.\n\n2. Moved qdisc_peek_len from net/sched/sch_hfsc.c to\ninclude/net/pkt_sched.h so that sch_qfq can reuse it.\n\n3. Applied qdisc_peek_len in agg_dequeue to avoid crashing.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40083",
"url": "https://www.suse.com/security/cve/CVE-2025-40083"
},
{
"category": "external",
"summary": "SUSE Bug 1252912 for CVE-2025-40083",
"url": "https://bugzilla.suse.com/1252912"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-19T16:19:41Z",
"details": "moderate"
}
],
"title": "CVE-2025-40083"
},
{
"cve": "CVE-2025-40086",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40086"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\ndrm/xe: Don\u0027t allow evicting of BOs in same VM in array of VM binds\n\nAn array of VM binds can potentially evict other buffer objects (BOs)\nwithin the same VM under certain conditions, which may lead to NULL\npointer dereferences later in the bind pipeline. To prevent this, clear\nthe allow_res_evict flag in the xe_bo_validate call.\n\nv2:\n - Invert polarity of no_res_evict (Thomas)\n - Add comment in code explaining issue (Thomas)\n\n(cherry picked from commit 8b9ba8d6d95fe75fed6b0480bb03da4b321bea08)",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40086",
"url": "https://www.suse.com/security/cve/CVE-2025-40086"
},
{
"category": "external",
"summary": "SUSE Bug 1252923 for CVE-2025-40086",
"url": "https://bugzilla.suse.com/1252923"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.1,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-19T16:19:41Z",
"details": "moderate"
}
],
"title": "CVE-2025-40086"
},
{
"cve": "CVE-2025-40098",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40098"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nALSA: hda: cs35l41: Fix NULL pointer dereference in cs35l41_get_acpi_mute_state()\n\nReturn value of a function acpi_evaluate_dsm() is dereferenced without\nchecking for NULL, but it is usually checked for this function.\n\nacpi_evaluate_dsm() may return NULL, when acpi_evaluate_object() returns\nacpi_status other than ACPI_SUCCESS, so add a check to prevent the crach.\n\nFound by Linux Verification Center (linuxtesting.org) with SVACE.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40098",
"url": "https://www.suse.com/security/cve/CVE-2025-40098"
},
{
"category": "external",
"summary": "SUSE Bug 1252917 for CVE-2025-40098",
"url": "https://bugzilla.suse.com/1252917"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-19T16:19:41Z",
"details": "moderate"
}
],
"title": "CVE-2025-40098"
},
{
"cve": "CVE-2025-40101",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40101"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nbtrfs: fix memory leaks when rejecting a non SINGLE data profile without an RST\n\nAt the end of btrfs_load_block_group_zone_info() the first thing we do\nis to ensure that if the mapping type is not a SINGLE one and there is\nno RAID stripe tree, then we return early with an error.\n\nDoing that, though, prevents the code from running the last calls from\nthis function which are about freeing memory allocated during its\nrun. Hence, in this case, instead of returning early, we set the ret\nvalue and fall through the rest of the cleanup code.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40101",
"url": "https://www.suse.com/security/cve/CVE-2025-40101"
},
{
"category": "external",
"summary": "SUSE Bug 1252901 for CVE-2025-40101",
"url": "https://bugzilla.suse.com/1252901"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 3.3,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-19T16:19:41Z",
"details": "low"
}
],
"title": "CVE-2025-40101"
},
{
"cve": "CVE-2025-40102",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40102"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nKVM: arm64: Prevent access to vCPU events before init\n\nAnother day, another syzkaller bug. KVM erroneously allows userspace to\npend vCPU events for a vCPU that hasn\u0027t been initialized yet, leading to\nKVM interpreting a bunch of uninitialized garbage for routing /\ninjecting the exception.\n\nIn one case the injection code and the hyp disagree on whether the vCPU\nhas a 32bit EL1 and put the vCPU into an illegal mode for AArch64,\ntripping the BUG() in exception_target_el() during the next injection:\n\n kernel BUG at arch/arm64/kvm/inject_fault.c:40!\n Internal error: Oops - BUG: 00000000f2000800 [#1] SMP\n CPU: 3 UID: 0 PID: 318 Comm: repro Not tainted 6.17.0-rc4-00104-g10fd0285305d #6 PREEMPT\n Hardware name: linux,dummy-virt (DT)\n pstate: 21402009 (nzCv daif +PAN -UAO -TCO +DIT -SSBS BTYPE=--)\n pc : exception_target_el+0x88/0x8c\n lr : pend_serror_exception+0x18/0x13c\n sp : ffff800082f03a10\n x29: ffff800082f03a10 x28: ffff0000cb132280 x27: 0000000000000000\n x26: 0000000000000000 x25: ffff0000c2a99c20 x24: 0000000000000000\n x23: 0000000000008000 x22: 0000000000000002 x21: 0000000000000004\n x20: 0000000000008000 x19: ffff0000c2a99c20 x18: 0000000000000000\n x17: 0000000000000000 x16: 0000000000000000 x15: 00000000200000c0\n x14: 0000000000000000 x13: 0000000000000000 x12: 0000000000000000\n x11: 0000000000000000 x10: 0000000000000000 x9 : 0000000000000000\n x8 : ffff800082f03af8 x7 : 0000000000000000 x6 : 0000000000000000\n x5 : ffff800080f621f0 x4 : 0000000000000000 x3 : 0000000000000000\n x2 : 000000000040009b x1 : 0000000000000003 x0 : ffff0000c2a99c20\n Call trace:\n exception_target_el+0x88/0x8c (P)\n kvm_inject_serror_esr+0x40/0x3b4\n __kvm_arm_vcpu_set_events+0xf0/0x100\n kvm_arch_vcpu_ioctl+0x180/0x9d4\n kvm_vcpu_ioctl+0x60c/0x9f4\n __arm64_sys_ioctl+0xac/0x104\n invoke_syscall+0x48/0x110\n el0_svc_common.constprop.0+0x40/0xe0\n do_el0_svc+0x1c/0x28\n el0_svc+0x34/0xf0\n el0t_64_sync_handler+0xa0/0xe4\n el0t_64_sync+0x198/0x19c\n Code: f946bc01 b4fffe61 9101e020 17fffff2 (d4210000)\n\nReject the ioctls outright as no sane VMM would call these before\nKVM_ARM_VCPU_INIT anyway. Even if it did the exception would\u0027ve been\nthrown away by the eventual reset of the vCPU\u0027s state.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40102",
"url": "https://www.suse.com/security/cve/CVE-2025-40102"
},
{
"category": "external",
"summary": "SUSE Bug 1252919 for CVE-2025-40102",
"url": "https://bugzilla.suse.com/1252919"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 0,
"baseSeverity": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:N",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-19T16:19:41Z",
"details": "moderate"
}
],
"title": "CVE-2025-40102"
},
{
"cve": "CVE-2025-40105",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40105"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nvfs: Don\u0027t leak disconnected dentries on umount\n\nWhen user calls open_by_handle_at() on some inode that is not cached, we\nwill create disconnected dentry for it. If such dentry is a directory,\nexportfs_decode_fh_raw() will then try to connect this dentry to the\ndentry tree through reconnect_path(). It may happen for various reasons\n(such as corrupted fs or race with rename) that the call to\nlookup_one_unlocked() in reconnect_one() will fail to find the dentry we\nare trying to reconnect and instead create a new dentry under the\nparent. Now this dentry will not be marked as disconnected although the\nparent still may well be disconnected (at least in case this\ninconsistency happened because the fs is corrupted and .. doesn\u0027t point\nto the real parent directory). This creates inconsistency in\ndisconnected flags but AFAICS it was mostly harmless. At least until\ncommit f1ee616214cb (\"VFS: don\u0027t keep disconnected dentries on d_anon\")\nwhich removed adding of most disconnected dentries to sb-\u003es_anon list.\nThus after this commit cleanup of disconnected dentries implicitely\nrelies on the fact that dput() will immediately reclaim such dentries.\nHowever when some leaf dentry isn\u0027t marked as disconnected, as in the\nscenario described above, the reclaim doesn\u0027t happen and the dentries\nare \"leaked\". Memory reclaim can eventually reclaim them but otherwise\nthey stay in memory and if umount comes first, we hit infamous \"Busy\ninodes after unmount\" bug. Make sure all dentries created under a\ndisconnected parent are marked as disconnected as well.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40105",
"url": "https://www.suse.com/security/cve/CVE-2025-40105"
},
{
"category": "external",
"summary": "SUSE Bug 1252928 for CVE-2025-40105",
"url": "https://bugzilla.suse.com/1252928"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 3.3,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-19T16:19:41Z",
"details": "low"
}
],
"title": "CVE-2025-40105"
},
{
"cve": "CVE-2025-40107",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40107"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\ncan: hi311x: fix null pointer dereference when resuming from sleep before interface was enabled\n\nThis issue is similar to the vulnerability in the `mcp251x` driver,\nwhich was fixed in commit 03c427147b2d (\"can: mcp251x: fix resume from\nsleep before interface was brought up\").\n\nIn the `hi311x` driver, when the device resumes from sleep, the driver\nschedules `priv-\u003erestart_work`. However, if the network interface was\nnot previously enabled, the `priv-\u003ewq` (workqueue) is not allocated and\ninitialized, leading to a null pointer dereference.\n\nTo fix this, we move the allocation and initialization of the workqueue\nfrom the `hi3110_open` function to the `hi3110_can_probe` function.\nThis ensures that the workqueue is properly initialized before it is\nused during device resume. And added logic to destroy the workqueue\nin the error handling paths of `hi3110_can_probe` and in the\n`hi3110_can_remove` function to prevent resource leaks.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40107",
"url": "https://www.suse.com/security/cve/CVE-2025-40107"
},
{
"category": "external",
"summary": "SUSE Bug 1253018 for CVE-2025-40107",
"url": "https://bugzilla.suse.com/1253018"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-19T16:19:41Z",
"details": "moderate"
}
],
"title": "CVE-2025-40107"
},
{
"cve": "CVE-2025-40109",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40109"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\ncrypto: rng - Ensure set_ent is always present\n\nEnsure that set_ent is always set since only drbg provides it.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40109",
"url": "https://www.suse.com/security/cve/CVE-2025-40109"
},
{
"category": "external",
"summary": "SUSE Bug 1253176 for CVE-2025-40109",
"url": "https://bugzilla.suse.com/1253176"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-19T16:19:41Z",
"details": "moderate"
}
],
"title": "CVE-2025-40109"
},
{
"cve": "CVE-2025-40110",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40110"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\ndrm/vmwgfx: Fix a null-ptr access in the cursor snooper\n\nCheck that the resource which is converted to a surface exists before\ntrying to use the cursor snooper on it.\n\nvmw_cmd_res_check allows explicit invalid (SVGA3D_INVALID_ID) identifiers\nbecause some svga commands accept SVGA3D_INVALID_ID to mean \"no surface\",\nunfortunately functions that accept the actual surfaces as objects might\n(and in case of the cursor snooper, do not) be able to handle null\nobjects. Make sure that we validate not only the identifier (via the\nvmw_cmd_res_check) but also check that the actual resource exists before\ntrying to do something with it.\n\nFixes unchecked null-ptr reference in the snooping code.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40110",
"url": "https://www.suse.com/security/cve/CVE-2025-40110"
},
{
"category": "external",
"summary": "SUSE Bug 1253275 for CVE-2025-40110",
"url": "https://bugzilla.suse.com/1253275"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.1,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-19T16:19:41Z",
"details": "moderate"
}
],
"title": "CVE-2025-40110"
},
{
"cve": "CVE-2025-40111",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40111"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\ndrm/vmwgfx: Fix Use-after-free in validation\n\nNodes stored in the validation duplicates hashtable come from an arena\nallocator that is cleared at the end of vmw_execbuf_process. All nodes\nare expected to be cleared in vmw_validation_drop_ht but this node escaped\nbecause its resource was destroyed prematurely.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40111",
"url": "https://www.suse.com/security/cve/CVE-2025-40111"
},
{
"category": "external",
"summary": "SUSE Bug 1253362 for CVE-2025-40111",
"url": "https://bugzilla.suse.com/1253362"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.7,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:L/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-19T16:19:41Z",
"details": "moderate"
}
],
"title": "CVE-2025-40111"
},
{
"cve": "CVE-2025-40115",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40115"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nscsi: mpt3sas: Fix crash in transport port remove by using ioc_info()\n\nDuring mpt3sas_transport_port_remove(), messages were logged with\ndev_printk() against \u0026mpt3sas_port-\u003eport-\u003edev. At this point the SAS\ntransport device may already be partially unregistered or freed, leading\nto a crash when accessing its struct device.\n\nUsing ioc_info(), which logs via the PCI device (ioc-\u003epdev-\u003edev),\nguaranteed to remain valid until driver removal.\n\n[83428.295776] Oops: general protection fault, probably for non-canonical address 0x6f702f323a33312d: 0000 [#1] SMP NOPTI\n[83428.295785] CPU: 145 UID: 0 PID: 113296 Comm: rmmod Kdump: loaded Tainted: G OE 6.16.0-rc1+ #1 PREEMPT(voluntary)\n[83428.295792] Tainted: [O]=OOT_MODULE, [E]=UNSIGNED_MODULE\n[83428.295795] Hardware name: Dell Inc. Precision 7875 Tower/, BIOS 89.1.67 02/23/2024\n[83428.295799] RIP: 0010:__dev_printk+0x1f/0x70\n[83428.295805] Code: 90 90 90 90 90 90 90 90 90 90 90 0f 1f 44 00 00 49 89 d1 48 85 f6 74 52 4c 8b 46 50 4d 85 c0 74 1f 48 8b 46 68 48 85 c0 74 22 \u003c48\u003e 8b 08 0f b6 7f 01 48 c7 c2 db e8 42 ad 83 ef 30 e9 7b f8 ff ff\n[83428.295813] RSP: 0018:ff85aeafc3137bb0 EFLAGS: 00010206\n[83428.295817] RAX: 6f702f323a33312d RBX: ff4290ee81292860 RCX: 5000cca25103be32\n[83428.295820] RDX: ff85aeafc3137bb8 RSI: ff4290eeb1966c00 RDI: ffffffffc1560845\n[83428.295823] RBP: ff85aeafc3137c18 R08: 74726f702f303a33 R09: ff85aeafc3137bb8\n[83428.295826] R10: ff85aeafc3137b18 R11: ff4290f5bd60fe68 R12: ff4290ee81290000\n[83428.295830] R13: ff4290ee6e345de0 R14: ff4290ee81290000 R15: ff4290ee6e345e30\n[83428.295833] FS: 00007fd9472a6740(0000) GS:ff4290f5ce96b000(0000) knlGS:0000000000000000\n[83428.295837] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033\n[83428.295840] CR2: 00007f242b4db238 CR3: 00000002372b8006 CR4: 0000000000771ef0\n[83428.295844] PKRU: 55555554\n[83428.295846] Call Trace:\n[83428.295848] \u003cTASK\u003e\n[83428.295850] _dev_printk+0x5c/0x80\n[83428.295857] ? srso_alias_return_thunk+0x5/0xfbef5\n[83428.295863] mpt3sas_transport_port_remove+0x1c7/0x420 [mpt3sas]\n[83428.295882] _scsih_remove_device+0x21b/0x280 [mpt3sas]\n[83428.295894] ? _scsih_expander_node_remove+0x108/0x140 [mpt3sas]\n[83428.295906] ? srso_alias_return_thunk+0x5/0xfbef5\n[83428.295910] mpt3sas_device_remove_by_sas_address.part.0+0x8f/0x110 [mpt3sas]\n[83428.295921] _scsih_expander_node_remove+0x129/0x140 [mpt3sas]\n[83428.295933] _scsih_expander_node_remove+0x6a/0x140 [mpt3sas]\n[83428.295944] scsih_remove+0x3f0/0x4a0 [mpt3sas]\n[83428.295957] pci_device_remove+0x3b/0xb0\n[83428.295962] device_release_driver_internal+0x193/0x200\n[83428.295968] driver_detach+0x44/0x90\n[83428.295971] bus_remove_driver+0x69/0xf0\n[83428.295975] pci_unregister_driver+0x2a/0xb0\n[83428.295979] _mpt3sas_exit+0x1f/0x300 [mpt3sas]\n[83428.295991] __do_sys_delete_module.constprop.0+0x174/0x310\n[83428.295997] ? srso_alias_return_thunk+0x5/0xfbef5\n[83428.296000] ? __x64_sys_getdents64+0x9a/0x110\n[83428.296005] ? srso_alias_return_thunk+0x5/0xfbef5\n[83428.296009] ? syscall_trace_enter+0xf6/0x1b0\n[83428.296014] do_syscall_64+0x7b/0x2c0\n[83428.296019] ? srso_alias_return_thunk+0x5/0xfbef5\n[83428.296023] entry_SYSCALL_64_after_hwframe+0x76/0x7e",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40115",
"url": "https://www.suse.com/security/cve/CVE-2025-40115"
},
{
"category": "external",
"summary": "SUSE Bug 1253318 for CVE-2025-40115",
"url": "https://bugzilla.suse.com/1253318"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-19T16:19:41Z",
"details": "moderate"
}
],
"title": "CVE-2025-40115"
},
{
"cve": "CVE-2025-40116",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40116"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nusb: host: max3421-hcd: Fix error pointer dereference in probe cleanup\n\nThe kthread_run() function returns error pointers so the\nmax3421_hcd-\u003espi_thread pointer can be either error pointers or NULL.\nCheck for both before dereferencing it.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40116",
"url": "https://www.suse.com/security/cve/CVE-2025-40116"
},
{
"category": "external",
"summary": "SUSE Bug 1253324 for CVE-2025-40116",
"url": "https://bugzilla.suse.com/1253324"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-19T16:19:41Z",
"details": "moderate"
}
],
"title": "CVE-2025-40116"
},
{
"cve": "CVE-2025-40118",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40118"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nscsi: pm80xx: Fix array-index-out-of-of-bounds on rmmod\n\nSince commit f7b705c238d1 (\"scsi: pm80xx: Set phy_attached to zero when\ndevice is gone\") UBSAN reports:\n\n UBSAN: array-index-out-of-bounds in drivers/scsi/pm8001/pm8001_sas.c:786:17\n index 28 is out of range for type \u0027pm8001_phy [16]\u0027\n\non rmmod when using an expander.\n\nFor a direct attached device, attached_phy contains the local phy id.\nFor a device behind an expander, attached_phy contains the remote phy\nid, not the local phy id.\n\nI.e. while pm8001_ha will have pm8001_ha-\u003echip-\u003en_phy local phys, for a\ndevice behind an expander, attached_phy can be much larger than\npm8001_ha-\u003echip-\u003en_phy (depending on the amount of phys of the\nexpander).\n\nE.g. on my system pm8001_ha has 8 phys with phy ids 0-7. One of the\nports has an expander connected. The expander has 31 phys with phy ids\n0-30.\n\nThe pm8001_ha-\u003ephy array only contains the phys of the HBA. It does not\ncontain the phys of the expander. Thus, it is wrong to use attached_phy\nto index the pm8001_ha-\u003ephy array for a device behind an expander.\n\nThus, we can only clear phy_attached for devices that are directly\nattached.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40118",
"url": "https://www.suse.com/security/cve/CVE-2025-40118"
},
{
"category": "external",
"summary": "SUSE Bug 1253363 for CVE-2025-40118",
"url": "https://bugzilla.suse.com/1253363"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.1,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-19T16:19:41Z",
"details": "moderate"
}
],
"title": "CVE-2025-40118"
},
{
"cve": "CVE-2025-40120",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40120"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nnet: usb: asix: hold PM usage ref to avoid PM/MDIO + RTNL deadlock\n\nPrevent USB runtime PM (autosuspend) for AX88772* in bind.\n\nusbnet enables runtime PM (autosuspend) by default, so disabling it via\nthe usb_driver flag is ineffective. On AX88772B, autosuspend shows no\nmeasurable power saving with current driver (no link partner, admin\nup/down). The ~0.453 W -\u003e ~0.248 W drop on v6.1 comes from phylib powering\nthe PHY off on admin-down, not from USB autosuspend.\n\nThe real hazard is that with runtime PM enabled, ndo_open() (under RTNL)\nmay synchronously trigger autoresume (usb_autopm_get_interface()) into\nasix_resume() while the USB PM lock is held. Resume paths then invoke\nphylink/phylib and MDIO, which also expect RTNL, leading to possible\ndeadlocks or PM lock vs MDIO wake issues.\n\nTo avoid this, keep the device runtime-PM active by taking a usage\nreference in ax88772_bind() and dropping it in unbind(). A non-zero PM\nusage count blocks runtime suspend regardless of userspace policy\n(.../power/control - pm_runtime_allow/forbid), making this approach\nrobust against sysfs overrides.\n\nHolding a runtime-PM usage ref does not affect system-wide suspend;\nsystem sleep/resume callbacks continue to run as before.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40120",
"url": "https://www.suse.com/security/cve/CVE-2025-40120"
},
{
"category": "external",
"summary": "SUSE Bug 1253360 for CVE-2025-40120",
"url": "https://bugzilla.suse.com/1253360"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-19T16:19:41Z",
"details": "moderate"
}
],
"title": "CVE-2025-40120"
},
{
"cve": "CVE-2025-40121",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40121"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nASoC: Intel: bytcr_rt5651: Fix invalid quirk input mapping\n\nWhen an invalid value is passed via quirk option, currently\nbytcr_rt5640 driver just ignores and leaves as is, which may lead to\nunepxected results like OOB access.\n\nThis patch adds the sanity check and corrects the input mapping to the\ncertain default value if an invalid value is passed.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40121",
"url": "https://www.suse.com/security/cve/CVE-2025-40121"
},
{
"category": "external",
"summary": "SUSE Bug 1253367 for CVE-2025-40121",
"url": "https://bugzilla.suse.com/1253367"
},
{
"category": "external",
"summary": "SUSE Bug 1253430 for CVE-2025-40121",
"url": "https://bugzilla.suse.com/1253430"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-19T16:19:41Z",
"details": "moderate"
}
],
"title": "CVE-2025-40121"
},
{
"cve": "CVE-2025-40127",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40127"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nhwrng: ks-sa - fix division by zero in ks_sa_rng_init\n\nFix division by zero in ks_sa_rng_init caused by missing clock\npointer initialization. The clk_get_rate() call is performed on\nan uninitialized clk pointer, resulting in division by zero when\ncalculating delay values.\n\nAdd clock initialization code before using the clock.\n\n\n drivers/char/hw_random/ks-sa-rng.c | 7 +++++++\n 1 file changed, 7 insertions(+)",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40127",
"url": "https://www.suse.com/security/cve/CVE-2025-40127"
},
{
"category": "external",
"summary": "SUSE Bug 1253369 for CVE-2025-40127",
"url": "https://bugzilla.suse.com/1253369"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-19T16:19:41Z",
"details": "moderate"
}
],
"title": "CVE-2025-40127"
},
{
"cve": "CVE-2025-40129",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40129"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nsunrpc: fix null pointer dereference on zero-length checksum\n\nIn xdr_stream_decode_opaque_auth(), zero-length checksum.len causes\nchecksum.data to be set to NULL. This triggers a NPD when accessing\nchecksum.data in gss_krb5_verify_mic_v2(). This patch ensures that\nthe value of checksum.len is not less than XDR_UNIT.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40129",
"url": "https://www.suse.com/security/cve/CVE-2025-40129"
},
{
"category": "external",
"summary": "SUSE Bug 1253472 for CVE-2025-40129",
"url": "https://bugzilla.suse.com/1253472"
},
{
"category": "external",
"summary": "SUSE Bug 1253473 for CVE-2025-40129",
"url": "https://bugzilla.suse.com/1253473"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-19T16:19:41Z",
"details": "important"
}
],
"title": "CVE-2025-40129"
},
{
"cve": "CVE-2025-40132",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40132"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nASoC: Intel: sof_sdw: Prevent jump to NULL add_sidecar callback\n\nIn create_sdw_dailink() check that sof_end-\u003ecodec_info-\u003eadd_sidecar\nis not NULL before calling it.\n\nThe original code assumed that if include_sidecar is true, the codec\non that link has an add_sidecar callback. But there could be other\ncodecs on the same link that do not have an add_sidecar callback.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40132",
"url": "https://www.suse.com/security/cve/CVE-2025-40132"
},
{
"category": "external",
"summary": "SUSE Bug 1253330 for CVE-2025-40132",
"url": "https://bugzilla.suse.com/1253330"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-19T16:19:41Z",
"details": "moderate"
}
],
"title": "CVE-2025-40132"
},
{
"cve": "CVE-2025-40133",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40133"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nmptcp: Use __sk_dst_get() and dst_dev_rcu() in mptcp_active_enable().\n\nmptcp_active_enable() is called from subflow_finish_connect(),\nwhich is icsk-\u003eicsk_af_ops-\u003esk_rx_dst_set() and it\u0027s not always\nunder RCU.\n\nUsing sk_dst_get(sk)-\u003edev could trigger UAF.\n\nLet\u0027s use __sk_dst_get() and dst_dev_rcu().",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40133",
"url": "https://www.suse.com/security/cve/CVE-2025-40133"
},
{
"category": "external",
"summary": "SUSE Bug 1253328 for CVE-2025-40133",
"url": "https://bugzilla.suse.com/1253328"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-19T16:19:41Z",
"details": "moderate"
}
],
"title": "CVE-2025-40133"
},
{
"cve": "CVE-2025-40134",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40134"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\ndm: fix NULL pointer dereference in __dm_suspend()\n\nThere is a race condition between dm device suspend and table load that\ncan lead to null pointer dereference. The issue occurs when suspend is\ninvoked before table load completes:\n\nBUG: kernel NULL pointer dereference, address: 0000000000000054\nOops: 0000 [#1] PREEMPT SMP PTI\nCPU: 6 PID: 6798 Comm: dmsetup Not tainted 6.6.0-g7e52f5f0ca9b #62\nHardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.16.1-2.fc37 04/01/2014\nRIP: 0010:blk_mq_wait_quiesce_done+0x0/0x50\nCall Trace:\n \u003cTASK\u003e\n blk_mq_quiesce_queue+0x2c/0x50\n dm_stop_queue+0xd/0x20\n __dm_suspend+0x130/0x330\n dm_suspend+0x11a/0x180\n dev_suspend+0x27e/0x560\n ctl_ioctl+0x4cf/0x850\n dm_ctl_ioctl+0xd/0x20\n vfs_ioctl+0x1d/0x50\n __se_sys_ioctl+0x9b/0xc0\n __x64_sys_ioctl+0x19/0x30\n x64_sys_call+0x2c4a/0x4620\n do_syscall_64+0x9e/0x1b0\n\nThe issue can be triggered as below:\n\nT1 \t\t\t\t\t\tT2\ndm_suspend\t\t\t\t\ttable_load\n__dm_suspend\t\t\t\t\tdm_setup_md_queue\n\t\t\t\t\t\tdm_mq_init_request_queue\n\t\t\t\t\t\tblk_mq_init_allocated_queue\n\t\t\t\t\t\t=\u003e q-\u003emq_ops = set-\u003eops; (1)\ndm_stop_queue / dm_wait_for_completion\n=\u003e q-\u003etag_set NULL pointer!\t(2)\n\t\t\t\t\t\t=\u003e q-\u003etag_set = set; (3)\n\nFix this by checking if a valid table (map) exists before performing\nrequest-based suspend and waiting for target I/O. When map is NULL,\nskip these table-dependent suspend steps.\n\nEven when map is NULL, no I/O can reach any target because there is\nno table loaded; I/O submitted in this state will fail early in the\nDM layer. Skipping the table-dependent suspend logic in this case\nis safe and avoids NULL pointer dereferences.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40134",
"url": "https://www.suse.com/security/cve/CVE-2025-40134"
},
{
"category": "external",
"summary": "SUSE Bug 1253386 for CVE-2025-40134",
"url": "https://bugzilla.suse.com/1253386"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.7,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-19T16:19:41Z",
"details": "moderate"
}
],
"title": "CVE-2025-40134"
},
{
"cve": "CVE-2025-40135",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40135"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nipv6: use RCU in ip6_xmit()\n\nUse RCU in ip6_xmit() in order to use dst_dev_rcu() to prevent\npossible UAF.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40135",
"url": "https://www.suse.com/security/cve/CVE-2025-40135"
},
{
"category": "external",
"summary": "SUSE Bug 1253342 for CVE-2025-40135",
"url": "https://bugzilla.suse.com/1253342"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.1,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-19T16:19:41Z",
"details": "moderate"
}
],
"title": "CVE-2025-40135"
},
{
"cve": "CVE-2025-40139",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40139"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nsmc: Use __sk_dst_get() and dst_dev_rcu() in in smc_clc_prfx_set().\n\nsmc_clc_prfx_set() is called during connect() and not under RCU\nnor RTNL.\n\nUsing sk_dst_get(sk)-\u003edev could trigger UAF.\n\nLet\u0027s use __sk_dst_get() and dev_dst_rcu() under rcu_read_lock()\nafter kernel_getsockname().\n\nNote that the returned value of smc_clc_prfx_set() is not used\nin the caller.\n\nWhile at it, we change the 1st arg of smc_clc_prfx_set[46]_rcu()\nnot to touch dst there.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40139",
"url": "https://www.suse.com/security/cve/CVE-2025-40139"
},
{
"category": "external",
"summary": "SUSE Bug 1253409 for CVE-2025-40139",
"url": "https://bugzilla.suse.com/1253409"
},
{
"category": "external",
"summary": "SUSE Bug 1253411 for CVE-2025-40139",
"url": "https://bugzilla.suse.com/1253411"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-19T16:19:41Z",
"details": "important"
}
],
"title": "CVE-2025-40139"
},
{
"cve": "CVE-2025-40140",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40140"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nnet: usb: Remove disruptive netif_wake_queue in rtl8150_set_multicast\n\nsyzbot reported WARNING in rtl8150_start_xmit/usb_submit_urb.\nThis is the sequence of events that leads to the warning:\n\nrtl8150_start_xmit() {\n\tnetif_stop_queue();\n\tusb_submit_urb(dev-\u003etx_urb);\n}\n\nrtl8150_set_multicast() {\n\tnetif_stop_queue();\n\tnetif_wake_queue();\t\t\u003c-- wakes up TX queue before URB is done\n}\n\nrtl8150_start_xmit() {\n\tnetif_stop_queue();\n\tusb_submit_urb(dev-\u003etx_urb);\t\u003c-- double submission\n}\n\nrtl8150_set_multicast being the ndo_set_rx_mode callback should not be\ncalling netif_stop_queue and notif_start_queue as these handle\nTX queue synchronization.\n\nThe net core function dev_set_rx_mode handles the synchronization\nfor rtl8150_set_multicast making it safe to remove these locks.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40140",
"url": "https://www.suse.com/security/cve/CVE-2025-40140"
},
{
"category": "external",
"summary": "SUSE Bug 1253349 for CVE-2025-40140",
"url": "https://bugzilla.suse.com/1253349"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 3.3,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-19T16:19:41Z",
"details": "low"
}
],
"title": "CVE-2025-40140"
},
{
"cve": "CVE-2025-40141",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40141"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nBluetooth: ISO: Fix possible UAF on iso_conn_free\n\nThis attempt to fix similar issue to sco_conn_free where if the\nconn-\u003esk is not set to NULL may lead to UAF on iso_conn_free.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40141",
"url": "https://www.suse.com/security/cve/CVE-2025-40141"
},
{
"category": "external",
"summary": "SUSE Bug 1253352 for CVE-2025-40141",
"url": "https://bugzilla.suse.com/1253352"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-19T16:19:41Z",
"details": "moderate"
}
],
"title": "CVE-2025-40141"
},
{
"cve": "CVE-2025-40142",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40142"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nALSA: pcm: Disable bottom softirqs as part of spin_lock_irq() on PREEMPT_RT\n\nsnd_pcm_group_lock_irq() acquires a spinlock_t and disables interrupts\nvia spin_lock_irq(). This also implicitly disables the handling of\nsoftirqs such as TIMER_SOFTIRQ.\nOn PREEMPT_RT softirqs are preemptible and spin_lock_irq() does not\ndisable them. That means a timer can be invoked during spin_lock_irq()\non the same CPU. Due to synchronisations reasons local_bh_disable() has\na per-CPU lock named softirq_ctrl.lock which synchronizes individual\nsoftirq against each other.\nsyz-bot managed to trigger a lockdep report where softirq_ctrl.lock is\nacquired in hrtimer_cancel() in addition to hrtimer_run_softirq(). This\nis a possible deadlock.\n\nThe softirq_ctrl.lock can not be made part of spin_lock_irq() as this\nwould lead to too much synchronisation against individual threads on the\nsystem. To avoid the possible deadlock, softirqs must be manually\ndisabled before the lock is acquired.\n\nDisable softirqs before the lock is acquired on PREEMPT_RT.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40142",
"url": "https://www.suse.com/security/cve/CVE-2025-40142"
},
{
"category": "external",
"summary": "SUSE Bug 1253348 for CVE-2025-40142",
"url": "https://bugzilla.suse.com/1253348"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.7,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-19T16:19:41Z",
"details": "moderate"
}
],
"title": "CVE-2025-40142"
},
{
"cve": "CVE-2025-40149",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40149"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\ntls: Use __sk_dst_get() and dst_dev_rcu() in get_netdev_for_sock().\n\nget_netdev_for_sock() is called during setsockopt(),\nso not under RCU.\n\nUsing sk_dst_get(sk)-\u003edev could trigger UAF.\n\nLet\u0027s use __sk_dst_get() and dst_dev_rcu().\n\nNote that the only -\u003endo_sk_get_lower_dev() user is\nbond_sk_get_lower_dev(), which uses RCU.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40149",
"url": "https://www.suse.com/security/cve/CVE-2025-40149"
},
{
"category": "external",
"summary": "SUSE Bug 1253355 for CVE-2025-40149",
"url": "https://bugzilla.suse.com/1253355"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-19T16:19:41Z",
"details": "moderate"
}
],
"title": "CVE-2025-40149"
},
{
"cve": "CVE-2025-40153",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40153"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nmm: hugetlb: avoid soft lockup when mprotect to large memory area\n\nWhen calling mprotect() to a large hugetlb memory area in our customer\u0027s\nworkload (~300GB hugetlb memory), soft lockup was observed:\n\nwatchdog: BUG: soft lockup - CPU#98 stuck for 23s! [t2_new_sysv:126916]\n\nCPU: 98 PID: 126916 Comm: t2_new_sysv Kdump: loaded Not tainted 6.17-rc7\nHardware name: GIGACOMPUTING R2A3-T40-AAV1/Jefferson CIO, BIOS 5.4.4.1 07/15/2025\npstate: 20400009 (nzCv daif +PAN -UAO -TCO -DIT -SSBS BTYPE=--)\npc : mte_clear_page_tags+0x14/0x24\nlr : mte_sync_tags+0x1c0/0x240\nsp : ffff80003150bb80\nx29: ffff80003150bb80 x28: ffff00739e9705a8 x27: 0000ffd2d6a00000\nx26: 0000ff8e4bc00000 x25: 00e80046cde00f45 x24: 0000000000022458\nx23: 0000000000000000 x22: 0000000000000004 x21: 000000011b380000\nx20: ffff000000000000 x19: 000000011b379f40 x18: 0000000000000000\nx17: 0000000000000000 x16: 0000000000000000 x15: 0000000000000000\nx14: 0000000000000000 x13: 0000000000000000 x12: 0000000000000000\nx11: 0000000000000000 x10: 0000000000000000 x9 : ffffc875e0aa5e2c\nx8 : 0000000000000000 x7 : 0000000000000000 x6 : 0000000000000000\nx5 : fffffc01ce7a5c00 x4 : 00000000046cde00 x3 : fffffc0000000000\nx2 : 0000000000000004 x1 : 0000000000000040 x0 : ffff0046cde7c000\n\nCall trace:\n mte_clear_page_tags+0x14/0x24\n set_huge_pte_at+0x25c/0x280\n hugetlb_change_protection+0x220/0x430\n change_protection+0x5c/0x8c\n mprotect_fixup+0x10c/0x294\n do_mprotect_pkey.constprop.0+0x2e0/0x3d4\n __arm64_sys_mprotect+0x24/0x44\n invoke_syscall+0x50/0x160\n el0_svc_common+0x48/0x144\n do_el0_svc+0x30/0xe0\n el0_svc+0x30/0xf0\n el0t_64_sync_handler+0xc4/0x148\n el0t_64_sync+0x1a4/0x1a8\n\nSoft lockup is not triggered with THP or base page because there is\ncond_resched() called for each PMD size.\n\nAlthough the soft lockup was triggered by MTE, it should be not MTE\nspecific. The other processing which takes long time in the loop may\ntrigger soft lockup too.\n\nSo add cond_resched() for hugetlb to avoid soft lockup.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40153",
"url": "https://www.suse.com/security/cve/CVE-2025-40153"
},
{
"category": "external",
"summary": "SUSE Bug 1253408 for CVE-2025-40153",
"url": "https://bugzilla.suse.com/1253408"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 3.3,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-19T16:19:41Z",
"details": "low"
}
],
"title": "CVE-2025-40153"
},
{
"cve": "CVE-2025-40154",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40154"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nASoC: Intel: bytcr_rt5640: Fix invalid quirk input mapping\n\nWhen an invalid value is passed via quirk option, currently\nbytcr_rt5640 driver only shows an error message but leaves as is.\nThis may lead to unepxected results like OOB access.\n\nThis patch corrects the input mapping to the certain default value if\nan invalid value is passed.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40154",
"url": "https://www.suse.com/security/cve/CVE-2025-40154"
},
{
"category": "external",
"summary": "SUSE Bug 1253431 for CVE-2025-40154",
"url": "https://bugzilla.suse.com/1253431"
},
{
"category": "external",
"summary": "SUSE Bug 1253432 for CVE-2025-40154",
"url": "https://bugzilla.suse.com/1253432"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-19T16:19:41Z",
"details": "moderate"
}
],
"title": "CVE-2025-40154"
},
{
"cve": "CVE-2025-40156",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40156"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nPM / devfreq: mtk-cci: Fix potential error pointer dereference in probe()\n\nThe drv-\u003esram_reg pointer could be set to ERR_PTR(-EPROBE_DEFER) which\nwould lead to a error pointer dereference. Use IS_ERR_OR_NULL() to check\nthat the pointer is valid.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40156",
"url": "https://www.suse.com/security/cve/CVE-2025-40156"
},
{
"category": "external",
"summary": "SUSE Bug 1253428 for CVE-2025-40156",
"url": "https://bugzilla.suse.com/1253428"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-19T16:19:41Z",
"details": "moderate"
}
],
"title": "CVE-2025-40156"
},
{
"cve": "CVE-2025-40157",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40157"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nEDAC/i10nm: Skip DIMM enumeration on a disabled memory controller\n\nWhen loading the i10nm_edac driver on some Intel Granite Rapids servers,\na call trace may appear as follows:\n\n UBSAN: shift-out-of-bounds in drivers/edac/skx_common.c:453:16\n shift exponent -66 is negative\n ...\n __ubsan_handle_shift_out_of_bounds+0x1e3/0x390\n skx_get_dimm_info.cold+0x47/0xd40 [skx_edac_common]\n i10nm_get_dimm_config+0x23e/0x390 [i10nm_edac]\n skx_register_mci+0x159/0x220 [skx_edac_common]\n i10nm_init+0xcb0/0x1ff0 [i10nm_edac]\n ...\n\nThis occurs because some BIOS may disable a memory controller if there\naren\u0027t any memory DIMMs populated on this memory controller. The DIMMMTR\nregister of this disabled memory controller contains the invalid value\n~0, resulting in the call trace above.\n\nFix this call trace by skipping DIMM enumeration on a disabled memory\ncontroller.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40157",
"url": "https://www.suse.com/security/cve/CVE-2025-40157"
},
{
"category": "external",
"summary": "SUSE Bug 1253423 for CVE-2025-40157",
"url": "https://bugzilla.suse.com/1253423"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.2,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:L/I:L/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-19T16:19:41Z",
"details": "moderate"
}
],
"title": "CVE-2025-40157"
},
{
"cve": "CVE-2025-40158",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40158"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nipv6: use RCU in ip6_output()\n\nUse RCU in ip6_output() in order to use dst_dev_rcu() to prevent\npossible UAF.\n\nWe can remove rcu_read_lock()/rcu_read_unlock() pairs\nfrom ip6_finish_output2().",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40158",
"url": "https://www.suse.com/security/cve/CVE-2025-40158"
},
{
"category": "external",
"summary": "SUSE Bug 1253402 for CVE-2025-40158",
"url": "https://bugzilla.suse.com/1253402"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-19T16:19:41Z",
"details": "moderate"
}
],
"title": "CVE-2025-40158"
},
{
"cve": "CVE-2025-40159",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40159"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nxsk: Harden userspace-supplied xdp_desc validation\n\nTurned out certain clearly invalid values passed in xdp_desc from\nuserspace can pass xp_{,un}aligned_validate_desc() and then lead\nto UBs or just invalid frames to be queued for xmit.\n\ndesc-\u003elen close to ``U32_MAX`` with a non-zero pool-\u003etx_metadata_len\ncan cause positive integer overflow and wraparound, the same way low\nenough desc-\u003eaddr with a non-zero pool-\u003etx_metadata_len can cause\nnegative integer overflow. Both scenarios can then pass the\nvalidation successfully.\nThis doesn\u0027t happen with valid XSk applications, but can be used\nto perform attacks.\n\nAlways promote desc-\u003elen to ``u64`` first to exclude positive\noverflows of it. Use explicit check_{add,sub}_overflow() when\nvalidating desc-\u003eaddr (which is ``u64`` already).\n\nbloat-o-meter reports a little growth of the code size:\n\nadd/remove: 0/0 grow/shrink: 2/1 up/down: 60/-16 (44)\nFunction old new delta\nxskq_cons_peek_desc 299 330 +31\nxsk_tx_peek_release_desc_batch 973 1002 +29\nxsk_generic_xmit 3148 3132 -16\n\nbut hopefully this doesn\u0027t hurt the performance much.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40159",
"url": "https://www.suse.com/security/cve/CVE-2025-40159"
},
{
"category": "external",
"summary": "SUSE Bug 1253403 for CVE-2025-40159",
"url": "https://bugzilla.suse.com/1253403"
},
{
"category": "external",
"summary": "SUSE Bug 1253404 for CVE-2025-40159",
"url": "https://bugzilla.suse.com/1253404"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-19T16:19:41Z",
"details": "important"
}
],
"title": "CVE-2025-40159"
},
{
"cve": "CVE-2025-40161",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40161"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nmailbox: zynqmp-ipi: Fix SGI cleanup on unbind\n\nThe driver incorrectly determines SGI vs SPI interrupts by checking IRQ\nnumber \u003c 16, which fails with dynamic IRQ allocation. During unbind,\nthis causes improper SGI cleanup leading to kernel crash.\n\nAdd explicit irq_type field to pdata for reliable identification of SGI\ninterrupts (type-2) and only clean up SGI resources when appropriate.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40161",
"url": "https://www.suse.com/security/cve/CVE-2025-40161"
},
{
"category": "external",
"summary": "SUSE Bug 1253410 for CVE-2025-40161",
"url": "https://bugzilla.suse.com/1253410"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.1,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-19T16:19:41Z",
"details": "moderate"
}
],
"title": "CVE-2025-40161"
},
{
"cve": "CVE-2025-40162",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40162"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nASoC: amd/sdw_utils: avoid NULL deref when devm_kasprintf() fails\n\ndevm_kasprintf() may return NULL on memory allocation failure,\nbut the debug message prints cpus-\u003edai_name before checking it.\nMove the dev_dbg() call after the NULL check to prevent potential\nNULL pointer dereference.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40162",
"url": "https://www.suse.com/security/cve/CVE-2025-40162"
},
{
"category": "external",
"summary": "SUSE Bug 1253422 for CVE-2025-40162",
"url": "https://bugzilla.suse.com/1253422"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-19T16:19:41Z",
"details": "moderate"
}
],
"title": "CVE-2025-40162"
},
{
"cve": "CVE-2025-40164",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40164"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nusbnet: Fix using smp_processor_id() in preemptible code warnings\n\nSyzbot reported the following warning:\n\nBUG: using smp_processor_id() in preemptible [00000000] code: dhcpcd/2879\ncaller is usbnet_skb_return+0x74/0x490 drivers/net/usb/usbnet.c:331\nCPU: 1 UID: 0 PID: 2879 Comm: dhcpcd Not tainted 6.15.0-rc4-syzkaller-00098-g615dca38c2ea #0 PREEMPT(voluntary)\nCall Trace:\n \u003cTASK\u003e\n __dump_stack lib/dump_stack.c:94 [inline]\n dump_stack_lvl+0x16c/0x1f0 lib/dump_stack.c:120\n check_preemption_disabled+0xd0/0xe0 lib/smp_processor_id.c:49\n usbnet_skb_return+0x74/0x490 drivers/net/usb/usbnet.c:331\n usbnet_resume_rx+0x4b/0x170 drivers/net/usb/usbnet.c:708\n usbnet_change_mtu+0x1be/0x220 drivers/net/usb/usbnet.c:417\n __dev_set_mtu net/core/dev.c:9443 [inline]\n netif_set_mtu_ext+0x369/0x5c0 net/core/dev.c:9496\n netif_set_mtu+0xb0/0x160 net/core/dev.c:9520\n dev_set_mtu+0xae/0x170 net/core/dev_api.c:247\n dev_ifsioc+0xa31/0x18d0 net/core/dev_ioctl.c:572\n dev_ioctl+0x223/0x10e0 net/core/dev_ioctl.c:821\n sock_do_ioctl+0x19d/0x280 net/socket.c:1204\n sock_ioctl+0x42f/0x6a0 net/socket.c:1311\n vfs_ioctl fs/ioctl.c:51 [inline]\n __do_sys_ioctl fs/ioctl.c:906 [inline]\n __se_sys_ioctl fs/ioctl.c:892 [inline]\n __x64_sys_ioctl+0x190/0x200 fs/ioctl.c:892\n do_syscall_x64 arch/x86/entry/syscall_64.c:63 [inline]\n do_syscall_64+0xcd/0x260 arch/x86/entry/syscall_64.c:94\n entry_SYSCALL_64_after_hwframe+0x77/0x7f\n\nFor historical and portability reasons, the netif_rx() is usually\nrun in the softirq or interrupt context, this commit therefore add\nlocal_bh_disable/enable() protection in the usbnet_resume_rx().",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40164",
"url": "https://www.suse.com/security/cve/CVE-2025-40164"
},
{
"category": "external",
"summary": "SUSE Bug 1253407 for CVE-2025-40164",
"url": "https://bugzilla.suse.com/1253407"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.7,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-19T16:19:41Z",
"details": "moderate"
}
],
"title": "CVE-2025-40164"
},
{
"cve": "CVE-2025-40165",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40165"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nmedia: nxp: imx8-isi: m2m: Fix streaming cleanup on release\n\nIf streamon/streamoff calls are imbalanced, such as when exiting an\napplication with Ctrl+C when streaming, the m2m usage_count will never\nreach zero and the ISI channel won\u0027t be freed. Besides from that, if the\ninput line width is more than 2K, it will trigger a WARN_ON():\n\n[ 59.222120] ------------[ cut here ]------------\n[ 59.226758] WARNING: drivers/media/platform/nxp/imx8-isi/imx8-isi-hw.c:631 at mxc_isi_channel_chain+0xa4/0x120, CPU#4: v4l2-ctl/654\n[ 59.238569] Modules linked in: ap1302\n[ 59.242231] CPU: 4 UID: 0 PID: 654 Comm: v4l2-ctl Not tainted 6.16.0-rc4-next-20250704-06511-gff0e002d480a-dirty #258 PREEMPT\n[ 59.253597] Hardware name: NXP i.MX95 15X15 board (DT)\n[ 59.258720] pstate: 80400009 (Nzcv daif +PAN -UAO -TCO -DIT -SSBS BTYPE=--)\n[ 59.265669] pc : mxc_isi_channel_chain+0xa4/0x120\n[ 59.270358] lr : mxc_isi_channel_chain+0x44/0x120\n[ 59.275047] sp : ffff8000848c3b40\n[ 59.278348] x29: ffff8000848c3b40 x28: ffff0000859b4c98 x27: ffff800081939f00\n[ 59.285472] x26: 000000000000000a x25: ffff0000859b4cb8 x24: 0000000000000001\n[ 59.292597] x23: ffff0000816f4760 x22: ffff0000816f4258 x21: ffff000084ceb780\n[ 59.299720] x20: ffff000084342ff8 x19: ffff000084340000 x18: 0000000000000000\n[ 59.306845] x17: 0000000000000000 x16: 0000000000000000 x15: 0000ffffdb369e1c\n[ 59.313969] x14: 0000000000000000 x13: 0000000000000000 x12: 0000000000000000\n[ 59.321093] x11: 0000000000000000 x10: 0000000000000000 x9 : 0000000000000000\n[ 59.328217] x8 : ffff8000848c3d48 x7 : ffff800081930b30 x6 : ffff800081930b30\n[ 59.335340] x5 : ffff0000859b6000 x4 : ffff80008193ae80 x3 : ffff800081022420\n[ 59.342464] x2 : ffff0000852f6900 x1 : 0000000000000001 x0 : ffff000084341000\n[ 59.349590] Call trace:\n[ 59.352025] mxc_isi_channel_chain+0xa4/0x120 (P)\n[ 59.356722] mxc_isi_m2m_streamon+0x160/0x20c\n[ 59.361072] v4l_streamon+0x24/0x30\n[ 59.364556] __video_do_ioctl+0x40c/0x4a0\n[ 59.368560] video_usercopy+0x2bc/0x690\n[ 59.372382] video_ioctl2+0x18/0x24\n[ 59.375857] v4l2_ioctl+0x40/0x60\n[ 59.379168] __arm64_sys_ioctl+0xac/0x104\n[ 59.383172] invoke_syscall+0x48/0x104\n[ 59.386916] el0_svc_common.constprop.0+0xc0/0xe0\n[ 59.391613] do_el0_svc+0x1c/0x28\n[ 59.394915] el0_svc+0x34/0xf4\n[ 59.397966] el0t_64_sync_handler+0xa0/0xe4\n[ 59.402143] el0t_64_sync+0x198/0x19c\n[ 59.405801] ---[ end trace 0000000000000000 ]---\n\nAddress this issue by moving the streaming preparation and cleanup to\nthe vb2 .prepare_streaming() and .unprepare_streaming() operations. This\nalso simplifies the driver by allowing direct usage of the\nv4l2_m2m_ioctl_streamon() and v4l2_m2m_ioctl_streamoff() helpers.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40165",
"url": "https://www.suse.com/security/cve/CVE-2025-40165"
},
{
"category": "external",
"summary": "SUSE Bug 1253405 for CVE-2025-40165",
"url": "https://bugzilla.suse.com/1253405"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.7,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-19T16:19:41Z",
"details": "moderate"
}
],
"title": "CVE-2025-40165"
},
{
"cve": "CVE-2025-40166",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40166"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\ndrm/xe/guc: Check GuC running state before deregistering exec queue\n\nIn normal operation, a registered exec queue is disabled and\nderegistered through the GuC, and freed only after the GuC confirms\ncompletion. However, if the driver is forced to unbind while the exec\nqueue is still running, the user may call exec_destroy() after the GuC\nhas already been stopped and CT communication disabled.\n\nIn this case, the driver cannot receive a response from the GuC,\npreventing proper cleanup of exec queue resources. Fix this by directly\nreleasing the resources when GuC is not running.\n\nHere is the failure dmesg log:\n\"\n[ 468.089581] ---[ end trace 0000000000000000 ]---\n[ 468.089608] pci 0000:03:00.0: [drm] *ERROR* GT0: GUC ID manager unclean (1/65535)\n[ 468.090558] pci 0000:03:00.0: [drm] GT0: total 65535\n[ 468.090562] pci 0000:03:00.0: [drm] GT0: used 1\n[ 468.090564] pci 0000:03:00.0: [drm] GT0: range 1..1 (1)\n[ 468.092716] ------------[ cut here ]------------\n[ 468.092719] WARNING: CPU: 14 PID: 4775 at drivers/gpu/drm/xe/xe_ttm_vram_mgr.c:298 ttm_vram_mgr_fini+0xf8/0x130 [xe]\n\"\n\nv2: use xe_uc_fw_is_running() instead of xe_guc_ct_enabled().\n As CT may go down and come back during VF migration.\n\n(cherry picked from commit 9b42321a02c50a12b2beb6ae9469606257fbecea)",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40166",
"url": "https://www.suse.com/security/cve/CVE-2025-40166"
},
{
"category": "external",
"summary": "SUSE Bug 1253433 for CVE-2025-40166",
"url": "https://bugzilla.suse.com/1253433"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-19T16:19:41Z",
"details": "moderate"
}
],
"title": "CVE-2025-40166"
},
{
"cve": "CVE-2025-40168",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40168"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nsmc: Use __sk_dst_get() and dst_dev_rcu() in smc_clc_prfx_match().\n\nsmc_clc_prfx_match() is called from smc_listen_work() and\nnot under RCU nor RTNL.\n\nUsing sk_dst_get(sk)-\u003edev could trigger UAF.\n\nLet\u0027s use __sk_dst_get() and dst_dev_rcu().\n\nNote that the returned value of smc_clc_prfx_match() is not\nused in the caller.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40168",
"url": "https://www.suse.com/security/cve/CVE-2025-40168"
},
{
"category": "external",
"summary": "SUSE Bug 1253427 for CVE-2025-40168",
"url": "https://bugzilla.suse.com/1253427"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-19T16:19:41Z",
"details": "moderate"
}
],
"title": "CVE-2025-40168"
},
{
"cve": "CVE-2025-40169",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40169"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nbpf: Reject negative offsets for ALU ops\n\nWhen verifying BPF programs, the check_alu_op() function validates\ninstructions with ALU operations. The \u0027offset\u0027 field in these\ninstructions is a signed 16-bit integer.\n\nThe existing check \u0027insn-\u003eoff \u003e 1\u0027 was intended to ensure the offset is\neither 0, or 1 for BPF_MOD/BPF_DIV. However, because \u0027insn-\u003eoff\u0027 is\nsigned, this check incorrectly accepts all negative values (e.g., -1).\n\nThis commit tightens the validation by changing the condition to\n\u0027(insn-\u003eoff != 0 \u0026\u0026 insn-\u003eoff != 1)\u0027. This ensures that any value\nother than the explicitly permitted 0 and 1 is rejected, hardening the\nverifier against malformed BPF programs.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40169",
"url": "https://www.suse.com/security/cve/CVE-2025-40169"
},
{
"category": "external",
"summary": "SUSE Bug 1253416 for CVE-2025-40169",
"url": "https://bugzilla.suse.com/1253416"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.8,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-19T16:19:41Z",
"details": "moderate"
}
],
"title": "CVE-2025-40169"
},
{
"cve": "CVE-2025-40171",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40171"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nnvmet-fc: move lsop put work to nvmet_fc_ls_req_op\n\nIt\u0027s possible for more than one async command to be in flight from\n__nvmet_fc_send_ls_req. For each command, a tgtport reference is taken.\n\nIn the current code, only one put work item is queued at a time, which\nresults in a leaked reference.\n\nTo fix this, move the work item to the nvmet_fc_ls_req_op struct, which\nalready tracks all resources related to the command.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40171",
"url": "https://www.suse.com/security/cve/CVE-2025-40171"
},
{
"category": "external",
"summary": "SUSE Bug 1253412 for CVE-2025-40171",
"url": "https://bugzilla.suse.com/1253412"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-19T16:19:41Z",
"details": "moderate"
}
],
"title": "CVE-2025-40171"
},
{
"cve": "CVE-2025-40172",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40172"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\naccel/qaic: Treat remaining == 0 as error in find_and_map_user_pages()\n\nCurrently, if find_and_map_user_pages() takes a DMA xfer request from the\nuser with a length field set to 0, or in a rare case, the host receives\nQAIC_TRANS_DMA_XFER_CONT from the device where resources-\u003exferred_dma_size\nis equal to the requested transaction size, the function will return 0\nbefore allocating an sgt or setting the fields of the dma_xfer struct.\nIn that case, encode_addr_size_pairs() will try to access the sgt which\nwill lead to a general protection fault.\n\nReturn an EINVAL in case the user provides a zero-sized ALP, or the device\nrequests continuation after all of the bytes have been transferred.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40172",
"url": "https://www.suse.com/security/cve/CVE-2025-40172"
},
{
"category": "external",
"summary": "SUSE Bug 1253424 for CVE-2025-40172",
"url": "https://bugzilla.suse.com/1253424"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-19T16:19:41Z",
"details": "moderate"
}
],
"title": "CVE-2025-40172"
},
{
"cve": "CVE-2025-40173",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40173"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nnet/ip6_tunnel: Prevent perpetual tunnel growth\n\nSimilarly to ipv4 tunnel, ipv6 version updates dev-\u003eneeded_headroom, too.\nWhile ipv4 tunnel headroom adjustment growth was limited in\ncommit 5ae1e9922bbd (\"net: ip_tunnel: prevent perpetual headroom growth\"),\nipv6 tunnel yet increases the headroom without any ceiling.\n\nReflect ipv4 tunnel headroom adjustment limit on ipv6 version.\n\nCredits to Francesco Ruggeri, who was originally debugging this issue\nand wrote local Arista-specific patch and a reproducer.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40173",
"url": "https://www.suse.com/security/cve/CVE-2025-40173"
},
{
"category": "external",
"summary": "SUSE Bug 1253421 for CVE-2025-40173",
"url": "https://bugzilla.suse.com/1253421"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.7,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-19T16:19:41Z",
"details": "moderate"
}
],
"title": "CVE-2025-40173"
},
{
"cve": "CVE-2025-40175",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40175"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nidpf: cleanup remaining SKBs in PTP flows\n\nWhen the driver requests Tx timestamp value, one of the first steps is\nto clone SKB using skb_get. It increases the reference counter for that\nSKB to prevent unexpected freeing by another component.\nHowever, there may be a case where the index is requested, SKB is\nassigned and never consumed by PTP flows - for example due to reset during\nrunning PTP apps.\n\nAdd a check in release timestamping function to verify if the SKB\nassigned to Tx timestamp latch was freed, and release remaining SKBs.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40175",
"url": "https://www.suse.com/security/cve/CVE-2025-40175"
},
{
"category": "external",
"summary": "SUSE Bug 1253426 for CVE-2025-40175",
"url": "https://bugzilla.suse.com/1253426"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.7,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-19T16:19:41Z",
"details": "moderate"
}
],
"title": "CVE-2025-40175"
},
{
"cve": "CVE-2025-40176",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40176"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\ntls: wait for pending async decryptions if tls_strp_msg_hold fails\n\nAsync decryption calls tls_strp_msg_hold to create a clone of the\ninput skb to hold references to the memory it uses. If we fail to\nallocate that clone, proceeding with async decryption can lead to\nvarious issues (UAF on the skb, writing into userspace memory after\nthe recv() call has returned).\n\nIn this case, wait for all pending decryption requests.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40176",
"url": "https://www.suse.com/security/cve/CVE-2025-40176"
},
{
"category": "external",
"summary": "SUSE Bug 1253425 for CVE-2025-40176",
"url": "https://bugzilla.suse.com/1253425"
},
{
"category": "external",
"summary": "SUSE Bug 1254100 for CVE-2025-40176",
"url": "https://bugzilla.suse.com/1254100"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-19T16:19:41Z",
"details": "important"
}
],
"title": "CVE-2025-40176"
},
{
"cve": "CVE-2025-40177",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40177"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\naccel/qaic: Fix bootlog initialization ordering\n\nAs soon as we queue MHI buffers to receive the bootlog from the device,\nwe could be receiving data. Therefore all the resources needed to\nprocess that data need to be setup prior to queuing the buffers.\n\nWe currently initialize some of the resources after queuing the buffers\nwhich creates a race between the probe() and any data that comes back\nfrom the device. If the uninitialized resources are accessed, we could\nsee page faults.\n\nFix the init ordering to close the race.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40177",
"url": "https://www.suse.com/security/cve/CVE-2025-40177"
},
{
"category": "external",
"summary": "SUSE Bug 1253443 for CVE-2025-40177",
"url": "https://bugzilla.suse.com/1253443"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-19T16:19:41Z",
"details": "moderate"
}
],
"title": "CVE-2025-40177"
},
{
"cve": "CVE-2025-40178",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40178"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\npid: Add a judgment for ns null in pid_nr_ns\n\n__task_pid_nr_ns\n ns = task_active_pid_ns(current);\n pid_nr_ns(rcu_dereference(*task_pid_ptr(task, type)), ns);\n if (pid \u0026\u0026 ns-\u003elevel \u003c= pid-\u003elevel) {\n\nSometimes null is returned for task_active_pid_ns. Then it will trigger kernel panic in pid_nr_ns.\n\nFor example:\n\tUnable to handle kernel NULL pointer dereference at virtual address 0000000000000058\n\tMem abort info:\n\tESR = 0x0000000096000007\n\tEC = 0x25: DABT (current EL), IL = 32 bits\n\tSET = 0, FnV = 0\n\tEA = 0, S1PTW = 0\n\tFSC = 0x07: level 3 translation fault\n\tData abort info:\n\tISV = 0, ISS = 0x00000007, ISS2 = 0x00000000\n\tCM = 0, WnR = 0, TnD = 0, TagAccess = 0\n\tGCS = 0, Overlay = 0, DirtyBit = 0, Xs = 0\n\tuser pgtable: 4k pages, 39-bit VAs, pgdp=00000002175aa000\n\t[0000000000000058] pgd=08000002175ab003, p4d=08000002175ab003, pud=08000002175ab003, pmd=08000002175be003, pte=0000000000000000\n\tpstate: 834000c5 (Nzcv daIF +PAN -UAO +TCO +DIT -SSBS BTYPE=--)\n\tpc : __task_pid_nr_ns+0x74/0xd0\n\tlr : __task_pid_nr_ns+0x24/0xd0\n\tsp : ffffffc08001bd10\n\tx29: ffffffc08001bd10 x28: ffffffd4422b2000 x27: 0000000000000001\n\tx26: ffffffd442821168 x25: ffffffd442821000 x24: 00000f89492eab31\n\tx23: 00000000000000c0 x22: ffffff806f5693c0 x21: ffffff806f5693c0\n\tx20: 0000000000000001 x19: 0000000000000000 x18: 0000000000000000\n\tx17: 00000000529c6ef0 x16: 00000000529c6ef0 x15: 00000000023a1adc\n\tx14: 0000000000000003 x13: 00000000007ef6d8 x12: 001167c391c78800\n\tx11: 00ffffffffffffff x10: 0000000000000000 x9 : 0000000000000001\n\tx8 : ffffff80816fa3c0 x7 : 0000000000000000 x6 : 49534d702d535449\n\tx5 : ffffffc080c4c2c0 x4 : ffffffd43ee128c8 x3 : ffffffd43ee124dc\n\tx2 : 0000000000000000 x1 : 0000000000000001 x0 : ffffff806f5693c0\n\tCall trace:\n\t__task_pid_nr_ns+0x74/0xd0\n\t...\n\t__handle_irq_event_percpu+0xd4/0x284\n\thandle_irq_event+0x48/0xb0\n\thandle_fasteoi_irq+0x160/0x2d8\n\tgeneric_handle_domain_irq+0x44/0x60\n\tgic_handle_irq+0x4c/0x114\n\tcall_on_irq_stack+0x3c/0x74\n\tdo_interrupt_handler+0x4c/0x84\n\tel1_interrupt+0x34/0x58\n\tel1h_64_irq_handler+0x18/0x24\n\tel1h_64_irq+0x68/0x6c\n\taccount_kernel_stack+0x60/0x144\n\texit_task_stack_account+0x1c/0x80\n\tdo_exit+0x7e4/0xaf8\n\t...\n\tget_signal+0x7bc/0x8d8\n\tdo_notify_resume+0x128/0x828\n\tel0_svc+0x6c/0x70\n\tel0t_64_sync_handler+0x68/0xbc\n\tel0t_64_sync+0x1a8/0x1ac\n\tCode: 35fffe54 911a02a8 f9400108 b4000128 (b9405a69)\n\t---[ end trace 0000000000000000 ]---\n\tKernel panic - not syncing: Oops: Fatal exception in interrupt",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40178",
"url": "https://www.suse.com/security/cve/CVE-2025-40178"
},
{
"category": "external",
"summary": "SUSE Bug 1253463 for CVE-2025-40178",
"url": "https://bugzilla.suse.com/1253463"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-19T16:19:41Z",
"details": "moderate"
}
],
"title": "CVE-2025-40178"
},
{
"cve": "CVE-2025-40180",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40180"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nmailbox: zynqmp-ipi: Fix out-of-bounds access in mailbox cleanup loop\n\nThe cleanup loop was starting at the wrong array index, causing\nout-of-bounds access.\nStart the loop at the correct index for zero-indexed arrays to prevent\naccessing memory beyond the allocated array bounds.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40180",
"url": "https://www.suse.com/security/cve/CVE-2025-40180"
},
{
"category": "external",
"summary": "SUSE Bug 1253440 for CVE-2025-40180",
"url": "https://bugzilla.suse.com/1253440"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-19T16:19:41Z",
"details": "moderate"
}
],
"title": "CVE-2025-40180"
},
{
"cve": "CVE-2025-40183",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40183"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nbpf: Fix metadata_dst leak __bpf_redirect_neigh_v{4,6}\n\nCilium has a BPF egress gateway feature which forces outgoing K8s Pod\ntraffic to pass through dedicated egress gateways which then SNAT the\ntraffic in order to interact with stable IPs outside the cluster.\n\nThe traffic is directed to the gateway via vxlan tunnel in collect md\nmode. A recent BPF change utilized the bpf_redirect_neigh() helper to\nforward packets after the arrival and decap on vxlan, which turned out\nover time that the kmalloc-256 slab usage in kernel was ever-increasing.\n\nThe issue was that vxlan allocates the metadata_dst object and attaches\nit through a fake dst entry to the skb. The latter was never released\nthough given bpf_redirect_neigh() was merely setting the new dst entry\nvia skb_dst_set() without dropping an existing one first.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40183",
"url": "https://www.suse.com/security/cve/CVE-2025-40183"
},
{
"category": "external",
"summary": "SUSE Bug 1253441 for CVE-2025-40183",
"url": "https://bugzilla.suse.com/1253441"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-19T16:19:41Z",
"details": "moderate"
}
],
"title": "CVE-2025-40183"
},
{
"cve": "CVE-2025-40185",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40185"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nice: ice_adapter: release xa entry on adapter allocation failure\n\nWhen ice_adapter_new() fails, the reserved XArray entry created by\nxa_insert() is not released. This causes subsequent insertions at\nthe same index to return -EBUSY, potentially leading to\nNULL pointer dereferences.\n\nReorder the operations as suggested by Przemek Kitszel:\n1. Check if adapter already exists (xa_load)\n2. Reserve the XArray slot (xa_reserve)\n3. Allocate the adapter (ice_adapter_new)\n4. Store the adapter (xa_store)",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40185",
"url": "https://www.suse.com/security/cve/CVE-2025-40185"
},
{
"category": "external",
"summary": "SUSE Bug 1253394 for CVE-2025-40185",
"url": "https://bugzilla.suse.com/1253394"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-19T16:19:41Z",
"details": "moderate"
}
],
"title": "CVE-2025-40185"
},
{
"cve": "CVE-2025-40186",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40186"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\ntcp: Don\u0027t call reqsk_fastopen_remove() in tcp_conn_request().\n\nsyzbot reported the splat below in tcp_conn_request(). [0]\n\nIf a listener is close()d while a TFO socket is being processed in\ntcp_conn_request(), inet_csk_reqsk_queue_add() does not set reqsk-\u003esk\nand calls inet_child_forget(), which calls tcp_disconnect() for the\nTFO socket.\n\nAfter the cited commit, tcp_disconnect() calls reqsk_fastopen_remove(),\nwhere reqsk_put() is called due to !reqsk-\u003esk.\n\nThen, reqsk_fastopen_remove() in tcp_conn_request() decrements the\nlast req-\u003ersk_refcnt and frees reqsk, and __reqsk_free() at the\ndrop_and_free label causes the refcount underflow for the listener\nand double-free of the reqsk.\n\nLet\u0027s remove reqsk_fastopen_remove() in tcp_conn_request().\n\nNote that other callers make sure tp-\u003efastopen_rsk is not NULL.\n\n[0]:\nrefcount_t: underflow; use-after-free.\nWARNING: CPU: 12 PID: 5563 at lib/refcount.c:28 refcount_warn_saturate (lib/refcount.c:28)\nModules linked in:\nCPU: 12 UID: 0 PID: 5563 Comm: syz-executor Not tainted syzkaller #0 PREEMPT(full)\nHardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025\nRIP: 0010:refcount_warn_saturate (lib/refcount.c:28)\nCode: ab e8 8e b4 98 ff 0f 0b c3 cc cc cc cc cc 80 3d a4 e4 d6 01 00 75 9c c6 05 9b e4 d6 01 01 48 c7 c7 e8 df fb ab e8 6a b4 98 ff \u003c0f\u003e 0b e9 03 5b 76 00 cc 80 3d 7d e4 d6 01 00 0f 85 74 ff ff ff c6\nRSP: 0018:ffffa79fc0304a98 EFLAGS: 00010246\nRAX: d83af4db1c6b3900 RBX: ffff9f65c7a69020 RCX: d83af4db1c6b3900\nRDX: 0000000000000000 RSI: 00000000ffff7fff RDI: ffffffffac78a280\nRBP: 000000009d781b60 R08: 0000000000007fff R09: ffffffffac6ca280\nR10: 0000000000017ffd R11: 0000000000000004 R12: ffff9f65c7b4f100\nR13: ffff9f65c7d23c00 R14: ffff9f65c7d26000 R15: ffff9f65c7a64ef8\nFS: 00007f9f962176c0(0000) GS:ffff9f65fcf00000(0000) knlGS:0000000000000000\nCS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033\nCR2: 0000200000000180 CR3: 000000000dbbe006 CR4: 0000000000372ef0\nCall Trace:\n \u003cIRQ\u003e\n tcp_conn_request (./include/linux/refcount.h:400 ./include/linux/refcount.h:432 ./include/linux/refcount.h:450 ./include/net/sock.h:1965 ./include/net/request_sock.h:131 net/ipv4/tcp_input.c:7301)\n tcp_rcv_state_process (net/ipv4/tcp_input.c:6708)\n tcp_v6_do_rcv (net/ipv6/tcp_ipv6.c:1670)\n tcp_v6_rcv (net/ipv6/tcp_ipv6.c:1906)\n ip6_protocol_deliver_rcu (net/ipv6/ip6_input.c:438)\n ip6_input (net/ipv6/ip6_input.c:500)\n ipv6_rcv (net/ipv6/ip6_input.c:311)\n __netif_receive_skb (net/core/dev.c:6104)\n process_backlog (net/core/dev.c:6456)\n __napi_poll (net/core/dev.c:7506)\n net_rx_action (net/core/dev.c:7569 net/core/dev.c:7696)\n handle_softirqs (kernel/softirq.c:579)\n do_softirq (kernel/softirq.c:480)\n \u003c/IRQ\u003e",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40186",
"url": "https://www.suse.com/security/cve/CVE-2025-40186"
},
{
"category": "external",
"summary": "SUSE Bug 1253438 for CVE-2025-40186",
"url": "https://bugzilla.suse.com/1253438"
},
{
"category": "external",
"summary": "SUSE Bug 1253439 for CVE-2025-40186",
"url": "https://bugzilla.suse.com/1253439"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-19T16:19:41Z",
"details": "important"
}
],
"title": "CVE-2025-40186"
},
{
"cve": "CVE-2025-40187",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40187"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nnet/sctp: fix a null dereference in sctp_disposition sctp_sf_do_5_1D_ce()\n\nIf new_asoc-\u003epeer.adaptation_ind=0 and sctp_ulpevent_make_authkey=0\nand sctp_ulpevent_make_authkey() returns 0, then the variable\nai_ev remains zero and the zero will be dereferenced\nin the sctp_ulpevent_free() function.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40187",
"url": "https://www.suse.com/security/cve/CVE-2025-40187"
},
{
"category": "external",
"summary": "SUSE Bug 1253647 for CVE-2025-40187",
"url": "https://bugzilla.suse.com/1253647"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.1,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-19T16:19:41Z",
"details": "moderate"
}
],
"title": "CVE-2025-40187"
},
{
"cve": "CVE-2025-40188",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40188"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\npwm: berlin: Fix wrong register in suspend/resume\n\nThe \u0027enable\u0027 register should be BERLIN_PWM_EN rather than\nBERLIN_PWM_ENABLE, otherwise, the driver accesses wrong address, there\nwill be cpu exception then kernel panic during suspend/resume.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40188",
"url": "https://www.suse.com/security/cve/CVE-2025-40188"
},
{
"category": "external",
"summary": "SUSE Bug 1253449 for CVE-2025-40188",
"url": "https://bugzilla.suse.com/1253449"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-19T16:19:41Z",
"details": "moderate"
}
],
"title": "CVE-2025-40188"
},
{
"cve": "CVE-2025-40192",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40192"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nRevert \"ipmi: fix msg stack when IPMI is disconnected\"\n\nThis reverts commit c608966f3f9c2dca596967501d00753282b395fc.\n\nThis patch has a subtle bug that can cause the IPMI driver to go into an\ninfinite loop if the BMC misbehaves in a certain way. Apparently\ncertain BMCs do misbehave this way because several reports have come in\nrecently about this.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40192",
"url": "https://www.suse.com/security/cve/CVE-2025-40192"
},
{
"category": "external",
"summary": "SUSE Bug 1253622 for CVE-2025-40192",
"url": "https://bugzilla.suse.com/1253622"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-19T16:19:41Z",
"details": "moderate"
}
],
"title": "CVE-2025-40192"
},
{
"cve": "CVE-2025-40194",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40194"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\ncpufreq: intel_pstate: Fix object lifecycle issue in update_qos_request()\n\nThe cpufreq_cpu_put() call in update_qos_request() takes place too early\nbecause the latter subsequently calls freq_qos_update_request() that\nindirectly accesses the policy object in question through the QoS request\nobject passed to it.\n\nFortunately, update_qos_request() is called under intel_pstate_driver_lock,\nso this issue does not matter for changing the intel_pstate operation\nmode, but it theoretically can cause a crash to occur on CPU device hot\nremoval (which currently can only happen in virt, but it is formally\nsupported nevertheless).\n\nAddress this issue by modifying update_qos_request() to drop the\nreference to the policy later.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40194",
"url": "https://www.suse.com/security/cve/CVE-2025-40194"
},
{
"category": "external",
"summary": "SUSE Bug 1253445 for CVE-2025-40194",
"url": "https://bugzilla.suse.com/1253445"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.7,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-19T16:19:41Z",
"details": "moderate"
}
],
"title": "CVE-2025-40194"
},
{
"cve": "CVE-2025-40196",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40196"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nfs: quota: create dedicated workqueue for quota_release_work\n\nThere is a kernel panic due to WARN_ONCE when panic_on_warn is set.\n\nThis issue occurs when writeback is triggered due to sync call for an\nopened file(ie, writeback reason is WB_REASON_SYNC). When f2fs balance\nis needed at sync path, flush for quota_release_work is triggered.\nBy default quota_release_work is queued to \"events_unbound\" queue which\ndoes not have WQ_MEM_RECLAIM flag. During f2fs balance \"writeback\"\nworkqueue tries to flush quota_release_work causing kernel panic due to\nMEM_RECLAIM flag mismatch errors.\n\nThis patch creates dedicated workqueue with WQ_MEM_RECLAIM flag\nfor work quota_release_work.\n\n------------[ cut here ]------------\nWARNING: CPU: 4 PID: 14867 at kernel/workqueue.c:3721 check_flush_dependency+0x13c/0x148\nCall trace:\n check_flush_dependency+0x13c/0x148\n __flush_work+0xd0/0x398\n flush_delayed_work+0x44/0x5c\n dquot_writeback_dquots+0x54/0x318\n f2fs_do_quota_sync+0xb8/0x1a8\n f2fs_write_checkpoint+0x3cc/0x99c\n f2fs_gc+0x190/0x750\n f2fs_balance_fs+0x110/0x168\n f2fs_write_single_data_page+0x474/0x7dc\n f2fs_write_data_pages+0x7d0/0xd0c\n do_writepages+0xe0/0x2f4\n __writeback_single_inode+0x44/0x4ac\n writeback_sb_inodes+0x30c/0x538\n wb_writeback+0xf4/0x440\n wb_workfn+0x128/0x5d4\n process_scheduled_works+0x1c4/0x45c\n worker_thread+0x32c/0x3e8\n kthread+0x11c/0x1b0\n ret_from_fork+0x10/0x20\nKernel panic - not syncing: kernel: panic_on_warn set ...",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40196",
"url": "https://www.suse.com/security/cve/CVE-2025-40196"
},
{
"category": "external",
"summary": "SUSE Bug 1253624 for CVE-2025-40196",
"url": "https://bugzilla.suse.com/1253624"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 3.3,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-19T16:19:41Z",
"details": "low"
}
],
"title": "CVE-2025-40196"
},
{
"cve": "CVE-2025-40197",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40197"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nmedia: mc: Clear minor number before put device\n\nThe device minor should not be cleared after the device is released.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40197",
"url": "https://www.suse.com/security/cve/CVE-2025-40197"
},
{
"category": "external",
"summary": "SUSE Bug 1253450 for CVE-2025-40197",
"url": "https://bugzilla.suse.com/1253450"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-19T16:19:41Z",
"details": "moderate"
}
],
"title": "CVE-2025-40197"
},
{
"cve": "CVE-2025-40198",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40198"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\next4: avoid potential buffer over-read in parse_apply_sb_mount_options()\n\nUnlike other strings in the ext4 superblock, we rely on tune2fs to\nmake sure s_mount_opts is NUL terminated. Harden\nparse_apply_sb_mount_options() by treating s_mount_opts as a potential\n__nonstring.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40198",
"url": "https://www.suse.com/security/cve/CVE-2025-40198"
},
{
"category": "external",
"summary": "SUSE Bug 1253453 for CVE-2025-40198",
"url": "https://bugzilla.suse.com/1253453"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-19T16:19:41Z",
"details": "moderate"
}
],
"title": "CVE-2025-40198"
},
{
"cve": "CVE-2025-40200",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40200"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nSquashfs: reject negative file sizes in squashfs_read_inode()\n\nSyskaller reports a \"WARNING in ovl_copy_up_file\" in overlayfs.\n\nThis warning is ultimately caused because the underlying Squashfs file\nsystem returns a file with a negative file size.\n\nThis commit checks for a negative file size and returns EINVAL.\n\n[phillip@squashfs.org.uk: only need to check 64 bit quantity]",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40200",
"url": "https://www.suse.com/security/cve/CVE-2025-40200"
},
{
"category": "external",
"summary": "SUSE Bug 1253448 for CVE-2025-40200",
"url": "https://bugzilla.suse.com/1253448"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-19T16:19:41Z",
"details": "moderate"
}
],
"title": "CVE-2025-40200"
},
{
"cve": "CVE-2025-40201",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40201"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nkernel/sys.c: fix the racy usage of task_lock(tsk-\u003egroup_leader) in sys_prlimit64() paths\n\nThe usage of task_lock(tsk-\u003egroup_leader) in sys_prlimit64()-\u003edo_prlimit()\npath is very broken.\n\nsys_prlimit64() does get_task_struct(tsk) but this only protects task_struct\nitself. If tsk != current and tsk is not a leader, this process can exit/exec\nand task_lock(tsk-\u003egroup_leader) may use the already freed task_struct.\n\nAnother problem is that sys_prlimit64() can race with mt-exec which changes\n-\u003egroup_leader. In this case do_prlimit() may take the wrong lock, or (worse)\n-\u003egroup_leader may change between task_lock() and task_unlock().\n\nChange sys_prlimit64() to take tasklist_lock when necessary. This is not\nnice, but I don\u0027t see a better fix for -stable.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40201",
"url": "https://www.suse.com/security/cve/CVE-2025-40201"
},
{
"category": "external",
"summary": "SUSE Bug 1253455 for CVE-2025-40201",
"url": "https://bugzilla.suse.com/1253455"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-19T16:19:41Z",
"details": "moderate"
}
],
"title": "CVE-2025-40201"
},
{
"cve": "CVE-2025-40202",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40202"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nipmi: Rework user message limit handling\n\nThe limit on the number of user messages had a number of issues,\nimproper counting in some cases and a use after free.\n\nRestructure how this is all done to handle more in the receive message\nallocation routine, so all refcouting and user message limit counts\nare done in that routine. It\u0027s a lot cleaner and safer.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40202",
"url": "https://www.suse.com/security/cve/CVE-2025-40202"
},
{
"category": "external",
"summary": "SUSE Bug 1253451 for CVE-2025-40202",
"url": "https://bugzilla.suse.com/1253451"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-19T16:19:41Z",
"details": "moderate"
}
],
"title": "CVE-2025-40202"
},
{
"cve": "CVE-2025-40203",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40203"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nlistmount: don\u0027t call path_put() under namespace semaphore\n\nMassage listmount() and make sure we don\u0027t call path_put() under the\nnamespace semaphore. If we put the last reference we\u0027re fscked.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40203",
"url": "https://www.suse.com/security/cve/CVE-2025-40203"
},
{
"category": "external",
"summary": "SUSE Bug 1253457 for CVE-2025-40203",
"url": "https://bugzilla.suse.com/1253457"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-19T16:19:41Z",
"details": "moderate"
}
],
"title": "CVE-2025-40203"
},
{
"cve": "CVE-2025-40204",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40204"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nsctp: Fix MAC comparison to be constant-time\n\nTo prevent timing attacks, MACs need to be compared in constant time.\nUse the appropriate helper function for this.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40204",
"url": "https://www.suse.com/security/cve/CVE-2025-40204"
},
{
"category": "external",
"summary": "SUSE Bug 1253436 for CVE-2025-40204",
"url": "https://bugzilla.suse.com/1253436"
},
{
"category": "external",
"summary": "SUSE Bug 1253437 for CVE-2025-40204",
"url": "https://bugzilla.suse.com/1253437"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-19T16:19:41Z",
"details": "important"
}
],
"title": "CVE-2025-40204"
},
{
"cve": "CVE-2025-40205",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40205"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nbtrfs: avoid potential out-of-bounds in btrfs_encode_fh()\n\nThe function btrfs_encode_fh() does not properly account for the three\ncases it handles.\n\nBefore writing to the file handle (fh), the function only returns to the\nuser BTRFS_FID_SIZE_NON_CONNECTABLE (5 dwords, 20 bytes) or\nBTRFS_FID_SIZE_CONNECTABLE (8 dwords, 32 bytes).\n\nHowever, when a parent exists and the root ID of the parent and the\ninode are different, the function writes BTRFS_FID_SIZE_CONNECTABLE_ROOT\n(10 dwords, 40 bytes).\n\nIf *max_len is not large enough, this write goes out of bounds because\nBTRFS_FID_SIZE_CONNECTABLE_ROOT is greater than\nBTRFS_FID_SIZE_CONNECTABLE originally returned.\n\nThis results in an 8-byte out-of-bounds write at\nfid-\u003eparent_root_objectid = parent_root_id.\n\nA previous attempt to fix this issue was made but was lost.\n\nhttps://lore.kernel.org/all/4CADAEEC020000780001B32C@vpn.id2.novell.com/\n\nAlthough this issue does not seem to be easily triggerable, it is a\npotential memory corruption bug that should be fixed. This patch\nresolves the issue by ensuring the function returns the appropriate size\nfor all three cases and validates that *max_len is large enough before\nwriting any data.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40205",
"url": "https://www.suse.com/security/cve/CVE-2025-40205"
},
{
"category": "external",
"summary": "SUSE Bug 1253456 for CVE-2025-40205",
"url": "https://bugzilla.suse.com/1253456"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-19T16:19:41Z",
"details": "moderate"
}
],
"title": "CVE-2025-40205"
},
{
"cve": "CVE-2025-40206",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40206"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nnetfilter: nft_objref: validate objref and objrefmap expressions\n\nReferencing a synproxy stateful object from OUTPUT hook causes kernel\ncrash due to infinite recursive calls:\n\nBUG: TASK stack guard page was hit at 000000008bda5b8c (stack is 000000003ab1c4a5..00000000494d8b12)\n[...]\nCall Trace:\n __find_rr_leaf+0x99/0x230\n fib6_table_lookup+0x13b/0x2d0\n ip6_pol_route+0xa4/0x400\n fib6_rule_lookup+0x156/0x240\n ip6_route_output_flags+0xc6/0x150\n __nf_ip6_route+0x23/0x50\n synproxy_send_tcp_ipv6+0x106/0x200\n synproxy_send_client_synack_ipv6+0x1aa/0x1f0\n nft_synproxy_do_eval+0x263/0x310\n nft_do_chain+0x5a8/0x5f0 [nf_tables\n nft_do_chain_inet+0x98/0x110\n nf_hook_slow+0x43/0xc0\n __ip6_local_out+0xf0/0x170\n ip6_local_out+0x17/0x70\n synproxy_send_tcp_ipv6+0x1a2/0x200\n synproxy_send_client_synack_ipv6+0x1aa/0x1f0\n[...]\n\nImplement objref and objrefmap expression validate functions.\n\nCurrently, only NFT_OBJECT_SYNPROXY object type requires validation.\nThis will also handle a jump to a chain using a synproxy object from the\nOUTPUT hook.\n\nNow when trying to reference a synproxy object in the OUTPUT hook, nft\nwill produce the following error:\n\nsynproxy_crash.nft: Error: Could not process rule: Operation not supported\n synproxy name mysynproxy\n ^^^^^^^^^^^^^^^^^^^^^^^^",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40206",
"url": "https://www.suse.com/security/cve/CVE-2025-40206"
},
{
"category": "external",
"summary": "SUSE Bug 1253393 for CVE-2025-40206",
"url": "https://bugzilla.suse.com/1253393"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.1,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-19T16:19:41Z",
"details": "moderate"
}
],
"title": "CVE-2025-40206"
},
{
"cve": "CVE-2025-40207",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40207"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nmedia: v4l2-subdev: Fix alloc failure check in v4l2_subdev_call_state_try()\n\nv4l2_subdev_call_state_try() macro allocates a subdev state with\n__v4l2_subdev_state_alloc(), but does not check the returned value. If\n__v4l2_subdev_state_alloc fails, it returns an ERR_PTR, and that would\ncause v4l2_subdev_call_state_try() to crash.\n\nAdd proper error handling to v4l2_subdev_call_state_try().",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40207",
"url": "https://www.suse.com/security/cve/CVE-2025-40207"
},
{
"category": "external",
"summary": "SUSE Bug 1253395 for CVE-2025-40207",
"url": "https://bugzilla.suse.com/1253395"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Enterprise High Availability Extension 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-19T16:19:41Z",
"details": "moderate"
}
],
"title": "CVE-2025-40207"
}
]
}
SUSE-SU-2026:20012-1
Vulnerability from csaf_suse - Published: 2025-12-19 16:46 - Updated: 2025-12-19 16:46| URL | Category | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
{
"document": {
"aggregate_severity": {
"namespace": "https://www.suse.com/support/security/rating/",
"text": "important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright 2024 SUSE LLC. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Security update for the Linux Kernel",
"title": "Title of the patch"
},
{
"category": "description",
"text": "\nThe SUSE Linux Enterprise 16.0 kernel was updated to fix various security issues\n\nThe following security issues were fixed:\n\n- CVE-2022-50253: bpf: make sure skb-\u003elen != 0 when redirecting to a tunneling device (bsc#1249912).\n- CVE-2025-37916: pds_core: remove write-after-free of client_id (bsc#1243474).\n- CVE-2025-38084: mm/hugetlb: unshare page tables during VMA split, not before (bsc#1245431 bsc#1245498).\n- CVE-2025-38085: mm/hugetlb: fix huge_pmd_unshare() vs GUP-fast race (bsc#1245431 bsc#1245499).\n- CVE-2025-38321: smb: Log an error when close_all_cached_dirs fails (bsc#1246328).\n- CVE-2025-38728: smb3: fix for slab out of bounds on mount to ksmbd (bsc#1249256).\n- CVE-2025-39805: net: macb: fix unregister_netdev call order in macb_remove() (bsc#1249982).\n- CVE-2025-39819: fs/smb: Fix inconsistent refcnt update (bsc#1250176).\n- CVE-2025-39822: io_uring/kbuf: fix signedness in this_len calculation (bsc#1250034).\n- CVE-2025-39831: fbnic: Move phylink resume out of service_task and into open/close (bsc#1249977).\n- CVE-2025-39859: ptp: ocp: fix use-after-free bugs causing by ptp_ocp_watchdog (bsc#1250252).\n- CVE-2025-39897: net: xilinx: axienet: Add error handling for RX metadata pointer retrieval (bsc#1250746).\n- CVE-2025-39917: bpf: Fix out-of-bounds dynptr write in bpf_crypto_crypt (bsc#1250723).\n- CVE-2025-39944: octeontx2-pf: Fix use-after-free bugs in otx2_sync_tstamp() (bsc#1251120).\n- CVE-2025-39961: iommu/amd/pgtbl: Fix possible race while increase page table level (bsc#1251817).\n- CVE-2025-39980: nexthop: Forbid FDB status change while nexthop is in a group (bsc#1252063).\n- CVE-2025-39990: bpf: Check the helper function is valid in get_helper_proto (bsc#1252054).\n- CVE-2025-40001: scsi: mvsas: Fix use-after-free bugs in mvs_work_queue (bsc#1252303).\n- CVE-2025-40003: net: mscc: ocelot: Fix use-after-free caused by cyclic delayed work (bsc#1252301).\n- CVE-2025-40006: mm/hugetlb: fix folio is still mapped when deleted (bsc#1252342).\n- CVE-2025-40021: tracing: dynevent: Add a missing lockdown check on dynevent (bsc#1252681).\n- CVE-2025-40024: vhost: Take a reference on the task in struct vhost_task (bsc#1252686).\n- CVE-2025-40027: net/9p: fix double req put in p9_fd_cancelled (bsc#1252763).\n- CVE-2025-40031: tee: fix register_shm_helper() (bsc#1252779).\n- CVE-2025-40033: remoteproc: pru: Fix potential NULL pointer dereference in pru_rproc_set_ctable() (bsc#1252824).\n- CVE-2025-40038: KVM: SVM: Skip fastpath emulation on VM-Exit if next RIP isn\u0027t valid (bsc#1252817).\n- CVE-2025-40047: io_uring/waitid: always prune wait queue entry in io_waitid_wait() (bsc#1252790).\n- CVE-2025-40053: net: dlink: handle copy_thresh allocation failure (bsc#1252808).\n- CVE-2025-40055: ocfs2: fix double free in user_cluster_connect() (bsc#1252821).\n- CVE-2025-40059: coresight: Fix incorrect handling for return value of devm_kzalloc (bsc#1252809).\n- CVE-2025-40064: smc: Fix use-after-free in __pnet_find_base_ndev() (bsc#1252845).\n- CVE-2025-40070: pps: fix warning in pps_register_cdev when register device fail (bsc#1252836).\n- CVE-2025-40074: tcp: convert to dev_net_rcu() (bsc#1252794).\n- CVE-2025-40075: tcp_metrics: use dst_dev_net_rcu() (bsc#1252795).\n- CVE-2025-40081: perf: arm_spe: Prevent overflow in PERF_IDX2OFF() (bsc#1252776).\n- CVE-2025-40083: net/sched: sch_qfq: Fix null-deref in agg_dequeue (bsc#1252912).\n- CVE-2025-40086: drm/xe: Don\u0027t allow evicting of BOs in same VM in array of VM binds (bsc#1252923).\n- CVE-2025-40098: ALSA: hda: cs35l41: Fix NULL pointer dereference in cs35l41_get_acpi_mute_state() (bsc#1252917).\n- CVE-2025-40101: btrfs: fix memory leaks when rejecting a non SINGLE data profile without an RST (bsc#1252901).\n- CVE-2025-40102: KVM: arm64: Prevent access to vCPU events before init (bsc#1252919).\n- CVE-2025-40105: vfs: Don\u0027t leak disconnected dentries on umount (bsc#1252928).\n- CVE-2025-40133: mptcp: Call dst_release() in mptcp_active_enable() (bsc#1253328).\n- CVE-2025-40134: dm: fix NULL pointer dereference in __dm_suspend() (bsc#1253386).\n- CVE-2025-40135: ipv6: use RCU in ip6_xmit() (bsc#1253342).\n- CVE-2025-40139: smc: Use __sk_dst_get() and dst_dev_rcu() in in smc_clc_prfx_set() (bsc#1253409).\n- CVE-2025-40149: tls: Use __sk_dst_get() and dst_dev_rcu() in get_netdev_for_sock() (bsc#1253355).\n- CVE-2025-40153: mm: hugetlb: avoid soft lockup when mprotect to large memory area (bsc#1253408).\n- CVE-2025-40157: EDAC/i10nm: Skip DIMM enumeration on a disabled memory controller (bsc#1253423).\n- CVE-2025-40158: ipv6: use RCU in ip6_output() (bsc#1253402).\n- CVE-2025-40159: xsk: Harden userspace-supplied xdp_desc validation (bsc#1253403).\n- CVE-2025-40168: smc: Use __sk_dst_get() and dst_dev_rcu() in smc_clc_prfx_match() (bsc#1253427).\n- CVE-2025-40169: bpf: Reject negative offsets for ALU ops (bsc#1253416).\n- CVE-2025-40173: net/ip6_tunnel: Prevent perpetual tunnel growth (bsc#1253421).\n- CVE-2025-40175: idpf: cleanup remaining SKBs in PTP flows (bsc#1253426).\n- CVE-2025-40176: tls: wait for pending async decryptions if tls_strp_msg_hold fails (bsc#1253425).\n- CVE-2025-40178: pid: Add a judgment for ns null in pid_nr_ns (bsc#1253463).\n- CVE-2025-40185: ice: ice_adapter: release xa entry on adapter allocation failure (bsc#1253394).\n- CVE-2025-40201: kernel/sys.c: fix the racy usage of task_lock(tsk-\u003egroup_leader) in sys_prlimit64() paths (bsc#1253455).\n- CVE-2025-40203: listmount: don\u0027t call path_put() under namespace semaphore (bsc#1253457).\n\nThe following non security issues were fixed:\n\n- ACPI: scan: Update honor list for RPMI System MSI (stable-fixes).\n- ACPICA: Update dsmethod.c to get rid of unused variable warning (stable-fixes).\n- Disable CONFIG_CPU5_WDT The cpu5wdt driver doesn\u0027t implement a\n proper watchdog interface and has many code issues. It only handles\n obscure and obsolete hardware. Stop building and supporting this driver\n (jsc#PED-14062).\n- Fix \"drm/xe: Don\u0027t allow evicting of BOs in same VM in array of VM binds\" (bsc#1252923)\n- KVM: SVM: Delete IRTE link from previous vCPU before setting new IRTE (git-fixes).\n- KVM: SVM: Delete IRTE link from previous vCPU irrespective of new routing (git-fixes).\n- KVM: SVM: Mark VMCB_LBR dirty when MSR_IA32_DEBUGCTLMSR is updated (git-fixes).\n- KVM: s390: improve interrupt cpu for wakeup (bsc#1235463).\n- KVM: s390: kABI backport for \u0027last_sleep_cpu\u0027 (bsc#1252352).\n- KVM: x86/mmu: Return -EAGAIN if userspace deletes/moves memslot during prefault (git-fixes).\n- PCI/ERR: Update device error_state already after reset (stable-fixes).\n- PM: EM: Slightly reduce em_check_capacity_update() overhead (stable-fixes).\n- Revert \"net/mlx5e: Update and set Xon/Xoff upon MTU set\" (git-fixes).\n- Revert \"net/mlx5e: Update and set Xon/Xoff upon port speed set\" (git-fixes).\n- Update config files: enable zstd module decompression (jsc#PED-14115).\n- bpf/selftests: Fix test_tcpnotify_user (bsc#1253635).\n- btrfs: do not clear read-only when adding sprout device (bsc#1253238).\n- btrfs: do not update last_log_commit when logging inode due to a new name (git-fixes).\n- dm: fix queue start/stop imbalance under suspend/load/resume races (bsc#1253386)\n- drm/amd/display: Add AVI infoframe copy in copy_stream_update_to_stream (stable-fixes).\n- drm/amd/display: update color on atomic commit time (stable-fixes).\n- drm/amd/display: update dpp/disp clock from smu clock table (stable-fixes).\n- drm/radeon: delete radeon_fence_process in is_signaled, no deadlock (stable-fixes).\n- hwmon: (lenovo-ec-sensors) Update P8 supprt (stable-fixes).\n- media: amphion: Delete v4l2_fh synchronously in .release() (stable-fixes).\n- mount: handle NULL values in mnt_ns_release() (bsc#1254308)\n- net/smc: Remove validation of reserved bits in CLC Decline (bsc#1252357).\n- net: phy: move realtek PHY driver to its own subdirectory (jsc#PED-14353).\n- net: phy: realtek: add defines for shadowed c45 standard registers (jsc#PED-14353).\n- net: phy: realtek: add helper RTL822X_VND2_C22_REG (jsc#PED-14353).\n- net: phy: realtek: change order of calls in C22 read_status() (jsc#PED-14353).\n- net: phy: realtek: clear 1000Base-T link partner advertisement (jsc#PED-14353).\n- net: phy: realtek: improve mmd register access for internal PHY\u0027s (jsc#PED-14353).\n- net: phy: realtek: read duplex and gbit master from PHYSR register (jsc#PED-14353).\n- net: phy: realtek: switch from paged to MMD ops in rtl822x functions (jsc#PED-14353).\n- net: phy: realtek: use string choices helpers (jsc#PED-14353).\n- net: xilinx: axienet: Fix IRQ coalescing packet count overflow (bsc#1250746)\n- net: xilinx: axienet: Fix RX skb ring management in DMAengine mode (bsc#1250746)\n- net: xilinx: axienet: Fix Tx skb circular buffer occupancy check in dmaengine xmit (bsc#1250746)\n- nvmet-auth: update sc_c in host response (git-fixes bsc#1249397).\n- nvmet-auth: update sc_c in target host hash calculation (git-fixes).\n- perf list: Add IBM z17 event descriptions (jsc#PED-13611).\n- platform/x86:intel/pmc: Update Arrow Lake telemetry GUID (git-fixes).\n- powercap: intel_rapl: Add support for Panther Lake platform (jsc#PED-13949).\n- pwm: pca9685: Use bulk write to atomicially update registers (stable-fixes).\n- r8169: add PHY c45 ops for MDIO_MMD_VENDOR2 registers (jsc#PED-14353).\n- r8169: add support for Intel Killer E5000 (jsc#PED-14353).\n- r8169: add support for RTL8125BP rev.b (jsc#PED-14353).\n- r8169: add support for RTL8125D rev.b (jsc#PED-14353).\n- r8169: adjust version numbering for RTL8126 (jsc#PED-14353).\n- r8169: align RTL8125 EEE config with vendor driver (jsc#PED-14353).\n- r8169: align RTL8125/RTL8126 PHY config with vendor driver (jsc#PED-14353).\n- r8169: align RTL8126 EEE config with vendor driver (jsc#PED-14353).\n- r8169: align WAKE_PHY handling with r8125/r8126 vendor drivers (jsc#PED-14353).\n- r8169: avoid duplicated messages if loading firmware fails and switch to warn level (jsc#PED-14353).\n- r8169: don\u0027t take RTNL lock in rtl_task() (jsc#PED-14353).\n- r8169: enable EEE at 2.5G per default on RTL8125B (jsc#PED-14353).\n- r8169: enable RTL8168H/RTL8168EP/RTL8168FP ASPM support (jsc#PED-14353).\n- r8169: fix inconsistent indenting in rtl8169_get_eth_mac_stats (jsc#PED-14353).\n- r8169: implement additional ethtool stats ops (jsc#PED-14353).\n- r8169: improve __rtl8169_set_wol (jsc#PED-14353).\n- r8169: improve initialization of RSS registers on RTL8125/RTL8126 (jsc#PED-14353).\n- r8169: improve rtl_set_d3_pll_down (jsc#PED-14353).\n- r8169: increase max jumbo packet size on RTL8125/RTL8126 (jsc#PED-14353).\n- r8169: remove leftover locks after reverted change (jsc#PED-14353).\n- r8169: remove original workaround for RTL8125 broken rx issue (jsc#PED-14353).\n- r8169: remove rtl_dash_loop_wait_high/low (jsc#PED-14353).\n- r8169: remove support for chip version 11 (jsc#PED-14353).\n- r8169: remove unused flag RTL_FLAG_TASK_RESET_NO_QUEUE_WAKE (jsc#PED-14353).\n- r8169: replace custom flag with disable_work() et al (jsc#PED-14353).\n- r8169: switch away from deprecated pcim_iomap_table (jsc#PED-14353).\n- r8169: use helper r8169_mod_reg8_cond to simplify rtl_jumbo_config (jsc#PED-14353).\n- ring-buffer: Update pages_touched to reflect persistent buffer content (git-fixes).\n- s390/mm: Fix __ptep_rdp() inline assembly (bsc#1253643).\n- sched/fair: Get rid of sched_domains_curr_level hack for tl-\u003ecpumask() (bsc#1246843).\n- sched/fair: Have SD_SERIALIZE affect newidle balancing (bsc#1248792).\n- sched/fair: Proportional newidle balance (bsc#1248792).\n- sched/fair: Proportional newidle balance -KABI (bsc#1248792).\n- sched/fair: Revert max_newidle_lb_cost bump (bsc#1248792).\n- sched/fair: Skip sched_balance_running cmpxchg when balance is not due (bsc#1248792).\n- sched/fair: Small cleanup to sched_balance_newidle() (bsc#1248792).\n- sched/fair: Small cleanup to update_newidle_cost() (bsc#1248792).\n- scsi: lpfc: Add capability to register Platform Name ID to fabric (bsc#1254119).\n- scsi: lpfc: Allow support for BB credit recovery in point-to-point topology (bsc#1254119).\n- scsi: lpfc: Ensure unregistration of rpis for received PLOGIs (bsc#1254119).\n- scsi: lpfc: Fix leaked ndlp krefs when in point-to-point topology (bsc#1254119).\n- scsi: lpfc: Fix reusing an ndlp that is marked NLP_DROPPED during FLOGI (bsc#1254119).\n- scsi: lpfc: Modify kref handling for Fabric Controller ndlps (bsc#1254119).\n- scsi: lpfc: Remove redundant NULL ptr assignment in lpfc_els_free_iocb() (bsc#1254119).\n- scsi: lpfc: Revise discovery related function headers and comments (bsc#1254119).\n- scsi: lpfc: Update lpfc version to 14.4.0.12 (bsc#1254119).\n- scsi: lpfc: Update various NPIV diagnostic log messaging (bsc#1254119).\n- selftests/run_kselftest.sh: Add `--skip` argument option (bsc#1254221).\n- smpboot: introduce SDTL_INIT() helper to tidy sched topology setup (bsc#1246843).\n- soc/tegra: fuse: speedo-tegra210: Update speedo IDs (git-fixes).\n- spi: tegra210-quad: Check hardware status on timeout (bsc#1253155)\n- spi: tegra210-quad: Fix timeout handling (bsc#1253155)\n- spi: tegra210-quad: Refactor error handling into helper functions (bsc#1253155)\n- spi: tegra210-quad: Update dummy sequence configuration (git-fixes)\n- tcp_bpf: Call sk_msg_free() when tcp_bpf_send_verdict() fails to allocate psock-\u003ecork (bsc#1250705).\n- wifi: ath11k: Add quirk entries for Thinkpad T14s Gen3 AMD (bsc#1254181).\n- wifi: mt76: do not add wcid entries to sta poll list during MCU reset (bsc#1254315).\n- wifi: mt76: introduce mt792x_config_mac_addr_list routine (bsc#1254315).\n- wifi: mt76: mt7925: Fix logical vs bitwise typo (bsc#1254315).\n- wifi: mt76: mt7925: Remove unnecessary if-check (bsc#1254315).\n- wifi: mt76: mt7925: Simplify HIF suspend handling to avoid suspend fail (bsc#1254315).\n- wifi: mt76: mt7925: add EHT control support based on the CLC data (bsc#1254315).\n- wifi: mt76: mt7925: add handler to hif suspend/resume event (bsc#1254315).\n- wifi: mt76: mt7925: add pci restore for hibernate (bsc#1254315).\n- wifi: mt76: mt7925: config the dwell time by firmware (bsc#1254315).\n- wifi: mt76: mt7925: extend MCU support for testmode (bsc#1254315).\n- wifi: mt76: mt7925: fix CLC command timeout when suspend/resume (bsc#1254315).\n- wifi: mt76: mt7925: fix missing hdr_trans_tlv command for broadcast wtbl (bsc#1254315).\n- wifi: mt76: mt7925: fix the unfinished command of regd_notifier before suspend (bsc#1254315).\n- wifi: mt76: mt7925: refine the txpower initialization flow (bsc#1254315).\n- wifi: mt76: mt7925: replace zero-length array with flexible-array member (bsc#1254315).\n- wifi: mt76: mt7925: update the channel usage when the regd domain changed (bsc#1254315).\n- wifi: mt76: mt7925e: fix too long of wifi resume time (bsc#1254315).\n- x86/smpboot: avoid SMT domain attach/destroy if SMT is not enabled (bsc#1246843).\n- x86/smpboot: moves x86_topology to static initialize and truncate (bsc#1246843).\n- x86/smpboot: remove redundant CONFIG_SCHED_SMT (bsc#1246843).\n",
"title": "Description of the patch"
},
{
"category": "details",
"text": "SUSE-SL-Micro-6.2-113",
"title": "Patchnames"
},
{
"category": "legal_disclaimer",
"text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
"title": "Terms of use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://www.suse.com/support/security/contact/",
"name": "SUSE Product Security Team",
"namespace": "https://www.suse.com/"
},
"references": [
{
"category": "external",
"summary": "SUSE ratings",
"url": "https://www.suse.com/support/security/rating/"
},
{
"category": "self",
"summary": "URL of this CSAF notice",
"url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2026_20012-1.json"
},
{
"category": "self",
"summary": "URL for SUSE-SU-2026:20012-1",
"url": "https://www.suse.com/support/update/announcement/2026/suse-su-202620012-1/"
},
{
"category": "self",
"summary": "E-Mail link for SUSE-SU-2026:20012-1",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-January/023715.html"
},
{
"category": "self",
"summary": "SUSE Bug 1235463",
"url": "https://bugzilla.suse.com/1235463"
},
{
"category": "self",
"summary": "SUSE Bug 1243474",
"url": "https://bugzilla.suse.com/1243474"
},
{
"category": "self",
"summary": "SUSE Bug 1245193",
"url": "https://bugzilla.suse.com/1245193"
},
{
"category": "self",
"summary": "SUSE Bug 1245431",
"url": "https://bugzilla.suse.com/1245431"
},
{
"category": "self",
"summary": "SUSE Bug 1245498",
"url": "https://bugzilla.suse.com/1245498"
},
{
"category": "self",
"summary": "SUSE Bug 1245499",
"url": "https://bugzilla.suse.com/1245499"
},
{
"category": "self",
"summary": "SUSE Bug 1246328",
"url": "https://bugzilla.suse.com/1246328"
},
{
"category": "self",
"summary": "SUSE Bug 1246843",
"url": "https://bugzilla.suse.com/1246843"
},
{
"category": "self",
"summary": "SUSE Bug 1247500",
"url": "https://bugzilla.suse.com/1247500"
},
{
"category": "self",
"summary": "SUSE Bug 1248792",
"url": "https://bugzilla.suse.com/1248792"
},
{
"category": "self",
"summary": "SUSE Bug 1249256",
"url": "https://bugzilla.suse.com/1249256"
},
{
"category": "self",
"summary": "SUSE Bug 1249397",
"url": "https://bugzilla.suse.com/1249397"
},
{
"category": "self",
"summary": "SUSE Bug 1249912",
"url": "https://bugzilla.suse.com/1249912"
},
{
"category": "self",
"summary": "SUSE Bug 1249977",
"url": "https://bugzilla.suse.com/1249977"
},
{
"category": "self",
"summary": "SUSE Bug 1249982",
"url": "https://bugzilla.suse.com/1249982"
},
{
"category": "self",
"summary": "SUSE Bug 1250034",
"url": "https://bugzilla.suse.com/1250034"
},
{
"category": "self",
"summary": "SUSE Bug 1250176",
"url": "https://bugzilla.suse.com/1250176"
},
{
"category": "self",
"summary": "SUSE Bug 1250237",
"url": "https://bugzilla.suse.com/1250237"
},
{
"category": "self",
"summary": "SUSE Bug 1250252",
"url": "https://bugzilla.suse.com/1250252"
},
{
"category": "self",
"summary": "SUSE Bug 1250705",
"url": "https://bugzilla.suse.com/1250705"
},
{
"category": "self",
"summary": "SUSE Bug 1250723",
"url": "https://bugzilla.suse.com/1250723"
},
{
"category": "self",
"summary": "SUSE Bug 1250746",
"url": "https://bugzilla.suse.com/1250746"
},
{
"category": "self",
"summary": "SUSE Bug 1251120",
"url": "https://bugzilla.suse.com/1251120"
},
{
"category": "self",
"summary": "SUSE Bug 1251817",
"url": "https://bugzilla.suse.com/1251817"
},
{
"category": "self",
"summary": "SUSE Bug 1252054",
"url": "https://bugzilla.suse.com/1252054"
},
{
"category": "self",
"summary": "SUSE Bug 1252063",
"url": "https://bugzilla.suse.com/1252063"
},
{
"category": "self",
"summary": "SUSE Bug 1252301",
"url": "https://bugzilla.suse.com/1252301"
},
{
"category": "self",
"summary": "SUSE Bug 1252303",
"url": "https://bugzilla.suse.com/1252303"
},
{
"category": "self",
"summary": "SUSE Bug 1252342",
"url": "https://bugzilla.suse.com/1252342"
},
{
"category": "self",
"summary": "SUSE Bug 1252352",
"url": "https://bugzilla.suse.com/1252352"
},
{
"category": "self",
"summary": "SUSE Bug 1252357",
"url": "https://bugzilla.suse.com/1252357"
},
{
"category": "self",
"summary": "SUSE Bug 1252681",
"url": "https://bugzilla.suse.com/1252681"
},
{
"category": "self",
"summary": "SUSE Bug 1252686",
"url": "https://bugzilla.suse.com/1252686"
},
{
"category": "self",
"summary": "SUSE Bug 1252763",
"url": "https://bugzilla.suse.com/1252763"
},
{
"category": "self",
"summary": "SUSE Bug 1252776",
"url": "https://bugzilla.suse.com/1252776"
},
{
"category": "self",
"summary": "SUSE Bug 1252779",
"url": "https://bugzilla.suse.com/1252779"
},
{
"category": "self",
"summary": "SUSE Bug 1252790",
"url": "https://bugzilla.suse.com/1252790"
},
{
"category": "self",
"summary": "SUSE Bug 1252794",
"url": "https://bugzilla.suse.com/1252794"
},
{
"category": "self",
"summary": "SUSE Bug 1252795",
"url": "https://bugzilla.suse.com/1252795"
},
{
"category": "self",
"summary": "SUSE Bug 1252808",
"url": "https://bugzilla.suse.com/1252808"
},
{
"category": "self",
"summary": "SUSE Bug 1252809",
"url": "https://bugzilla.suse.com/1252809"
},
{
"category": "self",
"summary": "SUSE Bug 1252817",
"url": "https://bugzilla.suse.com/1252817"
},
{
"category": "self",
"summary": "SUSE Bug 1252821",
"url": "https://bugzilla.suse.com/1252821"
},
{
"category": "self",
"summary": "SUSE Bug 1252824",
"url": "https://bugzilla.suse.com/1252824"
},
{
"category": "self",
"summary": "SUSE Bug 1252836",
"url": "https://bugzilla.suse.com/1252836"
},
{
"category": "self",
"summary": "SUSE Bug 1252845",
"url": "https://bugzilla.suse.com/1252845"
},
{
"category": "self",
"summary": "SUSE Bug 1252901",
"url": "https://bugzilla.suse.com/1252901"
},
{
"category": "self",
"summary": "SUSE Bug 1252912",
"url": "https://bugzilla.suse.com/1252912"
},
{
"category": "self",
"summary": "SUSE Bug 1252917",
"url": "https://bugzilla.suse.com/1252917"
},
{
"category": "self",
"summary": "SUSE Bug 1252919",
"url": "https://bugzilla.suse.com/1252919"
},
{
"category": "self",
"summary": "SUSE Bug 1252923",
"url": "https://bugzilla.suse.com/1252923"
},
{
"category": "self",
"summary": "SUSE Bug 1252928",
"url": "https://bugzilla.suse.com/1252928"
},
{
"category": "self",
"summary": "SUSE Bug 1253018",
"url": "https://bugzilla.suse.com/1253018"
},
{
"category": "self",
"summary": "SUSE Bug 1253155",
"url": "https://bugzilla.suse.com/1253155"
},
{
"category": "self",
"summary": "SUSE Bug 1253176",
"url": "https://bugzilla.suse.com/1253176"
},
{
"category": "self",
"summary": "SUSE Bug 1253238",
"url": "https://bugzilla.suse.com/1253238"
},
{
"category": "self",
"summary": "SUSE Bug 1253275",
"url": "https://bugzilla.suse.com/1253275"
},
{
"category": "self",
"summary": "SUSE Bug 1253318",
"url": "https://bugzilla.suse.com/1253318"
},
{
"category": "self",
"summary": "SUSE Bug 1253324",
"url": "https://bugzilla.suse.com/1253324"
},
{
"category": "self",
"summary": "SUSE Bug 1253328",
"url": "https://bugzilla.suse.com/1253328"
},
{
"category": "self",
"summary": "SUSE Bug 1253330",
"url": "https://bugzilla.suse.com/1253330"
},
{
"category": "self",
"summary": "SUSE Bug 1253342",
"url": "https://bugzilla.suse.com/1253342"
},
{
"category": "self",
"summary": "SUSE Bug 1253348",
"url": "https://bugzilla.suse.com/1253348"
},
{
"category": "self",
"summary": "SUSE Bug 1253349",
"url": "https://bugzilla.suse.com/1253349"
},
{
"category": "self",
"summary": "SUSE Bug 1253352",
"url": "https://bugzilla.suse.com/1253352"
},
{
"category": "self",
"summary": "SUSE Bug 1253355",
"url": "https://bugzilla.suse.com/1253355"
},
{
"category": "self",
"summary": "SUSE Bug 1253360",
"url": "https://bugzilla.suse.com/1253360"
},
{
"category": "self",
"summary": "SUSE Bug 1253362",
"url": "https://bugzilla.suse.com/1253362"
},
{
"category": "self",
"summary": "SUSE Bug 1253363",
"url": "https://bugzilla.suse.com/1253363"
},
{
"category": "self",
"summary": "SUSE Bug 1253367",
"url": "https://bugzilla.suse.com/1253367"
},
{
"category": "self",
"summary": "SUSE Bug 1253369",
"url": "https://bugzilla.suse.com/1253369"
},
{
"category": "self",
"summary": "SUSE Bug 1253386",
"url": "https://bugzilla.suse.com/1253386"
},
{
"category": "self",
"summary": "SUSE Bug 1253394",
"url": "https://bugzilla.suse.com/1253394"
},
{
"category": "self",
"summary": "SUSE Bug 1253395",
"url": "https://bugzilla.suse.com/1253395"
},
{
"category": "self",
"summary": "SUSE Bug 1253402",
"url": "https://bugzilla.suse.com/1253402"
},
{
"category": "self",
"summary": "SUSE Bug 1253403",
"url": "https://bugzilla.suse.com/1253403"
},
{
"category": "self",
"summary": "SUSE Bug 1253405",
"url": "https://bugzilla.suse.com/1253405"
},
{
"category": "self",
"summary": "SUSE Bug 1253407",
"url": "https://bugzilla.suse.com/1253407"
},
{
"category": "self",
"summary": "SUSE Bug 1253408",
"url": "https://bugzilla.suse.com/1253408"
},
{
"category": "self",
"summary": "SUSE Bug 1253409",
"url": "https://bugzilla.suse.com/1253409"
},
{
"category": "self",
"summary": "SUSE Bug 1253410",
"url": "https://bugzilla.suse.com/1253410"
},
{
"category": "self",
"summary": "SUSE Bug 1253412",
"url": "https://bugzilla.suse.com/1253412"
},
{
"category": "self",
"summary": "SUSE Bug 1253416",
"url": "https://bugzilla.suse.com/1253416"
},
{
"category": "self",
"summary": "SUSE Bug 1253421",
"url": "https://bugzilla.suse.com/1253421"
},
{
"category": "self",
"summary": "SUSE Bug 1253422",
"url": "https://bugzilla.suse.com/1253422"
},
{
"category": "self",
"summary": "SUSE Bug 1253423",
"url": "https://bugzilla.suse.com/1253423"
},
{
"category": "self",
"summary": "SUSE Bug 1253424",
"url": "https://bugzilla.suse.com/1253424"
},
{
"category": "self",
"summary": "SUSE Bug 1253425",
"url": "https://bugzilla.suse.com/1253425"
},
{
"category": "self",
"summary": "SUSE Bug 1253426",
"url": "https://bugzilla.suse.com/1253426"
},
{
"category": "self",
"summary": "SUSE Bug 1253427",
"url": "https://bugzilla.suse.com/1253427"
},
{
"category": "self",
"summary": "SUSE Bug 1253428",
"url": "https://bugzilla.suse.com/1253428"
},
{
"category": "self",
"summary": "SUSE Bug 1253431",
"url": "https://bugzilla.suse.com/1253431"
},
{
"category": "self",
"summary": "SUSE Bug 1253433",
"url": "https://bugzilla.suse.com/1253433"
},
{
"category": "self",
"summary": "SUSE Bug 1253436",
"url": "https://bugzilla.suse.com/1253436"
},
{
"category": "self",
"summary": "SUSE Bug 1253438",
"url": "https://bugzilla.suse.com/1253438"
},
{
"category": "self",
"summary": "SUSE Bug 1253440",
"url": "https://bugzilla.suse.com/1253440"
},
{
"category": "self",
"summary": "SUSE Bug 1253441",
"url": "https://bugzilla.suse.com/1253441"
},
{
"category": "self",
"summary": "SUSE Bug 1253443",
"url": "https://bugzilla.suse.com/1253443"
},
{
"category": "self",
"summary": "SUSE Bug 1253445",
"url": "https://bugzilla.suse.com/1253445"
},
{
"category": "self",
"summary": "SUSE Bug 1253448",
"url": "https://bugzilla.suse.com/1253448"
},
{
"category": "self",
"summary": "SUSE Bug 1253449",
"url": "https://bugzilla.suse.com/1253449"
},
{
"category": "self",
"summary": "SUSE Bug 1253450",
"url": "https://bugzilla.suse.com/1253450"
},
{
"category": "self",
"summary": "SUSE Bug 1253451",
"url": "https://bugzilla.suse.com/1253451"
},
{
"category": "self",
"summary": "SUSE Bug 1253453",
"url": "https://bugzilla.suse.com/1253453"
},
{
"category": "self",
"summary": "SUSE Bug 1253455",
"url": "https://bugzilla.suse.com/1253455"
},
{
"category": "self",
"summary": "SUSE Bug 1253456",
"url": "https://bugzilla.suse.com/1253456"
},
{
"category": "self",
"summary": "SUSE Bug 1253457",
"url": "https://bugzilla.suse.com/1253457"
},
{
"category": "self",
"summary": "SUSE Bug 1253463",
"url": "https://bugzilla.suse.com/1253463"
},
{
"category": "self",
"summary": "SUSE Bug 1253472",
"url": "https://bugzilla.suse.com/1253472"
},
{
"category": "self",
"summary": "SUSE Bug 1253622",
"url": "https://bugzilla.suse.com/1253622"
},
{
"category": "self",
"summary": "SUSE Bug 1253624",
"url": "https://bugzilla.suse.com/1253624"
},
{
"category": "self",
"summary": "SUSE Bug 1253635",
"url": "https://bugzilla.suse.com/1253635"
},
{
"category": "self",
"summary": "SUSE Bug 1253643",
"url": "https://bugzilla.suse.com/1253643"
},
{
"category": "self",
"summary": "SUSE Bug 1253647",
"url": "https://bugzilla.suse.com/1253647"
},
{
"category": "self",
"summary": "SUSE Bug 1254119",
"url": "https://bugzilla.suse.com/1254119"
},
{
"category": "self",
"summary": "SUSE Bug 1254181",
"url": "https://bugzilla.suse.com/1254181"
},
{
"category": "self",
"summary": "SUSE Bug 1254221",
"url": "https://bugzilla.suse.com/1254221"
},
{
"category": "self",
"summary": "SUSE Bug 1254308",
"url": "https://bugzilla.suse.com/1254308"
},
{
"category": "self",
"summary": "SUSE Bug 1254315",
"url": "https://bugzilla.suse.com/1254315"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-50253 page",
"url": "https://www.suse.com/security/cve/CVE-2022-50253/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-37916 page",
"url": "https://www.suse.com/security/cve/CVE-2025-37916/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-38084 page",
"url": "https://www.suse.com/security/cve/CVE-2025-38084/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-38085 page",
"url": "https://www.suse.com/security/cve/CVE-2025-38085/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-38321 page",
"url": "https://www.suse.com/security/cve/CVE-2025-38321/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-38728 page",
"url": "https://www.suse.com/security/cve/CVE-2025-38728/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-39805 page",
"url": "https://www.suse.com/security/cve/CVE-2025-39805/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-39819 page",
"url": "https://www.suse.com/security/cve/CVE-2025-39819/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-39822 page",
"url": "https://www.suse.com/security/cve/CVE-2025-39822/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-39831 page",
"url": "https://www.suse.com/security/cve/CVE-2025-39831/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-39859 page",
"url": "https://www.suse.com/security/cve/CVE-2025-39859/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-39897 page",
"url": "https://www.suse.com/security/cve/CVE-2025-39897/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-39917 page",
"url": "https://www.suse.com/security/cve/CVE-2025-39917/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-39944 page",
"url": "https://www.suse.com/security/cve/CVE-2025-39944/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-39961 page",
"url": "https://www.suse.com/security/cve/CVE-2025-39961/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-39980 page",
"url": "https://www.suse.com/security/cve/CVE-2025-39980/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-39990 page",
"url": "https://www.suse.com/security/cve/CVE-2025-39990/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40001 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40001/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40003 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40003/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40006 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40006/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40021 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40021/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40024 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40024/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40027 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40027/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40031 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40031/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40033 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40033/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40038 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40038/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40047 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40047/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40053 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40053/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40055 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40055/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40059 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40059/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40064 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40064/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40070 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40070/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40074 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40074/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40075 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40075/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40081 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40081/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40083 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40083/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40086 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40086/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40098 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40098/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40101 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40101/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40102 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40102/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40105 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40105/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40107 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40107/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40109 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40109/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40110 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40110/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40111 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40111/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40115 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40115/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40116 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40116/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40118 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40118/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40120 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40120/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40121 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40121/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40127 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40127/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40129 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40129/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40132 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40132/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40133 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40133/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40134 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40134/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40135 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40135/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40139 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40139/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40140 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40140/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40141 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40141/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40142 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40142/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40149 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40149/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40153 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40153/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40154 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40154/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40156 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40156/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40157 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40157/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40158 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40158/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40159 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40159/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40161 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40161/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40162 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40162/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40164 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40164/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40165 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40165/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40166 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40166/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40168 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40168/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40169 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40169/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40171 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40171/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40172 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40172/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40173 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40173/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40175 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40175/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40176 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40176/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40177 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40177/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40178 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40178/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40180 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40180/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40183 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40183/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40185 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40185/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40186 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40186/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40187 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40187/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40188 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40188/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40192 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40192/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40194 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40194/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40196 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40196/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40197 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40197/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40198 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40198/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40200 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40200/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40201 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40201/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40202 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40202/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40203 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40203/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40204 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40204/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40205 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40205/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40206 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40206/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40207 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40207/"
}
],
"title": "Security update for the Linux Kernel",
"tracking": {
"current_release_date": "2025-12-19T16:46:47Z",
"generator": {
"date": "2025-12-19T16:46:47Z",
"engine": {
"name": "cve-database.git:bin/generate-csaf.pl",
"version": "1"
}
},
"id": "SUSE-SU-2026:20012-1",
"initial_release_date": "2025-12-19T16:46:47Z",
"revision_history": [
{
"date": "2025-12-19T16:46:47Z",
"number": "1",
"summary": "Current version"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "kernel-64kb-6.12.0-160000.8.1.aarch64",
"product": {
"name": "kernel-64kb-6.12.0-160000.8.1.aarch64",
"product_id": "kernel-64kb-6.12.0-160000.8.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"product": {
"name": "kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"product_id": "kernel-64kb-devel-6.12.0-160000.8.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-default-6.12.0-160000.8.1.aarch64",
"product": {
"name": "kernel-default-6.12.0-160000.8.1.aarch64",
"product_id": "kernel-default-6.12.0-160000.8.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"product": {
"name": "kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"product_id": "kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-default-devel-6.12.0-160000.8.1.aarch64",
"product": {
"name": "kernel-default-devel-6.12.0-160000.8.1.aarch64",
"product_id": "kernel-default-devel-6.12.0-160000.8.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-default-extra-6.12.0-160000.8.1.aarch64",
"product": {
"name": "kernel-default-extra-6.12.0-160000.8.1.aarch64",
"product_id": "kernel-default-extra-6.12.0-160000.8.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-rt-6.12.0-160000.8.1.aarch64",
"product": {
"name": "kernel-rt-6.12.0-160000.8.1.aarch64",
"product_id": "kernel-rt-6.12.0-160000.8.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"product": {
"name": "kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"product_id": "kernel-rt-devel-6.12.0-160000.8.1.aarch64"
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-devel-6.12.0-160000.8.1.noarch",
"product": {
"name": "kernel-devel-6.12.0-160000.8.1.noarch",
"product_id": "kernel-devel-6.12.0-160000.8.1.noarch"
}
},
{
"category": "product_version",
"name": "kernel-macros-6.12.0-160000.8.1.noarch",
"product": {
"name": "kernel-macros-6.12.0-160000.8.1.noarch",
"product_id": "kernel-macros-6.12.0-160000.8.1.noarch"
}
},
{
"category": "product_version",
"name": "kernel-source-6.12.0-160000.8.1.noarch",
"product": {
"name": "kernel-source-6.12.0-160000.8.1.noarch",
"product_id": "kernel-source-6.12.0-160000.8.1.noarch"
}
}
],
"category": "architecture",
"name": "noarch"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-default-6.12.0-160000.8.1.ppc64le",
"product": {
"name": "kernel-default-6.12.0-160000.8.1.ppc64le",
"product_id": "kernel-default-6.12.0-160000.8.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"product": {
"name": "kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"product_id": "kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"product": {
"name": "kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"product_id": "kernel-default-devel-6.12.0-160000.8.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"product": {
"name": "kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"product_id": "kernel-default-extra-6.12.0-160000.8.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"product": {
"name": "kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"product_id": "kernel-default-livepatch-6.12.0-160000.8.1.ppc64le"
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-default-6.12.0-160000.8.1.s390x",
"product": {
"name": "kernel-default-6.12.0-160000.8.1.s390x",
"product_id": "kernel-default-6.12.0-160000.8.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-default-devel-6.12.0-160000.8.1.s390x",
"product": {
"name": "kernel-default-devel-6.12.0-160000.8.1.s390x",
"product_id": "kernel-default-devel-6.12.0-160000.8.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-default-extra-6.12.0-160000.8.1.s390x",
"product": {
"name": "kernel-default-extra-6.12.0-160000.8.1.s390x",
"product_id": "kernel-default-extra-6.12.0-160000.8.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"product": {
"name": "kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"product_id": "kernel-default-livepatch-6.12.0-160000.8.1.s390x"
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-default-6.12.0-160000.8.1.x86_64",
"product": {
"name": "kernel-default-6.12.0-160000.8.1.x86_64",
"product_id": "kernel-default-6.12.0-160000.8.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"product": {
"name": "kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"product_id": "kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-default-devel-6.12.0-160000.8.1.x86_64",
"product": {
"name": "kernel-default-devel-6.12.0-160000.8.1.x86_64",
"product_id": "kernel-default-devel-6.12.0-160000.8.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-default-extra-6.12.0-160000.8.1.x86_64",
"product": {
"name": "kernel-default-extra-6.12.0-160000.8.1.x86_64",
"product_id": "kernel-default-extra-6.12.0-160000.8.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"product": {
"name": "kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"product_id": "kernel-default-livepatch-6.12.0-160000.8.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-rt-6.12.0-160000.8.1.x86_64",
"product": {
"name": "kernel-rt-6.12.0-160000.8.1.x86_64",
"product_id": "kernel-rt-6.12.0-160000.8.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"product": {
"name": "kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"product_id": "kernel-rt-devel-6.12.0-160000.8.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-rt-livepatch-6.12.0-160000.8.1.x86_64",
"product": {
"name": "kernel-rt-livepatch-6.12.0-160000.8.1.x86_64",
"product_id": "kernel-rt-livepatch-6.12.0-160000.8.1.x86_64"
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_name",
"name": "SUSE Linux Micro 6.2",
"product": {
"name": "SUSE Linux Micro 6.2",
"product_id": "SUSE Linux Micro 6.2",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sles:16:16.0:transactional"
}
}
}
],
"category": "product_family",
"name": "SUSE Linux Enterprise"
}
],
"category": "vendor",
"name": "SUSE"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-64kb-6.12.0-160000.8.1.aarch64 as component of SUSE Linux Micro 6.2",
"product_id": "SUSE Linux Micro 6.2:kernel-64kb-6.12.0-160000.8.1.aarch64"
},
"product_reference": "kernel-64kb-6.12.0-160000.8.1.aarch64",
"relates_to_product_reference": "SUSE Linux Micro 6.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-64kb-devel-6.12.0-160000.8.1.aarch64 as component of SUSE Linux Micro 6.2",
"product_id": "SUSE Linux Micro 6.2:kernel-64kb-devel-6.12.0-160000.8.1.aarch64"
},
"product_reference": "kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"relates_to_product_reference": "SUSE Linux Micro 6.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-6.12.0-160000.8.1.aarch64 as component of SUSE Linux Micro 6.2",
"product_id": "SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.aarch64"
},
"product_reference": "kernel-default-6.12.0-160000.8.1.aarch64",
"relates_to_product_reference": "SUSE Linux Micro 6.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-6.12.0-160000.8.1.ppc64le as component of SUSE Linux Micro 6.2",
"product_id": "SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.ppc64le"
},
"product_reference": "kernel-default-6.12.0-160000.8.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Micro 6.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-6.12.0-160000.8.1.s390x as component of SUSE Linux Micro 6.2",
"product_id": "SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.s390x"
},
"product_reference": "kernel-default-6.12.0-160000.8.1.s390x",
"relates_to_product_reference": "SUSE Linux Micro 6.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-6.12.0-160000.8.1.x86_64 as component of SUSE Linux Micro 6.2",
"product_id": "SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.x86_64"
},
"product_reference": "kernel-default-6.12.0-160000.8.1.x86_64",
"relates_to_product_reference": "SUSE Linux Micro 6.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64 as component of SUSE Linux Micro 6.2",
"product_id": "SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64"
},
"product_reference": "kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"relates_to_product_reference": "SUSE Linux Micro 6.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le as component of SUSE Linux Micro 6.2",
"product_id": "SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le"
},
"product_reference": "kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"relates_to_product_reference": "SUSE Linux Micro 6.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64 as component of SUSE Linux Micro 6.2",
"product_id": "SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64"
},
"product_reference": "kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"relates_to_product_reference": "SUSE Linux Micro 6.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-devel-6.12.0-160000.8.1.aarch64 as component of SUSE Linux Micro 6.2",
"product_id": "SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.aarch64"
},
"product_reference": "kernel-default-devel-6.12.0-160000.8.1.aarch64",
"relates_to_product_reference": "SUSE Linux Micro 6.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-devel-6.12.0-160000.8.1.ppc64le as component of SUSE Linux Micro 6.2",
"product_id": "SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.ppc64le"
},
"product_reference": "kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Micro 6.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-devel-6.12.0-160000.8.1.s390x as component of SUSE Linux Micro 6.2",
"product_id": "SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.s390x"
},
"product_reference": "kernel-default-devel-6.12.0-160000.8.1.s390x",
"relates_to_product_reference": "SUSE Linux Micro 6.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-devel-6.12.0-160000.8.1.x86_64 as component of SUSE Linux Micro 6.2",
"product_id": "SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.x86_64"
},
"product_reference": "kernel-default-devel-6.12.0-160000.8.1.x86_64",
"relates_to_product_reference": "SUSE Linux Micro 6.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-extra-6.12.0-160000.8.1.aarch64 as component of SUSE Linux Micro 6.2",
"product_id": "SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.aarch64"
},
"product_reference": "kernel-default-extra-6.12.0-160000.8.1.aarch64",
"relates_to_product_reference": "SUSE Linux Micro 6.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-extra-6.12.0-160000.8.1.ppc64le as component of SUSE Linux Micro 6.2",
"product_id": "SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.ppc64le"
},
"product_reference": "kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Micro 6.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-extra-6.12.0-160000.8.1.s390x as component of SUSE Linux Micro 6.2",
"product_id": "SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.s390x"
},
"product_reference": "kernel-default-extra-6.12.0-160000.8.1.s390x",
"relates_to_product_reference": "SUSE Linux Micro 6.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-extra-6.12.0-160000.8.1.x86_64 as component of SUSE Linux Micro 6.2",
"product_id": "SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.x86_64"
},
"product_reference": "kernel-default-extra-6.12.0-160000.8.1.x86_64",
"relates_to_product_reference": "SUSE Linux Micro 6.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-livepatch-6.12.0-160000.8.1.ppc64le as component of SUSE Linux Micro 6.2",
"product_id": "SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le"
},
"product_reference": "kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Micro 6.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-livepatch-6.12.0-160000.8.1.s390x as component of SUSE Linux Micro 6.2",
"product_id": "SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.s390x"
},
"product_reference": "kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"relates_to_product_reference": "SUSE Linux Micro 6.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-livepatch-6.12.0-160000.8.1.x86_64 as component of SUSE Linux Micro 6.2",
"product_id": "SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.x86_64"
},
"product_reference": "kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"relates_to_product_reference": "SUSE Linux Micro 6.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-6.12.0-160000.8.1.noarch as component of SUSE Linux Micro 6.2",
"product_id": "SUSE Linux Micro 6.2:kernel-devel-6.12.0-160000.8.1.noarch"
},
"product_reference": "kernel-devel-6.12.0-160000.8.1.noarch",
"relates_to_product_reference": "SUSE Linux Micro 6.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-macros-6.12.0-160000.8.1.noarch as component of SUSE Linux Micro 6.2",
"product_id": "SUSE Linux Micro 6.2:kernel-macros-6.12.0-160000.8.1.noarch"
},
"product_reference": "kernel-macros-6.12.0-160000.8.1.noarch",
"relates_to_product_reference": "SUSE Linux Micro 6.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-6.12.0-160000.8.1.aarch64 as component of SUSE Linux Micro 6.2",
"product_id": "SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.aarch64"
},
"product_reference": "kernel-rt-6.12.0-160000.8.1.aarch64",
"relates_to_product_reference": "SUSE Linux Micro 6.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-6.12.0-160000.8.1.x86_64 as component of SUSE Linux Micro 6.2",
"product_id": "SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.x86_64"
},
"product_reference": "kernel-rt-6.12.0-160000.8.1.x86_64",
"relates_to_product_reference": "SUSE Linux Micro 6.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-devel-6.12.0-160000.8.1.aarch64 as component of SUSE Linux Micro 6.2",
"product_id": "SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.aarch64"
},
"product_reference": "kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"relates_to_product_reference": "SUSE Linux Micro 6.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-devel-6.12.0-160000.8.1.x86_64 as component of SUSE Linux Micro 6.2",
"product_id": "SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.x86_64"
},
"product_reference": "kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"relates_to_product_reference": "SUSE Linux Micro 6.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-livepatch-6.12.0-160000.8.1.x86_64 as component of SUSE Linux Micro 6.2",
"product_id": "SUSE Linux Micro 6.2:kernel-rt-livepatch-6.12.0-160000.8.1.x86_64"
},
"product_reference": "kernel-rt-livepatch-6.12.0-160000.8.1.x86_64",
"relates_to_product_reference": "SUSE Linux Micro 6.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-source-6.12.0-160000.8.1.noarch as component of SUSE Linux Micro 6.2",
"product_id": "SUSE Linux Micro 6.2:kernel-source-6.12.0-160000.8.1.noarch"
},
"product_reference": "kernel-source-6.12.0-160000.8.1.noarch",
"relates_to_product_reference": "SUSE Linux Micro 6.2"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2022-50253",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-50253"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nbpf: make sure skb-\u003elen != 0 when redirecting to a tunneling device\n\nsyzkaller managed to trigger another case where skb-\u003elen == 0\nwhen we enter __dev_queue_xmit:\n\nWARNING: CPU: 0 PID: 2470 at include/linux/skbuff.h:2576 skb_assert_len include/linux/skbuff.h:2576 [inline]\nWARNING: CPU: 0 PID: 2470 at include/linux/skbuff.h:2576 __dev_queue_xmit+0x2069/0x35e0 net/core/dev.c:4295\n\nCall Trace:\n dev_queue_xmit+0x17/0x20 net/core/dev.c:4406\n __bpf_tx_skb net/core/filter.c:2115 [inline]\n __bpf_redirect_no_mac net/core/filter.c:2140 [inline]\n __bpf_redirect+0x5fb/0xda0 net/core/filter.c:2163\n ____bpf_clone_redirect net/core/filter.c:2447 [inline]\n bpf_clone_redirect+0x247/0x390 net/core/filter.c:2419\n bpf_prog_48159a89cb4a9a16+0x59/0x5e\n bpf_dispatcher_nop_func include/linux/bpf.h:897 [inline]\n __bpf_prog_run include/linux/filter.h:596 [inline]\n bpf_prog_run include/linux/filter.h:603 [inline]\n bpf_test_run+0x46c/0x890 net/bpf/test_run.c:402\n bpf_prog_test_run_skb+0xbdc/0x14c0 net/bpf/test_run.c:1170\n bpf_prog_test_run+0x345/0x3c0 kernel/bpf/syscall.c:3648\n __sys_bpf+0x43a/0x6c0 kernel/bpf/syscall.c:5005\n __do_sys_bpf kernel/bpf/syscall.c:5091 [inline]\n __se_sys_bpf kernel/bpf/syscall.c:5089 [inline]\n __x64_sys_bpf+0x7c/0x90 kernel/bpf/syscall.c:5089\n do_syscall_64+0x54/0x70 arch/x86/entry/common.c:48\n entry_SYSCALL_64_after_hwframe+0x61/0xc6\n\nThe reproducer doesn\u0027t really reproduce outside of syzkaller\nenvironment, so I\u0027m taking a guess here. It looks like we\ndo generate correct ETH_HLEN-sized packet, but we redirect\nthe packet to the tunneling device. Before we do so, we\n__skb_pull l2 header and arrive again at skb-\u003elen == 0.\nDoesn\u0027t seem like we can do anything better than having\nan explicit check after __skb_pull?",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Micro 6.2:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-source-6.12.0-160000.8.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-50253",
"url": "https://www.suse.com/security/cve/CVE-2022-50253"
},
{
"category": "external",
"summary": "SUSE Bug 1249912 for CVE-2022-50253",
"url": "https://bugzilla.suse.com/1249912"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Micro 6.2:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-source-6.12.0-160000.8.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Micro 6.2:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-source-6.12.0-160000.8.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-19T16:46:47Z",
"details": "moderate"
}
],
"title": "CVE-2022-50253"
},
{
"cve": "CVE-2025-37916",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-37916"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\npds_core: remove write-after-free of client_id\n\nA use-after-free error popped up in stress testing:\n\n[Mon Apr 21 21:21:33 2025] BUG: KFENCE: use-after-free write in pdsc_auxbus_dev_del+0xef/0x160 [pds_core]\n[Mon Apr 21 21:21:33 2025] Use-after-free write at 0x000000007013ecd1 (in kfence-#47):\n[Mon Apr 21 21:21:33 2025] pdsc_auxbus_dev_del+0xef/0x160 [pds_core]\n[Mon Apr 21 21:21:33 2025] pdsc_remove+0xc0/0x1b0 [pds_core]\n[Mon Apr 21 21:21:33 2025] pci_device_remove+0x24/0x70\n[Mon Apr 21 21:21:33 2025] device_release_driver_internal+0x11f/0x180\n[Mon Apr 21 21:21:33 2025] driver_detach+0x45/0x80\n[Mon Apr 21 21:21:33 2025] bus_remove_driver+0x83/0xe0\n[Mon Apr 21 21:21:33 2025] pci_unregister_driver+0x1a/0x80\n\nThe actual device uninit usually happens on a separate thread\nscheduled after this code runs, but there is no guarantee of order\nof thread execution, so this could be a problem. There\u0027s no\nactual need to clear the client_id at this point, so simply\nremove the offending code.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Micro 6.2:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-source-6.12.0-160000.8.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-37916",
"url": "https://www.suse.com/security/cve/CVE-2025-37916"
},
{
"category": "external",
"summary": "SUSE Bug 1243474 for CVE-2025-37916",
"url": "https://bugzilla.suse.com/1243474"
},
{
"category": "external",
"summary": "SUSE Bug 1243535 for CVE-2025-37916",
"url": "https://bugzilla.suse.com/1243535"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Micro 6.2:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-source-6.12.0-160000.8.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Micro 6.2:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-source-6.12.0-160000.8.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-19T16:46:47Z",
"details": "moderate"
}
],
"title": "CVE-2025-37916"
},
{
"cve": "CVE-2025-38084",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-38084"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nmm/hugetlb: unshare page tables during VMA split, not before\n\nCurrently, __split_vma() triggers hugetlb page table unsharing through\nvm_ops-\u003emay_split(). This happens before the VMA lock and rmap locks are\ntaken - which is too early, it allows racing VMA-locked page faults in our\nprocess and racing rmap walks from other processes to cause page tables to\nbe shared again before we actually perform the split.\n\nFix it by explicitly calling into the hugetlb unshare logic from\n__split_vma() in the same place where THP splitting also happens. At that\npoint, both the VMA and the rmap(s) are write-locked.\n\nAn annoying detail is that we can now call into the helper\nhugetlb_unshare_pmds() from two different locking contexts:\n\n1. from hugetlb_split(), holding:\n - mmap lock (exclusively)\n - VMA lock\n - file rmap lock (exclusively)\n2. hugetlb_unshare_all_pmds(), which I think is designed to be able to\n call us with only the mmap lock held (in shared mode), but currently\n only runs while holding mmap lock (exclusively) and VMA lock\n\nBackporting note:\nThis commit fixes a racy protection that was introduced in commit\nb30c14cd6102 (\"hugetlb: unshare some PMDs when splitting VMAs\"); that\ncommit claimed to fix an issue introduced in 5.13, but it should actually\nalso go all the way back.\n\n[jannh@google.com: v2]",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Micro 6.2:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-source-6.12.0-160000.8.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-38084",
"url": "https://www.suse.com/security/cve/CVE-2025-38084"
},
{
"category": "external",
"summary": "SUSE Bug 1245498 for CVE-2025-38084",
"url": "https://bugzilla.suse.com/1245498"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Micro 6.2:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-source-6.12.0-160000.8.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.8,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Micro 6.2:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-source-6.12.0-160000.8.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-19T16:46:47Z",
"details": "moderate"
}
],
"title": "CVE-2025-38084"
},
{
"cve": "CVE-2025-38085",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-38085"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nmm/hugetlb: fix huge_pmd_unshare() vs GUP-fast race\n\nhuge_pmd_unshare() drops a reference on a page table that may have\npreviously been shared across processes, potentially turning it into a\nnormal page table used in another process in which unrelated VMAs can\nafterwards be installed.\n\nIf this happens in the middle of a concurrent gup_fast(), gup_fast() could\nend up walking the page tables of another process. While I don\u0027t see any\nway in which that immediately leads to kernel memory corruption, it is\nreally weird and unexpected.\n\nFix it with an explicit broadcast IPI through tlb_remove_table_sync_one(),\njust like we do in khugepaged when removing page tables for a THP\ncollapse.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Micro 6.2:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-source-6.12.0-160000.8.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-38085",
"url": "https://www.suse.com/security/cve/CVE-2025-38085"
},
{
"category": "external",
"summary": "SUSE Bug 1245499 for CVE-2025-38085",
"url": "https://bugzilla.suse.com/1245499"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Micro 6.2:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-source-6.12.0-160000.8.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.6,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Micro 6.2:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-source-6.12.0-160000.8.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-19T16:46:47Z",
"details": "moderate"
}
],
"title": "CVE-2025-38085"
},
{
"cve": "CVE-2025-38321",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-38321"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nsmb: Log an error when close_all_cached_dirs fails\n\nUnder low-memory conditions, close_all_cached_dirs() can\u0027t move the\ndentries to a separate list to dput() them once the locks are dropped.\nThis will result in a \"Dentry still in use\" error, so add an error\nmessage that makes it clear this is what happened:\n\n[ 495.281119] CIFS: VFS: \\\\otters.example.com\\share Out of memory while dropping dentries\n[ 495.281595] ------------[ cut here ]------------\n[ 495.281887] BUG: Dentry ffff888115531138{i=78,n=/} still in use (2) [unmount of cifs cifs]\n[ 495.282391] WARNING: CPU: 1 PID: 2329 at fs/dcache.c:1536 umount_check+0xc8/0xf0\n\nAlso, bail out of looping through all tcons as soon as a single\nallocation fails, since we\u0027re already in trouble, and kmalloc() attempts\nfor subseqeuent tcons are likely to fail just like the first one did.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Micro 6.2:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-source-6.12.0-160000.8.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-38321",
"url": "https://www.suse.com/security/cve/CVE-2025-38321"
},
{
"category": "external",
"summary": "SUSE Bug 1246328 for CVE-2025-38321",
"url": "https://bugzilla.suse.com/1246328"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Micro 6.2:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-source-6.12.0-160000.8.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L",
"version": "3.1"
},
"products": [
"SUSE Linux Micro 6.2:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-source-6.12.0-160000.8.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-19T16:46:47Z",
"details": "moderate"
}
],
"title": "CVE-2025-38321"
},
{
"cve": "CVE-2025-38728",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-38728"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nsmb3: fix for slab out of bounds on mount to ksmbd\n\nWith KASAN enabled, it is possible to get a slab out of bounds\nduring mount to ksmbd due to missing check in parse_server_interfaces()\n(see below):\n\n BUG: KASAN: slab-out-of-bounds in\n parse_server_interfaces+0x14ee/0x1880 [cifs]\n Read of size 4 at addr ffff8881433dba98 by task mount/9827\n\n CPU: 5 UID: 0 PID: 9827 Comm: mount Tainted: G\n OE 6.16.0-rc2-kasan #2 PREEMPT(voluntary)\n Tainted: [O]=OOT_MODULE, [E]=UNSIGNED_MODULE\n Hardware name: Dell Inc. Precision Tower 3620/0MWYPT,\n BIOS 2.13.1 06/14/2019\n Call Trace:\n \u003cTASK\u003e\n dump_stack_lvl+0x9f/0xf0\n print_report+0xd1/0x670\n __virt_addr_valid+0x22c/0x430\n ? parse_server_interfaces+0x14ee/0x1880 [cifs]\n ? kasan_complete_mode_report_info+0x2a/0x1f0\n ? parse_server_interfaces+0x14ee/0x1880 [cifs]\n kasan_report+0xd6/0x110\n parse_server_interfaces+0x14ee/0x1880 [cifs]\n __asan_report_load_n_noabort+0x13/0x20\n parse_server_interfaces+0x14ee/0x1880 [cifs]\n ? __pfx_parse_server_interfaces+0x10/0x10 [cifs]\n ? trace_hardirqs_on+0x51/0x60\n SMB3_request_interfaces+0x1ad/0x3f0 [cifs]\n ? __pfx_SMB3_request_interfaces+0x10/0x10 [cifs]\n ? SMB2_tcon+0x23c/0x15d0 [cifs]\n smb3_qfs_tcon+0x173/0x2b0 [cifs]\n ? __pfx_smb3_qfs_tcon+0x10/0x10 [cifs]\n ? cifs_get_tcon+0x105d/0x2120 [cifs]\n ? do_raw_spin_unlock+0x5d/0x200\n ? cifs_get_tcon+0x105d/0x2120 [cifs]\n ? __pfx_smb3_qfs_tcon+0x10/0x10 [cifs]\n cifs_mount_get_tcon+0x369/0xb90 [cifs]\n ? dfs_cache_find+0xe7/0x150 [cifs]\n dfs_mount_share+0x985/0x2970 [cifs]\n ? check_path.constprop.0+0x28/0x50\n ? save_trace+0x54/0x370\n ? __pfx_dfs_mount_share+0x10/0x10 [cifs]\n ? __lock_acquire+0xb82/0x2ba0\n ? __kasan_check_write+0x18/0x20\n cifs_mount+0xbc/0x9e0 [cifs]\n ? __pfx_cifs_mount+0x10/0x10 [cifs]\n ? do_raw_spin_unlock+0x5d/0x200\n ? cifs_setup_cifs_sb+0x29d/0x810 [cifs]\n cifs_smb3_do_mount+0x263/0x1990 [cifs]",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Micro 6.2:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-source-6.12.0-160000.8.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-38728",
"url": "https://www.suse.com/security/cve/CVE-2025-38728"
},
{
"category": "external",
"summary": "SUSE Bug 1249256 for CVE-2025-38728",
"url": "https://bugzilla.suse.com/1249256"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Micro 6.2:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-source-6.12.0-160000.8.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Micro 6.2:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-source-6.12.0-160000.8.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-19T16:46:47Z",
"details": "moderate"
}
],
"title": "CVE-2025-38728"
},
{
"cve": "CVE-2025-39805",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-39805"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nnet: macb: fix unregister_netdev call order in macb_remove()\n\nWhen removing a macb device, the driver calls phy_exit() before\nunregister_netdev(). This leads to a WARN from kernfs:\n\n ------------[ cut here ]------------\n kernfs: can not remove \u0027attached_dev\u0027, no directory\n WARNING: CPU: 1 PID: 27146 at fs/kernfs/dir.c:1683\n Call trace:\n kernfs_remove_by_name_ns+0xd8/0xf0\n sysfs_remove_link+0x24/0x58\n phy_detach+0x5c/0x168\n phy_disconnect+0x4c/0x70\n phylink_disconnect_phy+0x6c/0xc0 [phylink]\n macb_close+0x6c/0x170 [macb]\n ...\n macb_remove+0x60/0x168 [macb]\n platform_remove+0x5c/0x80\n ...\n\nThe warning happens because the PHY is being exited while the netdev\nis still registered. The correct order is to unregister the netdev\nbefore shutting down the PHY and cleaning up the MDIO bus.\n\nFix this by moving unregister_netdev() ahead of phy_exit() in\nmacb_remove().",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Micro 6.2:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-source-6.12.0-160000.8.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-39805",
"url": "https://www.suse.com/security/cve/CVE-2025-39805"
},
{
"category": "external",
"summary": "SUSE Bug 1249982 for CVE-2025-39805",
"url": "https://bugzilla.suse.com/1249982"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Micro 6.2:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-source-6.12.0-160000.8.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Micro 6.2:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-source-6.12.0-160000.8.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-19T16:46:47Z",
"details": "moderate"
}
],
"title": "CVE-2025-39805"
},
{
"cve": "CVE-2025-39819",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-39819"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nfs/smb: Fix inconsistent refcnt update\n\nA possible inconsistent update of refcount was identified in `smb2_compound_op`.\nSuch inconsistent update could lead to possible resource leaks.\n\nWhy it is a possible bug:\n1. In the comment section of the function, it clearly states that the\nreference to `cfile` should be dropped after calling this function.\n2. Every control flow path would check and drop the reference to\n`cfile`, except the patched one.\n3. Existing callers would not handle refcount update of `cfile` if\n-ENOMEM is returned.\n\nTo fix the bug, an extra goto label \"out\" is added, to make sure that the\ncleanup logic would always be respected. As the problem is caused by the\nallocation failure of `vars`, the cleanup logic between label \"finished\"\nand \"out\" can be safely ignored. According to the definition of function\n`is_replayable_error`, the error code of \"-ENOMEM\" is not recoverable.\nTherefore, the replay logic also gets ignored.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Micro 6.2:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-source-6.12.0-160000.8.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-39819",
"url": "https://www.suse.com/security/cve/CVE-2025-39819"
},
{
"category": "external",
"summary": "SUSE Bug 1250176 for CVE-2025-39819",
"url": "https://bugzilla.suse.com/1250176"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Micro 6.2:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-source-6.12.0-160000.8.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Micro 6.2:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-source-6.12.0-160000.8.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-19T16:46:47Z",
"details": "moderate"
}
],
"title": "CVE-2025-39819"
},
{
"cve": "CVE-2025-39822",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-39822"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nio_uring/kbuf: fix signedness in this_len calculation\n\nWhen importing and using buffers, buf-\u003elen is considered unsigned.\nHowever, buf-\u003elen is converted to signed int when committing. This can\nlead to unexpected behavior if the buffer is large enough to be\ninterpreted as a negative value. Make min_t calculation unsigned.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Micro 6.2:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-source-6.12.0-160000.8.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-39822",
"url": "https://www.suse.com/security/cve/CVE-2025-39822"
},
{
"category": "external",
"summary": "SUSE Bug 1250034 for CVE-2025-39822",
"url": "https://bugzilla.suse.com/1250034"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Micro 6.2:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-source-6.12.0-160000.8.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Micro 6.2:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-source-6.12.0-160000.8.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-19T16:46:47Z",
"details": "moderate"
}
],
"title": "CVE-2025-39822"
},
{
"cve": "CVE-2025-39831",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-39831"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nfbnic: Move phylink resume out of service_task and into open/close\n\nThe fbnic driver was presenting with the following locking assert coming\nout of a PM resume:\n[ 42.208116][ T164] RTNL: assertion failed at drivers/net/phy/phylink.c (2611)\n[ 42.208492][ T164] WARNING: CPU: 1 PID: 164 at drivers/net/phy/phylink.c:2611 phylink_resume+0x190/0x1e0\n[ 42.208872][ T164] Modules linked in:\n[ 42.209140][ T164] CPU: 1 UID: 0 PID: 164 Comm: bash Not tainted 6.17.0-rc2-virtme #134 PREEMPT(full)\n[ 42.209496][ T164] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.17.0-5.fc42 04/01/2014\n[ 42.209861][ T164] RIP: 0010:phylink_resume+0x190/0x1e0\n[ 42.210057][ T164] Code: 83 e5 01 0f 85 b0 fe ff ff c6 05 1c cd 3e 02 01 90 ba 33 0a 00 00 48 c7 c6 20 3a 1d a5 48 c7 c7 e0 3e 1d a5 e8 21 b8 90 fe 90 \u003c0f\u003e 0b 90 90 e9 86 fe ff ff e8 42 ea 1f ff e9 e2 fe ff ff 48 89 ef\n[ 42.210708][ T164] RSP: 0018:ffffc90000affbd8 EFLAGS: 00010296\n[ 42.210983][ T164] RAX: 0000000000000000 RBX: ffff8880078d8400 RCX: 0000000000000000\n[ 42.211235][ T164] RDX: 0000000000000000 RSI: 1ffffffff4f10938 RDI: 0000000000000001\n[ 42.211466][ T164] RBP: 0000000000000000 R08: ffffffffa2ae79ea R09: fffffbfff4b3eb84\n[ 42.211707][ T164] R10: 0000000000000003 R11: 0000000000000000 R12: ffff888007ad8000\n[ 42.211997][ T164] R13: 0000000000000002 R14: ffff888006a18800 R15: ffffffffa34c59e0\n[ 42.212234][ T164] FS: 00007f0dc8e39740(0000) GS:ffff88808f51f000(0000) knlGS:0000000000000000\n[ 42.212505][ T164] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033\n[ 42.212704][ T164] CR2: 00007f0dc8e9fe10 CR3: 000000000b56d003 CR4: 0000000000772ef0\n[ 42.213227][ T164] PKRU: 55555554\n[ 42.213366][ T164] Call Trace:\n[ 42.213483][ T164] \u003cTASK\u003e\n[ 42.213565][ T164] __fbnic_pm_attach.isra.0+0x8e/0xa0\n[ 42.213725][ T164] pci_reset_function+0x116/0x1d0\n[ 42.213895][ T164] reset_store+0xa0/0x100\n[ 42.214025][ T164] ? pci_dev_reset_attr_is_visible+0x50/0x50\n[ 42.214221][ T164] ? sysfs_file_kobj+0xc1/0x1e0\n[ 42.214374][ T164] ? sysfs_kf_write+0x65/0x160\n[ 42.214526][ T164] kernfs_fop_write_iter+0x2f8/0x4c0\n[ 42.214677][ T164] ? kernfs_vma_page_mkwrite+0x1f0/0x1f0\n[ 42.214836][ T164] new_sync_write+0x308/0x6f0\n[ 42.214987][ T164] ? __lock_acquire+0x34c/0x740\n[ 42.215135][ T164] ? new_sync_read+0x6f0/0x6f0\n[ 42.215288][ T164] ? lock_acquire.part.0+0xbc/0x260\n[ 42.215440][ T164] ? ksys_write+0xff/0x200\n[ 42.215590][ T164] ? perf_trace_sched_switch+0x6d0/0x6d0\n[ 42.215742][ T164] vfs_write+0x65e/0xbb0\n[ 42.215876][ T164] ksys_write+0xff/0x200\n[ 42.215994][ T164] ? __ia32_sys_read+0xc0/0xc0\n[ 42.216141][ T164] ? do_user_addr_fault+0x269/0x9f0\n[ 42.216292][ T164] ? rcu_is_watching+0x15/0xd0\n[ 42.216442][ T164] do_syscall_64+0xbb/0x360\n[ 42.216591][ T164] entry_SYSCALL_64_after_hwframe+0x4b/0x53\n[ 42.216784][ T164] RIP: 0033:0x7f0dc8ea9986\n\nA bit of digging showed that we were invoking the phylink_resume as a part\nof the fbnic_up path when we were enabling the service task while not\nholding the RTNL lock. We should be enabling this sooner as a part of the\nndo_open path and then just letting the service task come online later.\nThis will help to enforce the correct locking and brings the phylink\ninterface online at the same time as the network interface, instead of at a\nlater time.\n\nI tested this on QEMU to verify this was working by putting the system to\nsleep using \"echo mem \u003e /sys/power/state\" to put the system to sleep in the\nguest and then using the command \"system_wakeup\" in the QEMU monitor.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Micro 6.2:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-source-6.12.0-160000.8.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-39831",
"url": "https://www.suse.com/security/cve/CVE-2025-39831"
},
{
"category": "external",
"summary": "SUSE Bug 1249977 for CVE-2025-39831",
"url": "https://bugzilla.suse.com/1249977"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Micro 6.2:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-source-6.12.0-160000.8.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Micro 6.2:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-source-6.12.0-160000.8.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-19T16:46:47Z",
"details": "moderate"
}
],
"title": "CVE-2025-39831"
},
{
"cve": "CVE-2025-39859",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-39859"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nptp: ocp: fix use-after-free bugs causing by ptp_ocp_watchdog\n\nThe ptp_ocp_detach() only shuts down the watchdog timer if it is\npending. However, if the timer handler is already running, the\ntimer_delete_sync() is not called. This leads to race conditions\nwhere the devlink that contains the ptp_ocp is deallocated while\nthe timer handler is still accessing it, resulting in use-after-free\nbugs. The following details one of the race scenarios.\n\n(thread 1) | (thread 2)\nptp_ocp_remove() |\n ptp_ocp_detach() | ptp_ocp_watchdog()\n if (timer_pending(\u0026bp-\u003ewatchdog))| bp = timer_container_of()\n timer_delete_sync() |\n |\n devlink_free(devlink) //free |\n | bp-\u003e //use\n\nResolve this by unconditionally calling timer_delete_sync() to ensure\nthe timer is reliably deactivated, preventing any access after free.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Micro 6.2:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-source-6.12.0-160000.8.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-39859",
"url": "https://www.suse.com/security/cve/CVE-2025-39859"
},
{
"category": "external",
"summary": "SUSE Bug 1250252 for CVE-2025-39859",
"url": "https://bugzilla.suse.com/1250252"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Micro 6.2:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-source-6.12.0-160000.8.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Micro 6.2:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-source-6.12.0-160000.8.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-19T16:46:47Z",
"details": "moderate"
}
],
"title": "CVE-2025-39859"
},
{
"cve": "CVE-2025-39897",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-39897"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nnet: xilinx: axienet: Add error handling for RX metadata pointer retrieval\n\nAdd proper error checking for dmaengine_desc_get_metadata_ptr() which\ncan return an error pointer and lead to potential crashes or undefined\nbehaviour if the pointer retrieval fails.\n\nProperly handle the error by unmapping DMA buffer, freeing the skb and\nreturning early to prevent further processing with invalid data.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Micro 6.2:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-source-6.12.0-160000.8.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-39897",
"url": "https://www.suse.com/security/cve/CVE-2025-39897"
},
{
"category": "external",
"summary": "SUSE Bug 1250746 for CVE-2025-39897",
"url": "https://bugzilla.suse.com/1250746"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Micro 6.2:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-source-6.12.0-160000.8.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.6,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Micro 6.2:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-source-6.12.0-160000.8.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-19T16:46:47Z",
"details": "moderate"
}
],
"title": "CVE-2025-39897"
},
{
"cve": "CVE-2025-39917",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-39917"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nbpf: Fix out-of-bounds dynptr write in bpf_crypto_crypt\n\nStanislav reported that in bpf_crypto_crypt() the destination dynptr\u0027s\nsize is not validated to be at least as large as the source dynptr\u0027s\nsize before calling into the crypto backend with \u0027len = src_len\u0027. This\ncan result in an OOB write when the destination is smaller than the\nsource.\n\nConcretely, in mentioned function, psrc and pdst are both linear\nbuffers fetched from each dynptr:\n\n psrc = __bpf_dynptr_data(src, src_len);\n [...]\n pdst = __bpf_dynptr_data_rw(dst, dst_len);\n [...]\n err = decrypt ?\n ctx-\u003etype-\u003edecrypt(ctx-\u003etfm, psrc, pdst, src_len, piv) :\n ctx-\u003etype-\u003eencrypt(ctx-\u003etfm, psrc, pdst, src_len, piv);\n\nThe crypto backend expects pdst to be large enough with a src_len length\nthat can be written. Add an additional src_len \u003e dst_len check and bail\nout if it\u0027s the case. Note that these kfuncs are accessible under root\nprivileges only.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Micro 6.2:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-source-6.12.0-160000.8.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-39917",
"url": "https://www.suse.com/security/cve/CVE-2025-39917"
},
{
"category": "external",
"summary": "SUSE Bug 1250723 for CVE-2025-39917",
"url": "https://bugzilla.suse.com/1250723"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Micro 6.2:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-source-6.12.0-160000.8.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:H/A:N",
"version": "3.1"
},
"products": [
"SUSE Linux Micro 6.2:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-source-6.12.0-160000.8.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-19T16:46:47Z",
"details": "moderate"
}
],
"title": "CVE-2025-39917"
},
{
"cve": "CVE-2025-39944",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-39944"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nocteontx2-pf: Fix use-after-free bugs in otx2_sync_tstamp()\n\nThe original code relies on cancel_delayed_work() in otx2_ptp_destroy(),\nwhich does not ensure that the delayed work item synctstamp_work has fully\ncompleted if it was already running. This leads to use-after-free scenarios\nwhere otx2_ptp is deallocated by otx2_ptp_destroy(), while synctstamp_work\nremains active and attempts to dereference otx2_ptp in otx2_sync_tstamp().\nFurthermore, the synctstamp_work is cyclic, the likelihood of triggering\nthe bug is nonnegligible.\n\nA typical race condition is illustrated below:\n\nCPU 0 (cleanup) | CPU 1 (delayed work callback)\notx2_remove() |\n otx2_ptp_destroy() | otx2_sync_tstamp()\n cancel_delayed_work() |\n kfree(ptp) |\n | ptp = container_of(...); //UAF\n | ptp-\u003e //UAF\n\nThis is confirmed by a KASAN report:\n\nBUG: KASAN: slab-use-after-free in __run_timer_base.part.0+0x7d7/0x8c0\nWrite of size 8 at addr ffff88800aa09a18 by task bash/136\n...\nCall Trace:\n \u003cIRQ\u003e\n dump_stack_lvl+0x55/0x70\n print_report+0xcf/0x610\n ? __run_timer_base.part.0+0x7d7/0x8c0\n kasan_report+0xb8/0xf0\n ? __run_timer_base.part.0+0x7d7/0x8c0\n __run_timer_base.part.0+0x7d7/0x8c0\n ? __pfx___run_timer_base.part.0+0x10/0x10\n ? __pfx_read_tsc+0x10/0x10\n ? ktime_get+0x60/0x140\n ? lapic_next_event+0x11/0x20\n ? clockevents_program_event+0x1d4/0x2a0\n run_timer_softirq+0xd1/0x190\n handle_softirqs+0x16a/0x550\n irq_exit_rcu+0xaf/0xe0\n sysvec_apic_timer_interrupt+0x70/0x80\n \u003c/IRQ\u003e\n...\nAllocated by task 1:\n kasan_save_stack+0x24/0x50\n kasan_save_track+0x14/0x30\n __kasan_kmalloc+0x7f/0x90\n otx2_ptp_init+0xb1/0x860\n otx2_probe+0x4eb/0xc30\n local_pci_probe+0xdc/0x190\n pci_device_probe+0x2fe/0x470\n really_probe+0x1ca/0x5c0\n __driver_probe_device+0x248/0x310\n driver_probe_device+0x44/0x120\n __driver_attach+0xd2/0x310\n bus_for_each_dev+0xed/0x170\n bus_add_driver+0x208/0x500\n driver_register+0x132/0x460\n do_one_initcall+0x89/0x300\n kernel_init_freeable+0x40d/0x720\n kernel_init+0x1a/0x150\n ret_from_fork+0x10c/0x1a0\n ret_from_fork_asm+0x1a/0x30\n\nFreed by task 136:\n kasan_save_stack+0x24/0x50\n kasan_save_track+0x14/0x30\n kasan_save_free_info+0x3a/0x60\n __kasan_slab_free+0x3f/0x50\n kfree+0x137/0x370\n otx2_ptp_destroy+0x38/0x80\n otx2_remove+0x10d/0x4c0\n pci_device_remove+0xa6/0x1d0\n device_release_driver_internal+0xf8/0x210\n pci_stop_bus_device+0x105/0x150\n pci_stop_and_remove_bus_device_locked+0x15/0x30\n remove_store+0xcc/0xe0\n kernfs_fop_write_iter+0x2c3/0x440\n vfs_write+0x871/0xd70\n ksys_write+0xee/0x1c0\n do_syscall_64+0xac/0x280\n entry_SYSCALL_64_after_hwframe+0x77/0x7f\n...\n\nReplace cancel_delayed_work() with cancel_delayed_work_sync() to ensure\nthat the delayed work item is properly canceled before the otx2_ptp is\ndeallocated.\n\nThis bug was initially identified through static analysis. To reproduce\nand test it, I simulated the OcteonTX2 PCI device in QEMU and introduced\nartificial delays within the otx2_sync_tstamp() function to increase the\nlikelihood of triggering the bug.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Micro 6.2:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-source-6.12.0-160000.8.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-39944",
"url": "https://www.suse.com/security/cve/CVE-2025-39944"
},
{
"category": "external",
"summary": "SUSE Bug 1251120 for CVE-2025-39944",
"url": "https://bugzilla.suse.com/1251120"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Micro 6.2:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-source-6.12.0-160000.8.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Micro 6.2:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-source-6.12.0-160000.8.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-19T16:46:47Z",
"details": "moderate"
}
],
"title": "CVE-2025-39944"
},
{
"cve": "CVE-2025-39961",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-39961"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\niommu/amd/pgtbl: Fix possible race while increase page table level\n\nThe AMD IOMMU host page table implementation supports dynamic page table levels\n(up to 6 levels), starting with a 3-level configuration that expands based on\nIOVA address. The kernel maintains a root pointer and current page table level\nto enable proper page table walks in alloc_pte()/fetch_pte() operations.\n\nThe IOMMU IOVA allocator initially starts with 32-bit address and onces its\nexhuasted it switches to 64-bit address (max address is determined based\non IOMMU and device DMA capability). To support larger IOVA, AMD IOMMU\ndriver increases page table level.\n\nBut in unmap path (iommu_v1_unmap_pages()), fetch_pte() reads\npgtable-\u003e[root/mode] without lock. So its possible that in exteme corner case,\nwhen increase_address_space() is updating pgtable-\u003e[root/mode], fetch_pte()\nreads wrong page table level (pgtable-\u003emode). It does compare the value with\nlevel encoded in page table and returns NULL. This will result is\niommu_unmap ops to fail and upper layer may retry/log WARN_ON.\n\nCPU 0 CPU 1\n------ ------\nmap pages unmap pages\nalloc_pte() -\u003e increase_address_space() iommu_v1_unmap_pages() -\u003e fetch_pte()\n pgtable-\u003eroot = pte (new root value)\n READ pgtable-\u003e[mode/root]\n\t\t\t\t\t Reads new root, old mode\n Updates mode (pgtable-\u003emode += 1)\n\nSince Page table level updates are infrequent and already synchronized with a\nspinlock, implement seqcount to enable lock-free read operations on the read path.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Micro 6.2:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-source-6.12.0-160000.8.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-39961",
"url": "https://www.suse.com/security/cve/CVE-2025-39961"
},
{
"category": "external",
"summary": "SUSE Bug 1251817 for CVE-2025-39961",
"url": "https://bugzilla.suse.com/1251817"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Micro 6.2:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-source-6.12.0-160000.8.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.8,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Micro 6.2:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-source-6.12.0-160000.8.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-19T16:46:47Z",
"details": "moderate"
}
],
"title": "CVE-2025-39961"
},
{
"cve": "CVE-2025-39980",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-39980"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nnexthop: Forbid FDB status change while nexthop is in a group\n\nThe kernel forbids the creation of non-FDB nexthop groups with FDB\nnexthops:\n\n # ip nexthop add id 1 via 192.0.2.1 fdb\n # ip nexthop add id 2 group 1\n Error: Non FDB nexthop group cannot have fdb nexthops.\n\nAnd vice versa:\n\n # ip nexthop add id 3 via 192.0.2.2 dev dummy1\n # ip nexthop add id 4 group 3 fdb\n Error: FDB nexthop group can only have fdb nexthops.\n\nHowever, as long as no routes are pointing to a non-FDB nexthop group,\nthe kernel allows changing the type of a nexthop from FDB to non-FDB and\nvice versa:\n\n # ip nexthop add id 5 via 192.0.2.2 dev dummy1\n # ip nexthop add id 6 group 5\n # ip nexthop replace id 5 via 192.0.2.2 fdb\n # echo $?\n 0\n\nThis configuration is invalid and can result in a NPD [1] since FDB\nnexthops are not associated with a nexthop device:\n\n # ip route add 198.51.100.1/32 nhid 6\n # ping 198.51.100.1\n\nFix by preventing nexthop FDB status change while the nexthop is in a\ngroup:\n\n # ip nexthop add id 7 via 192.0.2.2 dev dummy1\n # ip nexthop add id 8 group 7\n # ip nexthop replace id 7 via 192.0.2.2 fdb\n Error: Cannot change nexthop FDB status while in a group.\n\n[1]\nBUG: kernel NULL pointer dereference, address: 00000000000003c0\n[...]\nOops: Oops: 0000 [#1] SMP\nCPU: 6 UID: 0 PID: 367 Comm: ping Not tainted 6.17.0-rc6-virtme-gb65678cacc03 #1 PREEMPT(voluntary)\nHardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.17.0-4.fc41 04/01/2014\nRIP: 0010:fib_lookup_good_nhc+0x1e/0x80\n[...]\nCall Trace:\n \u003cTASK\u003e\n fib_table_lookup+0x541/0x650\n ip_route_output_key_hash_rcu+0x2ea/0x970\n ip_route_output_key_hash+0x55/0x80\n __ip4_datagram_connect+0x250/0x330\n udp_connect+0x2b/0x60\n __sys_connect+0x9c/0xd0\n __x64_sys_connect+0x18/0x20\n do_syscall_64+0xa4/0x2a0\n entry_SYSCALL_64_after_hwframe+0x4b/0x53",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Micro 6.2:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-source-6.12.0-160000.8.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-39980",
"url": "https://www.suse.com/security/cve/CVE-2025-39980"
},
{
"category": "external",
"summary": "SUSE Bug 1252063 for CVE-2025-39980",
"url": "https://bugzilla.suse.com/1252063"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Micro 6.2:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-source-6.12.0-160000.8.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Micro 6.2:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-source-6.12.0-160000.8.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-19T16:46:47Z",
"details": "moderate"
}
],
"title": "CVE-2025-39980"
},
{
"cve": "CVE-2025-39990",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-39990"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nbpf: Check the helper function is valid in get_helper_proto\n\nkernel test robot reported verifier bug [1] where the helper func\npointer could be NULL due to disabled config option.\n\nAs Alexei suggested we could check on that in get_helper_proto\ndirectly. Marking tail_call helper func with BPF_PTR_POISON,\nbecause it is unused by design.\n\n [1] https://lore.kernel.org/oe-lkp/202507160818.68358831-lkp@intel.com",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Micro 6.2:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-source-6.12.0-160000.8.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-39990",
"url": "https://www.suse.com/security/cve/CVE-2025-39990"
},
{
"category": "external",
"summary": "SUSE Bug 1252054 for CVE-2025-39990",
"url": "https://bugzilla.suse.com/1252054"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Micro 6.2:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-source-6.12.0-160000.8.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Micro 6.2:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-source-6.12.0-160000.8.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-19T16:46:47Z",
"details": "moderate"
}
],
"title": "CVE-2025-39990"
},
{
"cve": "CVE-2025-40001",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40001"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nscsi: mvsas: Fix use-after-free bugs in mvs_work_queue\n\nDuring the detaching of Marvell\u0027s SAS/SATA controller, the original code\ncalls cancel_delayed_work() in mvs_free() to cancel the delayed work\nitem mwq-\u003ework_q. However, if mwq-\u003ework_q is already running, the\ncancel_delayed_work() may fail to cancel it. This can lead to\nuse-after-free scenarios where mvs_free() frees the mvs_info while\nmvs_work_queue() is still executing and attempts to access the\nalready-freed mvs_info.\n\nA typical race condition is illustrated below:\n\nCPU 0 (remove) | CPU 1 (delayed work callback)\nmvs_pci_remove() |\n mvs_free() | mvs_work_queue()\n cancel_delayed_work() |\n kfree(mvi) |\n | mvi-\u003e // UAF\n\nReplace cancel_delayed_work() with cancel_delayed_work_sync() to ensure\nthat the delayed work item is properly canceled and any executing\ndelayed work item completes before the mvs_info is deallocated.\n\nThis bug was found by static analysis.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Micro 6.2:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-source-6.12.0-160000.8.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40001",
"url": "https://www.suse.com/security/cve/CVE-2025-40001"
},
{
"category": "external",
"summary": "SUSE Bug 1252303 for CVE-2025-40001",
"url": "https://bugzilla.suse.com/1252303"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Micro 6.2:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-source-6.12.0-160000.8.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.8,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Micro 6.2:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-source-6.12.0-160000.8.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-19T16:46:47Z",
"details": "moderate"
}
],
"title": "CVE-2025-40001"
},
{
"cve": "CVE-2025-40003",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40003"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nnet: mscc: ocelot: Fix use-after-free caused by cyclic delayed work\n\nThe origin code calls cancel_delayed_work() in ocelot_stats_deinit()\nto cancel the cyclic delayed work item ocelot-\u003estats_work. However,\ncancel_delayed_work() may fail to cancel the work item if it is already\nexecuting. While destroy_workqueue() does wait for all pending work items\nin the work queue to complete before destroying the work queue, it cannot\nprevent the delayed work item from being rescheduled within the\nocelot_check_stats_work() function. This limitation exists because the\ndelayed work item is only enqueued into the work queue after its timer\nexpires. Before the timer expiration, destroy_workqueue() has no visibility\nof this pending work item. Once the work queue appears empty,\ndestroy_workqueue() proceeds with destruction. When the timer eventually\nexpires, the delayed work item gets queued again, leading to the following\nwarning:\n\nworkqueue: cannot queue ocelot_check_stats_work on wq ocelot-switch-stats\nWARNING: CPU: 2 PID: 0 at kernel/workqueue.c:2255 __queue_work+0x875/0xaf0\n...\nRIP: 0010:__queue_work+0x875/0xaf0\n...\nRSP: 0018:ffff88806d108b10 EFLAGS: 00010086\nRAX: 0000000000000000 RBX: 0000000000000101 RCX: 0000000000000027\nRDX: 0000000000000027 RSI: 0000000000000004 RDI: ffff88806d123e88\nRBP: ffffffff813c3170 R08: 0000000000000000 R09: ffffed100da247d2\nR10: ffffed100da247d1 R11: ffff88806d123e8b R12: ffff88800c00f000\nR13: ffff88800d7285c0 R14: ffff88806d0a5580 R15: ffff88800d7285a0\nFS: 0000000000000000(0000) GS:ffff8880e5725000(0000) knlGS:0000000000000000\nCS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033\nCR2: 00007fe18e45ea10 CR3: 0000000005e6c000 CR4: 00000000000006f0\nCall Trace:\n \u003cIRQ\u003e\n ? kasan_report+0xc6/0xf0\n ? __pfx_delayed_work_timer_fn+0x10/0x10\n ? __pfx_delayed_work_timer_fn+0x10/0x10\n call_timer_fn+0x25/0x1c0\n __run_timer_base.part.0+0x3be/0x8c0\n ? __pfx_delayed_work_timer_fn+0x10/0x10\n ? rcu_sched_clock_irq+0xb06/0x27d0\n ? __pfx___run_timer_base.part.0+0x10/0x10\n ? try_to_wake_up+0xb15/0x1960\n ? _raw_spin_lock_irq+0x80/0xe0\n ? __pfx__raw_spin_lock_irq+0x10/0x10\n tmigr_handle_remote_up+0x603/0x7e0\n ? __pfx_tmigr_handle_remote_up+0x10/0x10\n ? sched_balance_trigger+0x1c0/0x9f0\n ? sched_tick+0x221/0x5a0\n ? _raw_spin_lock_irq+0x80/0xe0\n ? __pfx__raw_spin_lock_irq+0x10/0x10\n ? tick_nohz_handler+0x339/0x440\n ? __pfx_tmigr_handle_remote_up+0x10/0x10\n __walk_groups.isra.0+0x42/0x150\n tmigr_handle_remote+0x1f4/0x2e0\n ? __pfx_tmigr_handle_remote+0x10/0x10\n ? ktime_get+0x60/0x140\n ? lapic_next_event+0x11/0x20\n ? clockevents_program_event+0x1d4/0x2a0\n ? hrtimer_interrupt+0x322/0x780\n handle_softirqs+0x16a/0x550\n irq_exit_rcu+0xaf/0xe0\n sysvec_apic_timer_interrupt+0x70/0x80\n \u003c/IRQ\u003e\n...\n\nThe following diagram reveals the cause of the above warning:\n\nCPU 0 (remove) | CPU 1 (delayed work callback)\nmscc_ocelot_remove() |\n ocelot_deinit() | ocelot_check_stats_work()\n ocelot_stats_deinit() |\n cancel_delayed_work()| ...\n | queue_delayed_work()\n destroy_workqueue() | (wait a time)\n | __queue_work() //UAF\n\nThe above scenario actually constitutes a UAF vulnerability.\n\nThe ocelot_stats_deinit() is only invoked when initialization\nfailure or resource destruction, so we must ensure that any\ndelayed work items cannot be rescheduled.\n\nReplace cancel_delayed_work() with disable_delayed_work_sync()\nto guarantee proper cancellation of the delayed work item and\nensure completion of any currently executing work before the\nworkqueue is deallocated.\n\nA deadlock concern was considered: ocelot_stats_deinit() is called\nin a process context and is not holding any locks that the delayed\nwork item might also need. Therefore, the use of the _sync() variant\nis safe here.\n\nThis bug was identified through static analysis. To reproduce the\nissue and validate the fix, I simulated ocelot-swit\n---truncated---",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Micro 6.2:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-source-6.12.0-160000.8.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40003",
"url": "https://www.suse.com/security/cve/CVE-2025-40003"
},
{
"category": "external",
"summary": "SUSE Bug 1252301 for CVE-2025-40003",
"url": "https://bugzilla.suse.com/1252301"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Micro 6.2:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-source-6.12.0-160000.8.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Micro 6.2:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-source-6.12.0-160000.8.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-19T16:46:47Z",
"details": "moderate"
}
],
"title": "CVE-2025-40003"
},
{
"cve": "CVE-2025-40006",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40006"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nmm/hugetlb: fix folio is still mapped when deleted\n\nMigration may be raced with fallocating hole. remove_inode_single_folio\nwill unmap the folio if the folio is still mapped. However, it\u0027s called\nwithout folio lock. If the folio is migrated and the mapped pte has been\nconverted to migration entry, folio_mapped() returns false, and won\u0027t\nunmap it. Due to extra refcount held by remove_inode_single_folio,\nmigration fails, restores migration entry to normal pte, and the folio is\nmapped again. As a result, we triggered BUG in filemap_unaccount_folio.\n\nThe log is as follows:\n BUG: Bad page cache in process hugetlb pfn:156c00\n page: refcount:515 mapcount:0 mapping:0000000099fef6e1 index:0x0 pfn:0x156c00\n head: order:9 mapcount:1 entire_mapcount:1 nr_pages_mapped:0 pincount:0\n aops:hugetlbfs_aops ino:dcc dentry name(?):\"my_hugepage_file\"\n flags: 0x17ffffc00000c1(locked|waiters|head|node=0|zone=2|lastcpupid=0x1fffff)\n page_type: f4(hugetlb)\n page dumped because: still mapped when deleted\n CPU: 1 UID: 0 PID: 395 Comm: hugetlb Not tainted 6.17.0-rc5-00044-g7aac71907bde-dirty #484 NONE\n Hardware name: QEMU Ubuntu 24.04 PC (i440FX + PIIX, 1996), BIOS 0.0.0 02/06/2015\n Call Trace:\n \u003cTASK\u003e\n dump_stack_lvl+0x4f/0x70\n filemap_unaccount_folio+0xc4/0x1c0\n __filemap_remove_folio+0x38/0x1c0\n filemap_remove_folio+0x41/0xd0\n remove_inode_hugepages+0x142/0x250\n hugetlbfs_fallocate+0x471/0x5a0\n vfs_fallocate+0x149/0x380\n\nHold folio lock before checking if the folio is mapped to avold race with\nmigration.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Micro 6.2:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-source-6.12.0-160000.8.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40006",
"url": "https://www.suse.com/security/cve/CVE-2025-40006"
},
{
"category": "external",
"summary": "SUSE Bug 1252342 for CVE-2025-40006",
"url": "https://bugzilla.suse.com/1252342"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Micro 6.2:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-source-6.12.0-160000.8.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.7,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Micro 6.2:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-source-6.12.0-160000.8.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-19T16:46:47Z",
"details": "moderate"
}
],
"title": "CVE-2025-40006"
},
{
"cve": "CVE-2025-40021",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40021"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\ntracing: dynevent: Add a missing lockdown check on dynevent\n\nSince dynamic_events interface on tracefs is compatible with\nkprobe_events and uprobe_events, it should also check the lockdown\nstatus and reject if it is set.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Micro 6.2:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-source-6.12.0-160000.8.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40021",
"url": "https://www.suse.com/security/cve/CVE-2025-40021"
},
{
"category": "external",
"summary": "SUSE Bug 1252681 for CVE-2025-40021",
"url": "https://bugzilla.suse.com/1252681"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Micro 6.2:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-source-6.12.0-160000.8.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N",
"version": "3.1"
},
"products": [
"SUSE Linux Micro 6.2:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-source-6.12.0-160000.8.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-19T16:46:47Z",
"details": "moderate"
}
],
"title": "CVE-2025-40021"
},
{
"cve": "CVE-2025-40024",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40024"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nvhost: Take a reference on the task in struct vhost_task.\n\nvhost_task_create() creates a task and keeps a reference to its\ntask_struct. That task may exit early via a signal and its task_struct\nwill be released.\nA pending vhost_task_wake() will then attempt to wake the task and\naccess a task_struct which is no longer there.\n\nAcquire a reference on the task_struct while creating the thread and\nrelease the reference while the struct vhost_task itself is removed.\nIf the task exits early due to a signal, then the vhost_task_wake() will\nstill access a valid task_struct. The wake is safe and will be skipped\nin this case.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Micro 6.2:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-source-6.12.0-160000.8.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40024",
"url": "https://www.suse.com/security/cve/CVE-2025-40024"
},
{
"category": "external",
"summary": "SUSE Bug 1252686 for CVE-2025-40024",
"url": "https://bugzilla.suse.com/1252686"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Micro 6.2:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-source-6.12.0-160000.8.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Micro 6.2:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-source-6.12.0-160000.8.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-19T16:46:47Z",
"details": "moderate"
}
],
"title": "CVE-2025-40024"
},
{
"cve": "CVE-2025-40027",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40027"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nnet/9p: fix double req put in p9_fd_cancelled\n\nSyzkaller reports a KASAN issue as below:\n\ngeneral protection fault, probably for non-canonical address 0xfbd59c0000000021: 0000 [#1] PREEMPT SMP KASAN NOPTI\nKASAN: maybe wild-memory-access in range [0xdead000000000108-0xdead00000000010f]\nCPU: 0 PID: 5083 Comm: syz-executor.2 Not tainted 6.1.134-syzkaller-00037-g855bd1d7d838 #0\nHardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014\nRIP: 0010:__list_del include/linux/list.h:114 [inline]\nRIP: 0010:__list_del_entry include/linux/list.h:137 [inline]\nRIP: 0010:list_del include/linux/list.h:148 [inline]\nRIP: 0010:p9_fd_cancelled+0xe9/0x200 net/9p/trans_fd.c:734\n\nCall Trace:\n \u003cTASK\u003e\n p9_client_flush+0x351/0x440 net/9p/client.c:614\n p9_client_rpc+0xb6b/0xc70 net/9p/client.c:734\n p9_client_version net/9p/client.c:920 [inline]\n p9_client_create+0xb51/0x1240 net/9p/client.c:1027\n v9fs_session_init+0x1f0/0x18f0 fs/9p/v9fs.c:408\n v9fs_mount+0xba/0xcb0 fs/9p/vfs_super.c:126\n legacy_get_tree+0x108/0x220 fs/fs_context.c:632\n vfs_get_tree+0x8e/0x300 fs/super.c:1573\n do_new_mount fs/namespace.c:3056 [inline]\n path_mount+0x6a6/0x1e90 fs/namespace.c:3386\n do_mount fs/namespace.c:3399 [inline]\n __do_sys_mount fs/namespace.c:3607 [inline]\n __se_sys_mount fs/namespace.c:3584 [inline]\n __x64_sys_mount+0x283/0x300 fs/namespace.c:3584\n do_syscall_x64 arch/x86/entry/common.c:51 [inline]\n do_syscall_64+0x35/0x80 arch/x86/entry/common.c:81\n entry_SYSCALL_64_after_hwframe+0x6e/0xd8\n\nThis happens because of a race condition between:\n\n- The 9p client sending an invalid flush request and later cleaning it up;\n- The 9p client in p9_read_work() canceled all pending requests.\n\n Thread 1 Thread 2\n ...\n p9_client_create()\n ...\n p9_fd_create()\n ...\n p9_conn_create()\n ...\n // start Thread 2\n INIT_WORK(\u0026m-\u003erq, p9_read_work);\n p9_read_work()\n ...\n p9_client_rpc()\n ...\n ...\n p9_conn_cancel()\n ...\n spin_lock(\u0026m-\u003ereq_lock);\n ...\n p9_fd_cancelled()\n ...\n ...\n spin_unlock(\u0026m-\u003ereq_lock);\n // status rewrite\n p9_client_cb(m-\u003eclient, req, REQ_STATUS_ERROR)\n // first remove\n list_del(\u0026req-\u003ereq_list);\n ...\n\n spin_lock(\u0026m-\u003ereq_lock)\n ...\n // second remove\n list_del(\u0026req-\u003ereq_list);\n spin_unlock(\u0026m-\u003ereq_lock)\n ...\n\nCommit 74d6a5d56629 (\"9p/trans_fd: Fix concurrency del of req_list in\np9_fd_cancelled/p9_read_work\") fixes a concurrency issue in the 9p filesystem\nclient where the req_list could be deleted simultaneously by both\np9_read_work and p9_fd_cancelled functions, but for the case where req-\u003estatus\nequals REQ_STATUS_RCVD.\n\nUpdate the check for req-\u003estatus in p9_fd_cancelled to skip processing not\njust received requests, but anything that is not SENT, as whatever\nchanged the state from SENT also removed the request from its list.\n\nFound by Linux Verification Center (linuxtesting.org) with Syzkaller.\n\n[updated the check from status == RECV || status == ERROR to status != SENT]",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Micro 6.2:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-source-6.12.0-160000.8.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40027",
"url": "https://www.suse.com/security/cve/CVE-2025-40027"
},
{
"category": "external",
"summary": "SUSE Bug 1252763 for CVE-2025-40027",
"url": "https://bugzilla.suse.com/1252763"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Micro 6.2:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-source-6.12.0-160000.8.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Micro 6.2:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-source-6.12.0-160000.8.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-19T16:46:47Z",
"details": "moderate"
}
],
"title": "CVE-2025-40027"
},
{
"cve": "CVE-2025-40031",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40031"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\ntee: fix register_shm_helper()\n\nIn register_shm_helper(), fix incorrect error handling for a call to\niov_iter_extract_pages(). A case is missing for when\niov_iter_extract_pages() only got some pages and return a number larger\nthan 0, but not the requested amount.\n\nThis fixes a possible NULL pointer dereference following a bad input from\nioctl(TEE_IOC_SHM_REGISTER) where parts of the buffer isn\u0027t mapped.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Micro 6.2:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-source-6.12.0-160000.8.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40031",
"url": "https://www.suse.com/security/cve/CVE-2025-40031"
},
{
"category": "external",
"summary": "SUSE Bug 1252779 for CVE-2025-40031",
"url": "https://bugzilla.suse.com/1252779"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Micro 6.2:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-source-6.12.0-160000.8.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Micro 6.2:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-source-6.12.0-160000.8.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-19T16:46:47Z",
"details": "moderate"
}
],
"title": "CVE-2025-40031"
},
{
"cve": "CVE-2025-40033",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40033"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nremoteproc: pru: Fix potential NULL pointer dereference in pru_rproc_set_ctable()\n\npru_rproc_set_ctable() accessed rproc-\u003epriv before the IS_ERR_OR_NULL\ncheck, which could lead to a null pointer dereference. Move the pru\nassignment, ensuring we never dereference a NULL rproc pointer.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Micro 6.2:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-source-6.12.0-160000.8.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40033",
"url": "https://www.suse.com/security/cve/CVE-2025-40033"
},
{
"category": "external",
"summary": "SUSE Bug 1252824 for CVE-2025-40033",
"url": "https://bugzilla.suse.com/1252824"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Micro 6.2:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-source-6.12.0-160000.8.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Micro 6.2:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-source-6.12.0-160000.8.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-19T16:46:47Z",
"details": "moderate"
}
],
"title": "CVE-2025-40033"
},
{
"cve": "CVE-2025-40038",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40038"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nKVM: SVM: Skip fastpath emulation on VM-Exit if next RIP isn\u0027t valid\n\nSkip the WRMSR and HLT fastpaths in SVM\u0027s VM-Exit handler if the next RIP\nisn\u0027t valid, e.g. because KVM is running with nrips=false. SVM must\ndecode and emulate to skip the instruction if the CPU doesn\u0027t provide the\nnext RIP, and getting the instruction bytes to decode requires reading\nguest memory. Reading guest memory through the emulator can fault, i.e.\ncan sleep, which is disallowed since the fastpath handlers run with IRQs\ndisabled.\n\n BUG: sleeping function called from invalid context at ./include/linux/uaccess.h:106\n in_atomic(): 1, irqs_disabled(): 1, non_block: 0, pid: 32611, name: qemu\n preempt_count: 1, expected: 0\n INFO: lockdep is turned off.\n irq event stamp: 30580\n hardirqs last enabled at (30579): [\u003cffffffffc08b2527\u003e] vcpu_run+0x1787/0x1db0 [kvm]\n hardirqs last disabled at (30580): [\u003cffffffffb4f62e32\u003e] __schedule+0x1e2/0xed0\n softirqs last enabled at (30570): [\u003cffffffffb4247a64\u003e] fpu_swap_kvm_fpstate+0x44/0x210\n softirqs last disabled at (30568): [\u003cffffffffb4247a64\u003e] fpu_swap_kvm_fpstate+0x44/0x210\n CPU: 298 UID: 0 PID: 32611 Comm: qemu Tainted: G U 6.16.0-smp--e6c618b51cfe-sleep #782 NONE\n Tainted: [U]=USER\n Hardware name: Google Astoria-Turin/astoria, BIOS 0.20241223.2-0 01/17/2025\n Call Trace:\n \u003cTASK\u003e\n dump_stack_lvl+0x7d/0xb0\n __might_resched+0x271/0x290\n __might_fault+0x28/0x80\n kvm_vcpu_read_guest_page+0x8d/0xc0 [kvm]\n kvm_fetch_guest_virt+0x92/0xc0 [kvm]\n __do_insn_fetch_bytes+0xf3/0x1e0 [kvm]\n x86_decode_insn+0xd1/0x1010 [kvm]\n x86_emulate_instruction+0x105/0x810 [kvm]\n __svm_skip_emulated_instruction+0xc4/0x140 [kvm_amd]\n handle_fastpath_invd+0xc4/0x1a0 [kvm]\n vcpu_run+0x11a1/0x1db0 [kvm]\n kvm_arch_vcpu_ioctl_run+0x5cc/0x730 [kvm]\n kvm_vcpu_ioctl+0x578/0x6a0 [kvm]\n __se_sys_ioctl+0x6d/0xb0\n do_syscall_64+0x8a/0x2c0\n entry_SYSCALL_64_after_hwframe+0x4b/0x53\n RIP: 0033:0x7f479d57a94b\n \u003c/TASK\u003e\n\nNote, this is essentially a reapply of commit 5c30e8101e8d (\"KVM: SVM:\nSkip WRMSR fastpath on VM-Exit if next RIP isn\u0027t valid\"), but with\ndifferent justification (KVM now grabs SRCU when skipping the instruction\nfor other reasons).",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Micro 6.2:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-source-6.12.0-160000.8.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40038",
"url": "https://www.suse.com/security/cve/CVE-2025-40038"
},
{
"category": "external",
"summary": "SUSE Bug 1252817 for CVE-2025-40038",
"url": "https://bugzilla.suse.com/1252817"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Micro 6.2:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-source-6.12.0-160000.8.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Micro 6.2:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-source-6.12.0-160000.8.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-19T16:46:47Z",
"details": "moderate"
}
],
"title": "CVE-2025-40038"
},
{
"cve": "CVE-2025-40047",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40047"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nio_uring/waitid: always prune wait queue entry in io_waitid_wait()\n\nFor a successful return, always remove our entry from the wait queue\nentry list. Previously this was skipped if a cancelation was in\nprogress, but this can race with another invocation of the wait queue\nentry callback.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Micro 6.2:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-source-6.12.0-160000.8.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40047",
"url": "https://www.suse.com/security/cve/CVE-2025-40047"
},
{
"category": "external",
"summary": "SUSE Bug 1252790 for CVE-2025-40047",
"url": "https://bugzilla.suse.com/1252790"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Micro 6.2:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-source-6.12.0-160000.8.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.7,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Micro 6.2:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-source-6.12.0-160000.8.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-19T16:46:47Z",
"details": "moderate"
}
],
"title": "CVE-2025-40047"
},
{
"cve": "CVE-2025-40053",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40053"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nnet: dlink: handle copy_thresh allocation failure\n\nThe driver did not handle failure of `netdev_alloc_skb_ip_align()`.\nIf the allocation failed, dereferencing `skb-\u003eprotocol` could lead to\na NULL pointer dereference.\n\nThis patch tries to allocate `skb`. If the allocation fails, it falls\nback to the normal path.\n\nTested-on: D-Link DGE-550T Rev-A3",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Micro 6.2:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-source-6.12.0-160000.8.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40053",
"url": "https://www.suse.com/security/cve/CVE-2025-40053"
},
{
"category": "external",
"summary": "SUSE Bug 1252808 for CVE-2025-40053",
"url": "https://bugzilla.suse.com/1252808"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Micro 6.2:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-source-6.12.0-160000.8.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Micro 6.2:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-source-6.12.0-160000.8.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-19T16:46:47Z",
"details": "moderate"
}
],
"title": "CVE-2025-40053"
},
{
"cve": "CVE-2025-40055",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40055"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nocfs2: fix double free in user_cluster_connect()\n\nuser_cluster_disconnect() frees \"conn-\u003ecc_private\" which is \"lc\" but then\nthe error handling frees \"lc\" a second time. Set \"lc\" to NULL on this\npath to avoid a double free.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Micro 6.2:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-source-6.12.0-160000.8.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40055",
"url": "https://www.suse.com/security/cve/CVE-2025-40055"
},
{
"category": "external",
"summary": "SUSE Bug 1252821 for CVE-2025-40055",
"url": "https://bugzilla.suse.com/1252821"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Micro 6.2:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-source-6.12.0-160000.8.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Micro 6.2:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-source-6.12.0-160000.8.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-19T16:46:47Z",
"details": "moderate"
}
],
"title": "CVE-2025-40055"
},
{
"cve": "CVE-2025-40059",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40059"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\ncoresight: Fix incorrect handling for return value of devm_kzalloc\n\nThe return value of devm_kzalloc could be an null pointer,\nuse \"!desc.pdata\" to fix incorrect handling return value\nof devm_kzalloc.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Micro 6.2:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-source-6.12.0-160000.8.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40059",
"url": "https://www.suse.com/security/cve/CVE-2025-40059"
},
{
"category": "external",
"summary": "SUSE Bug 1252809 for CVE-2025-40059",
"url": "https://bugzilla.suse.com/1252809"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Micro 6.2:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-source-6.12.0-160000.8.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Micro 6.2:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-source-6.12.0-160000.8.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-19T16:46:47Z",
"details": "moderate"
}
],
"title": "CVE-2025-40059"
},
{
"cve": "CVE-2025-40064",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40064"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nsmc: Fix use-after-free in __pnet_find_base_ndev().\n\nsyzbot reported use-after-free of net_device in __pnet_find_base_ndev(),\nwhich was called during connect(). [0]\n\nsmc_pnet_find_ism_resource() fetches sk_dst_get(sk)-\u003edev and passes\ndown to pnet_find_base_ndev(), where RTNL is held. Then, UAF happened\nat __pnet_find_base_ndev() when the dev is first used.\n\nThis means dev had already been freed before acquiring RTNL in\npnet_find_base_ndev().\n\nWhile dev is going away, dst-\u003edev could be swapped with blackhole_netdev,\nand the dev\u0027s refcnt by dst will be released.\n\nWe must hold dev\u0027s refcnt before calling smc_pnet_find_ism_resource().\n\nAlso, smc_pnet_find_roce_resource() has the same problem.\n\nLet\u0027s use __sk_dst_get() and dst_dev_rcu() in the two functions.\n\n[0]:\nBUG: KASAN: use-after-free in __pnet_find_base_ndev+0x1b1/0x1c0 net/smc/smc_pnet.c:926\nRead of size 1 at addr ffff888036bac33a by task syz.0.3632/18609\n\nCPU: 1 UID: 0 PID: 18609 Comm: syz.0.3632 Not tainted syzkaller #0 PREEMPT(full)\nHardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/18/2025\nCall Trace:\n \u003cTASK\u003e\n dump_stack_lvl+0x189/0x250 lib/dump_stack.c:120\n print_address_description mm/kasan/report.c:378 [inline]\n print_report+0xca/0x240 mm/kasan/report.c:482\n kasan_report+0x118/0x150 mm/kasan/report.c:595\n __pnet_find_base_ndev+0x1b1/0x1c0 net/smc/smc_pnet.c:926\n pnet_find_base_ndev net/smc/smc_pnet.c:946 [inline]\n smc_pnet_find_ism_by_pnetid net/smc/smc_pnet.c:1103 [inline]\n smc_pnet_find_ism_resource+0xef/0x390 net/smc/smc_pnet.c:1154\n smc_find_ism_device net/smc/af_smc.c:1030 [inline]\n smc_find_proposal_devices net/smc/af_smc.c:1115 [inline]\n __smc_connect+0x372/0x1890 net/smc/af_smc.c:1545\n smc_connect+0x877/0xd90 net/smc/af_smc.c:1715\n __sys_connect_file net/socket.c:2086 [inline]\n __sys_connect+0x313/0x440 net/socket.c:2105\n __do_sys_connect net/socket.c:2111 [inline]\n __se_sys_connect net/socket.c:2108 [inline]\n __x64_sys_connect+0x7a/0x90 net/socket.c:2108\n do_syscall_x64 arch/x86/entry/syscall_64.c:63 [inline]\n do_syscall_64+0xfa/0x3b0 arch/x86/entry/syscall_64.c:94\n entry_SYSCALL_64_after_hwframe+0x77/0x7f\nRIP: 0033:0x7f47cbf8eba9\nCode: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 \u003c48\u003e 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48\nRSP: 002b:00007f47ccdb1038 EFLAGS: 00000246 ORIG_RAX: 000000000000002a\nRAX: ffffffffffffffda RBX: 00007f47cc1d5fa0 RCX: 00007f47cbf8eba9\nRDX: 0000000000000010 RSI: 0000200000000280 RDI: 000000000000000b\nRBP: 00007f47cc011e19 R08: 0000000000000000 R09: 0000000000000000\nR10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000\nR13: 00007f47cc1d6038 R14: 00007f47cc1d5fa0 R15: 00007ffc512f8aa8\n \u003c/TASK\u003e\n\nThe buggy address belongs to the physical page:\npage: refcount:0 mapcount:0 mapping:0000000000000000 index:0xffff888036bacd00 pfn:0x36bac\nflags: 0xfff00000000000(node=0|zone=1|lastcpupid=0x7ff)\nraw: 00fff00000000000 ffffea0001243d08 ffff8880b863fdc0 0000000000000000\nraw: ffff888036bacd00 0000000000000000 00000000ffffffff 0000000000000000\npage dumped because: kasan: bad access detected\npage_owner tracks the page as freed\npage last allocated via order 2, migratetype Unmovable, gfp_mask 0x446dc0(GFP_KERNEL_ACCOUNT|__GFP_ZERO|__GFP_NOWARN|__GFP_RETRY_MAYFAIL|__GFP_COMP), pid 16741, tgid 16741 (syz-executor), ts 343313197788, free_ts 380670750466\n set_page_owner include/linux/page_owner.h:32 [inline]\n post_alloc_hook+0x240/0x2a0 mm/page_alloc.c:1851\n prep_new_page mm/page_alloc.c:1859 [inline]\n get_page_from_freelist+0x21e4/0x22c0 mm/page_alloc.c:3858\n __alloc_frozen_pages_noprof+0x181/0x370 mm/page_alloc.c:5148\n alloc_pages_mpol+0x232/0x4a0 mm/mempolicy.c:2416\n ___kmalloc_large_node+0x5f/0x1b0 mm/slub.c:4317\n __kmalloc_large_node_noprof+0x18/0x90 mm/slub.c:4348\n __do_kmalloc_node mm/slub.c:4364 [inline]\n __kvmalloc_node\n---truncated---",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Micro 6.2:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-source-6.12.0-160000.8.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40064",
"url": "https://www.suse.com/security/cve/CVE-2025-40064"
},
{
"category": "external",
"summary": "SUSE Bug 1252845 for CVE-2025-40064",
"url": "https://bugzilla.suse.com/1252845"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Micro 6.2:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-source-6.12.0-160000.8.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Micro 6.2:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-source-6.12.0-160000.8.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-19T16:46:47Z",
"details": "moderate"
}
],
"title": "CVE-2025-40064"
},
{
"cve": "CVE-2025-40070",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40070"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\npps: fix warning in pps_register_cdev when register device fail\n\nSimilar to previous commit 2a934fdb01db (\"media: v4l2-dev: fix error\nhandling in __video_register_device()\"), the release hook should be set\nbefore device_register(). Otherwise, when device_register() return error\nand put_device() try to callback the release function, the below warning\nmay happen.\n\n ------------[ cut here ]------------\n WARNING: CPU: 1 PID: 4760 at drivers/base/core.c:2567 device_release+0x1bd/0x240 drivers/base/core.c:2567\n Modules linked in:\n CPU: 1 UID: 0 PID: 4760 Comm: syz.4.914 Not tainted 6.17.0-rc3+ #1 NONE\n RIP: 0010:device_release+0x1bd/0x240 drivers/base/core.c:2567\n Call Trace:\n \u003cTASK\u003e\n kobject_cleanup+0x136/0x410 lib/kobject.c:689\n kobject_release lib/kobject.c:720 [inline]\n kref_put include/linux/kref.h:65 [inline]\n kobject_put+0xe9/0x130 lib/kobject.c:737\n put_device+0x24/0x30 drivers/base/core.c:3797\n pps_register_cdev+0x2da/0x370 drivers/pps/pps.c:402\n pps_register_source+0x2f6/0x480 drivers/pps/kapi.c:108\n pps_tty_open+0x190/0x310 drivers/pps/clients/pps-ldisc.c:57\n tty_ldisc_open+0xa7/0x120 drivers/tty/tty_ldisc.c:432\n tty_set_ldisc+0x333/0x780 drivers/tty/tty_ldisc.c:563\n tiocsetd drivers/tty/tty_io.c:2429 [inline]\n tty_ioctl+0x5d1/0x1700 drivers/tty/tty_io.c:2728\n vfs_ioctl fs/ioctl.c:51 [inline]\n __do_sys_ioctl fs/ioctl.c:598 [inline]\n __se_sys_ioctl fs/ioctl.c:584 [inline]\n __x64_sys_ioctl+0x194/0x210 fs/ioctl.c:584\n do_syscall_x64 arch/x86/entry/syscall_64.c:63 [inline]\n do_syscall_64+0x5f/0x2a0 arch/x86/entry/syscall_64.c:94\n entry_SYSCALL_64_after_hwframe+0x76/0x7e\n \u003c/TASK\u003e\n\nBefore commit c79a39dc8d06 (\"pps: Fix a use-after-free\"),\npps_register_cdev() call device_create() to create pps-\u003edev, which will\ninit dev-\u003erelease to device_create_release(). Now the comment is outdated,\njust remove it.\n\nThanks for the reminder from Calvin Owens, \u0027kfree_pps\u0027 should be removed\nin pps_register_source() to avoid a double free in the failure case.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Micro 6.2:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-source-6.12.0-160000.8.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40070",
"url": "https://www.suse.com/security/cve/CVE-2025-40070"
},
{
"category": "external",
"summary": "SUSE Bug 1252836 for CVE-2025-40070",
"url": "https://bugzilla.suse.com/1252836"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Micro 6.2:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-source-6.12.0-160000.8.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Micro 6.2:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-source-6.12.0-160000.8.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-19T16:46:47Z",
"details": "moderate"
}
],
"title": "CVE-2025-40070"
},
{
"cve": "CVE-2025-40074",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40074"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nipv4: start using dst_dev_rcu()\n\nChange icmpv4_xrlim_allow(), ip_defrag() to prevent possible UAF.\n\nChange ipmr_prepare_xmit(), ipmr_queue_fwd_xmit(), ip_mr_output(),\nipv4_neigh_lookup() to use lockdep enabled dst_dev_rcu().",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Micro 6.2:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-source-6.12.0-160000.8.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40074",
"url": "https://www.suse.com/security/cve/CVE-2025-40074"
},
{
"category": "external",
"summary": "SUSE Bug 1252794 for CVE-2025-40074",
"url": "https://bugzilla.suse.com/1252794"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Micro 6.2:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-source-6.12.0-160000.8.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Micro 6.2:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-source-6.12.0-160000.8.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-19T16:46:47Z",
"details": "moderate"
}
],
"title": "CVE-2025-40074"
},
{
"cve": "CVE-2025-40075",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40075"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\ntcp_metrics: use dst_dev_net_rcu()\n\nReplace three dst_dev() with a lockdep enabled helper.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Micro 6.2:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-source-6.12.0-160000.8.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40075",
"url": "https://www.suse.com/security/cve/CVE-2025-40075"
},
{
"category": "external",
"summary": "SUSE Bug 1252795 for CVE-2025-40075",
"url": "https://bugzilla.suse.com/1252795"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Micro 6.2:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-source-6.12.0-160000.8.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Micro 6.2:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-source-6.12.0-160000.8.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-19T16:46:47Z",
"details": "moderate"
}
],
"title": "CVE-2025-40075"
},
{
"cve": "CVE-2025-40081",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40081"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nperf: arm_spe: Prevent overflow in PERF_IDX2OFF()\n\nCast nr_pages to unsigned long to avoid overflow when handling large\nAUX buffer sizes (\u003e= 2 GiB).",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Micro 6.2:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-source-6.12.0-160000.8.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40081",
"url": "https://www.suse.com/security/cve/CVE-2025-40081"
},
{
"category": "external",
"summary": "SUSE Bug 1252776 for CVE-2025-40081",
"url": "https://bugzilla.suse.com/1252776"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Micro 6.2:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-source-6.12.0-160000.8.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Micro 6.2:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-source-6.12.0-160000.8.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-19T16:46:47Z",
"details": "moderate"
}
],
"title": "CVE-2025-40081"
},
{
"cve": "CVE-2025-40083",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40083"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nnet/sched: sch_qfq: Fix null-deref in agg_dequeue\n\nTo prevent a potential crash in agg_dequeue (net/sched/sch_qfq.c)\nwhen cl-\u003eqdisc-\u003eops-\u003epeek(cl-\u003eqdisc) returns NULL, we check the return\nvalue before using it, similar to the existing approach in sch_hfsc.c.\n\nTo avoid code duplication, the following changes are made:\n\n1. Changed qdisc_warn_nonwc(include/net/pkt_sched.h) into a static\ninline function.\n\n2. Moved qdisc_peek_len from net/sched/sch_hfsc.c to\ninclude/net/pkt_sched.h so that sch_qfq can reuse it.\n\n3. Applied qdisc_peek_len in agg_dequeue to avoid crashing.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Micro 6.2:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-source-6.12.0-160000.8.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40083",
"url": "https://www.suse.com/security/cve/CVE-2025-40083"
},
{
"category": "external",
"summary": "SUSE Bug 1252912 for CVE-2025-40083",
"url": "https://bugzilla.suse.com/1252912"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Micro 6.2:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-source-6.12.0-160000.8.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Micro 6.2:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-source-6.12.0-160000.8.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-19T16:46:47Z",
"details": "moderate"
}
],
"title": "CVE-2025-40083"
},
{
"cve": "CVE-2025-40086",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40086"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\ndrm/xe: Don\u0027t allow evicting of BOs in same VM in array of VM binds\n\nAn array of VM binds can potentially evict other buffer objects (BOs)\nwithin the same VM under certain conditions, which may lead to NULL\npointer dereferences later in the bind pipeline. To prevent this, clear\nthe allow_res_evict flag in the xe_bo_validate call.\n\nv2:\n - Invert polarity of no_res_evict (Thomas)\n - Add comment in code explaining issue (Thomas)\n\n(cherry picked from commit 8b9ba8d6d95fe75fed6b0480bb03da4b321bea08)",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Micro 6.2:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-source-6.12.0-160000.8.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40086",
"url": "https://www.suse.com/security/cve/CVE-2025-40086"
},
{
"category": "external",
"summary": "SUSE Bug 1252923 for CVE-2025-40086",
"url": "https://bugzilla.suse.com/1252923"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Micro 6.2:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-source-6.12.0-160000.8.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.1,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Micro 6.2:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-source-6.12.0-160000.8.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-19T16:46:47Z",
"details": "moderate"
}
],
"title": "CVE-2025-40086"
},
{
"cve": "CVE-2025-40098",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40098"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nALSA: hda: cs35l41: Fix NULL pointer dereference in cs35l41_get_acpi_mute_state()\n\nReturn value of a function acpi_evaluate_dsm() is dereferenced without\nchecking for NULL, but it is usually checked for this function.\n\nacpi_evaluate_dsm() may return NULL, when acpi_evaluate_object() returns\nacpi_status other than ACPI_SUCCESS, so add a check to prevent the crach.\n\nFound by Linux Verification Center (linuxtesting.org) with SVACE.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Micro 6.2:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-source-6.12.0-160000.8.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40098",
"url": "https://www.suse.com/security/cve/CVE-2025-40098"
},
{
"category": "external",
"summary": "SUSE Bug 1252917 for CVE-2025-40098",
"url": "https://bugzilla.suse.com/1252917"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Micro 6.2:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-source-6.12.0-160000.8.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Micro 6.2:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-source-6.12.0-160000.8.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-19T16:46:47Z",
"details": "moderate"
}
],
"title": "CVE-2025-40098"
},
{
"cve": "CVE-2025-40101",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40101"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nbtrfs: fix memory leaks when rejecting a non SINGLE data profile without an RST\n\nAt the end of btrfs_load_block_group_zone_info() the first thing we do\nis to ensure that if the mapping type is not a SINGLE one and there is\nno RAID stripe tree, then we return early with an error.\n\nDoing that, though, prevents the code from running the last calls from\nthis function which are about freeing memory allocated during its\nrun. Hence, in this case, instead of returning early, we set the ret\nvalue and fall through the rest of the cleanup code.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Micro 6.2:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-source-6.12.0-160000.8.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40101",
"url": "https://www.suse.com/security/cve/CVE-2025-40101"
},
{
"category": "external",
"summary": "SUSE Bug 1252901 for CVE-2025-40101",
"url": "https://bugzilla.suse.com/1252901"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Micro 6.2:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-source-6.12.0-160000.8.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 3.3,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L",
"version": "3.1"
},
"products": [
"SUSE Linux Micro 6.2:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-source-6.12.0-160000.8.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-19T16:46:47Z",
"details": "low"
}
],
"title": "CVE-2025-40101"
},
{
"cve": "CVE-2025-40102",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40102"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nKVM: arm64: Prevent access to vCPU events before init\n\nAnother day, another syzkaller bug. KVM erroneously allows userspace to\npend vCPU events for a vCPU that hasn\u0027t been initialized yet, leading to\nKVM interpreting a bunch of uninitialized garbage for routing /\ninjecting the exception.\n\nIn one case the injection code and the hyp disagree on whether the vCPU\nhas a 32bit EL1 and put the vCPU into an illegal mode for AArch64,\ntripping the BUG() in exception_target_el() during the next injection:\n\n kernel BUG at arch/arm64/kvm/inject_fault.c:40!\n Internal error: Oops - BUG: 00000000f2000800 [#1] SMP\n CPU: 3 UID: 0 PID: 318 Comm: repro Not tainted 6.17.0-rc4-00104-g10fd0285305d #6 PREEMPT\n Hardware name: linux,dummy-virt (DT)\n pstate: 21402009 (nzCv daif +PAN -UAO -TCO +DIT -SSBS BTYPE=--)\n pc : exception_target_el+0x88/0x8c\n lr : pend_serror_exception+0x18/0x13c\n sp : ffff800082f03a10\n x29: ffff800082f03a10 x28: ffff0000cb132280 x27: 0000000000000000\n x26: 0000000000000000 x25: ffff0000c2a99c20 x24: 0000000000000000\n x23: 0000000000008000 x22: 0000000000000002 x21: 0000000000000004\n x20: 0000000000008000 x19: ffff0000c2a99c20 x18: 0000000000000000\n x17: 0000000000000000 x16: 0000000000000000 x15: 00000000200000c0\n x14: 0000000000000000 x13: 0000000000000000 x12: 0000000000000000\n x11: 0000000000000000 x10: 0000000000000000 x9 : 0000000000000000\n x8 : ffff800082f03af8 x7 : 0000000000000000 x6 : 0000000000000000\n x5 : ffff800080f621f0 x4 : 0000000000000000 x3 : 0000000000000000\n x2 : 000000000040009b x1 : 0000000000000003 x0 : ffff0000c2a99c20\n Call trace:\n exception_target_el+0x88/0x8c (P)\n kvm_inject_serror_esr+0x40/0x3b4\n __kvm_arm_vcpu_set_events+0xf0/0x100\n kvm_arch_vcpu_ioctl+0x180/0x9d4\n kvm_vcpu_ioctl+0x60c/0x9f4\n __arm64_sys_ioctl+0xac/0x104\n invoke_syscall+0x48/0x110\n el0_svc_common.constprop.0+0x40/0xe0\n do_el0_svc+0x1c/0x28\n el0_svc+0x34/0xf0\n el0t_64_sync_handler+0xa0/0xe4\n el0t_64_sync+0x198/0x19c\n Code: f946bc01 b4fffe61 9101e020 17fffff2 (d4210000)\n\nReject the ioctls outright as no sane VMM would call these before\nKVM_ARM_VCPU_INIT anyway. Even if it did the exception would\u0027ve been\nthrown away by the eventual reset of the vCPU\u0027s state.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Micro 6.2:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-source-6.12.0-160000.8.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40102",
"url": "https://www.suse.com/security/cve/CVE-2025-40102"
},
{
"category": "external",
"summary": "SUSE Bug 1252919 for CVE-2025-40102",
"url": "https://bugzilla.suse.com/1252919"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Micro 6.2:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-source-6.12.0-160000.8.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 0,
"baseSeverity": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:N",
"version": "3.1"
},
"products": [
"SUSE Linux Micro 6.2:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-source-6.12.0-160000.8.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-19T16:46:47Z",
"details": "moderate"
}
],
"title": "CVE-2025-40102"
},
{
"cve": "CVE-2025-40105",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40105"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nvfs: Don\u0027t leak disconnected dentries on umount\n\nWhen user calls open_by_handle_at() on some inode that is not cached, we\nwill create disconnected dentry for it. If such dentry is a directory,\nexportfs_decode_fh_raw() will then try to connect this dentry to the\ndentry tree through reconnect_path(). It may happen for various reasons\n(such as corrupted fs or race with rename) that the call to\nlookup_one_unlocked() in reconnect_one() will fail to find the dentry we\nare trying to reconnect and instead create a new dentry under the\nparent. Now this dentry will not be marked as disconnected although the\nparent still may well be disconnected (at least in case this\ninconsistency happened because the fs is corrupted and .. doesn\u0027t point\nto the real parent directory). This creates inconsistency in\ndisconnected flags but AFAICS it was mostly harmless. At least until\ncommit f1ee616214cb (\"VFS: don\u0027t keep disconnected dentries on d_anon\")\nwhich removed adding of most disconnected dentries to sb-\u003es_anon list.\nThus after this commit cleanup of disconnected dentries implicitely\nrelies on the fact that dput() will immediately reclaim such dentries.\nHowever when some leaf dentry isn\u0027t marked as disconnected, as in the\nscenario described above, the reclaim doesn\u0027t happen and the dentries\nare \"leaked\". Memory reclaim can eventually reclaim them but otherwise\nthey stay in memory and if umount comes first, we hit infamous \"Busy\ninodes after unmount\" bug. Make sure all dentries created under a\ndisconnected parent are marked as disconnected as well.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Micro 6.2:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-source-6.12.0-160000.8.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40105",
"url": "https://www.suse.com/security/cve/CVE-2025-40105"
},
{
"category": "external",
"summary": "SUSE Bug 1252928 for CVE-2025-40105",
"url": "https://bugzilla.suse.com/1252928"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Micro 6.2:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-source-6.12.0-160000.8.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 3.3,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L",
"version": "3.1"
},
"products": [
"SUSE Linux Micro 6.2:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-source-6.12.0-160000.8.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-19T16:46:47Z",
"details": "low"
}
],
"title": "CVE-2025-40105"
},
{
"cve": "CVE-2025-40107",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40107"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\ncan: hi311x: fix null pointer dereference when resuming from sleep before interface was enabled\n\nThis issue is similar to the vulnerability in the `mcp251x` driver,\nwhich was fixed in commit 03c427147b2d (\"can: mcp251x: fix resume from\nsleep before interface was brought up\").\n\nIn the `hi311x` driver, when the device resumes from sleep, the driver\nschedules `priv-\u003erestart_work`. However, if the network interface was\nnot previously enabled, the `priv-\u003ewq` (workqueue) is not allocated and\ninitialized, leading to a null pointer dereference.\n\nTo fix this, we move the allocation and initialization of the workqueue\nfrom the `hi3110_open` function to the `hi3110_can_probe` function.\nThis ensures that the workqueue is properly initialized before it is\nused during device resume. And added logic to destroy the workqueue\nin the error handling paths of `hi3110_can_probe` and in the\n`hi3110_can_remove` function to prevent resource leaks.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Micro 6.2:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-source-6.12.0-160000.8.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40107",
"url": "https://www.suse.com/security/cve/CVE-2025-40107"
},
{
"category": "external",
"summary": "SUSE Bug 1253018 for CVE-2025-40107",
"url": "https://bugzilla.suse.com/1253018"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Micro 6.2:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-source-6.12.0-160000.8.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Micro 6.2:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-source-6.12.0-160000.8.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-19T16:46:47Z",
"details": "moderate"
}
],
"title": "CVE-2025-40107"
},
{
"cve": "CVE-2025-40109",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40109"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\ncrypto: rng - Ensure set_ent is always present\n\nEnsure that set_ent is always set since only drbg provides it.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Micro 6.2:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-source-6.12.0-160000.8.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40109",
"url": "https://www.suse.com/security/cve/CVE-2025-40109"
},
{
"category": "external",
"summary": "SUSE Bug 1253176 for CVE-2025-40109",
"url": "https://bugzilla.suse.com/1253176"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Micro 6.2:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-source-6.12.0-160000.8.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Micro 6.2:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-source-6.12.0-160000.8.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-19T16:46:47Z",
"details": "moderate"
}
],
"title": "CVE-2025-40109"
},
{
"cve": "CVE-2025-40110",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40110"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\ndrm/vmwgfx: Fix a null-ptr access in the cursor snooper\n\nCheck that the resource which is converted to a surface exists before\ntrying to use the cursor snooper on it.\n\nvmw_cmd_res_check allows explicit invalid (SVGA3D_INVALID_ID) identifiers\nbecause some svga commands accept SVGA3D_INVALID_ID to mean \"no surface\",\nunfortunately functions that accept the actual surfaces as objects might\n(and in case of the cursor snooper, do not) be able to handle null\nobjects. Make sure that we validate not only the identifier (via the\nvmw_cmd_res_check) but also check that the actual resource exists before\ntrying to do something with it.\n\nFixes unchecked null-ptr reference in the snooping code.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Micro 6.2:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-source-6.12.0-160000.8.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40110",
"url": "https://www.suse.com/security/cve/CVE-2025-40110"
},
{
"category": "external",
"summary": "SUSE Bug 1253275 for CVE-2025-40110",
"url": "https://bugzilla.suse.com/1253275"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Micro 6.2:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-source-6.12.0-160000.8.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.1,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Micro 6.2:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-source-6.12.0-160000.8.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-19T16:46:47Z",
"details": "moderate"
}
],
"title": "CVE-2025-40110"
},
{
"cve": "CVE-2025-40111",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40111"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\ndrm/vmwgfx: Fix Use-after-free in validation\n\nNodes stored in the validation duplicates hashtable come from an arena\nallocator that is cleared at the end of vmw_execbuf_process. All nodes\nare expected to be cleared in vmw_validation_drop_ht but this node escaped\nbecause its resource was destroyed prematurely.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Micro 6.2:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-source-6.12.0-160000.8.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40111",
"url": "https://www.suse.com/security/cve/CVE-2025-40111"
},
{
"category": "external",
"summary": "SUSE Bug 1253362 for CVE-2025-40111",
"url": "https://bugzilla.suse.com/1253362"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Micro 6.2:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-source-6.12.0-160000.8.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.7,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:L/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Micro 6.2:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-source-6.12.0-160000.8.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-19T16:46:47Z",
"details": "moderate"
}
],
"title": "CVE-2025-40111"
},
{
"cve": "CVE-2025-40115",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40115"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nscsi: mpt3sas: Fix crash in transport port remove by using ioc_info()\n\nDuring mpt3sas_transport_port_remove(), messages were logged with\ndev_printk() against \u0026mpt3sas_port-\u003eport-\u003edev. At this point the SAS\ntransport device may already be partially unregistered or freed, leading\nto a crash when accessing its struct device.\n\nUsing ioc_info(), which logs via the PCI device (ioc-\u003epdev-\u003edev),\nguaranteed to remain valid until driver removal.\n\n[83428.295776] Oops: general protection fault, probably for non-canonical address 0x6f702f323a33312d: 0000 [#1] SMP NOPTI\n[83428.295785] CPU: 145 UID: 0 PID: 113296 Comm: rmmod Kdump: loaded Tainted: G OE 6.16.0-rc1+ #1 PREEMPT(voluntary)\n[83428.295792] Tainted: [O]=OOT_MODULE, [E]=UNSIGNED_MODULE\n[83428.295795] Hardware name: Dell Inc. Precision 7875 Tower/, BIOS 89.1.67 02/23/2024\n[83428.295799] RIP: 0010:__dev_printk+0x1f/0x70\n[83428.295805] Code: 90 90 90 90 90 90 90 90 90 90 90 0f 1f 44 00 00 49 89 d1 48 85 f6 74 52 4c 8b 46 50 4d 85 c0 74 1f 48 8b 46 68 48 85 c0 74 22 \u003c48\u003e 8b 08 0f b6 7f 01 48 c7 c2 db e8 42 ad 83 ef 30 e9 7b f8 ff ff\n[83428.295813] RSP: 0018:ff85aeafc3137bb0 EFLAGS: 00010206\n[83428.295817] RAX: 6f702f323a33312d RBX: ff4290ee81292860 RCX: 5000cca25103be32\n[83428.295820] RDX: ff85aeafc3137bb8 RSI: ff4290eeb1966c00 RDI: ffffffffc1560845\n[83428.295823] RBP: ff85aeafc3137c18 R08: 74726f702f303a33 R09: ff85aeafc3137bb8\n[83428.295826] R10: ff85aeafc3137b18 R11: ff4290f5bd60fe68 R12: ff4290ee81290000\n[83428.295830] R13: ff4290ee6e345de0 R14: ff4290ee81290000 R15: ff4290ee6e345e30\n[83428.295833] FS: 00007fd9472a6740(0000) GS:ff4290f5ce96b000(0000) knlGS:0000000000000000\n[83428.295837] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033\n[83428.295840] CR2: 00007f242b4db238 CR3: 00000002372b8006 CR4: 0000000000771ef0\n[83428.295844] PKRU: 55555554\n[83428.295846] Call Trace:\n[83428.295848] \u003cTASK\u003e\n[83428.295850] _dev_printk+0x5c/0x80\n[83428.295857] ? srso_alias_return_thunk+0x5/0xfbef5\n[83428.295863] mpt3sas_transport_port_remove+0x1c7/0x420 [mpt3sas]\n[83428.295882] _scsih_remove_device+0x21b/0x280 [mpt3sas]\n[83428.295894] ? _scsih_expander_node_remove+0x108/0x140 [mpt3sas]\n[83428.295906] ? srso_alias_return_thunk+0x5/0xfbef5\n[83428.295910] mpt3sas_device_remove_by_sas_address.part.0+0x8f/0x110 [mpt3sas]\n[83428.295921] _scsih_expander_node_remove+0x129/0x140 [mpt3sas]\n[83428.295933] _scsih_expander_node_remove+0x6a/0x140 [mpt3sas]\n[83428.295944] scsih_remove+0x3f0/0x4a0 [mpt3sas]\n[83428.295957] pci_device_remove+0x3b/0xb0\n[83428.295962] device_release_driver_internal+0x193/0x200\n[83428.295968] driver_detach+0x44/0x90\n[83428.295971] bus_remove_driver+0x69/0xf0\n[83428.295975] pci_unregister_driver+0x2a/0xb0\n[83428.295979] _mpt3sas_exit+0x1f/0x300 [mpt3sas]\n[83428.295991] __do_sys_delete_module.constprop.0+0x174/0x310\n[83428.295997] ? srso_alias_return_thunk+0x5/0xfbef5\n[83428.296000] ? __x64_sys_getdents64+0x9a/0x110\n[83428.296005] ? srso_alias_return_thunk+0x5/0xfbef5\n[83428.296009] ? syscall_trace_enter+0xf6/0x1b0\n[83428.296014] do_syscall_64+0x7b/0x2c0\n[83428.296019] ? srso_alias_return_thunk+0x5/0xfbef5\n[83428.296023] entry_SYSCALL_64_after_hwframe+0x76/0x7e",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Micro 6.2:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-source-6.12.0-160000.8.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40115",
"url": "https://www.suse.com/security/cve/CVE-2025-40115"
},
{
"category": "external",
"summary": "SUSE Bug 1253318 for CVE-2025-40115",
"url": "https://bugzilla.suse.com/1253318"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Micro 6.2:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-source-6.12.0-160000.8.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Micro 6.2:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-source-6.12.0-160000.8.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-19T16:46:47Z",
"details": "moderate"
}
],
"title": "CVE-2025-40115"
},
{
"cve": "CVE-2025-40116",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40116"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nusb: host: max3421-hcd: Fix error pointer dereference in probe cleanup\n\nThe kthread_run() function returns error pointers so the\nmax3421_hcd-\u003espi_thread pointer can be either error pointers or NULL.\nCheck for both before dereferencing it.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Micro 6.2:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-source-6.12.0-160000.8.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40116",
"url": "https://www.suse.com/security/cve/CVE-2025-40116"
},
{
"category": "external",
"summary": "SUSE Bug 1253324 for CVE-2025-40116",
"url": "https://bugzilla.suse.com/1253324"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Micro 6.2:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-source-6.12.0-160000.8.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Micro 6.2:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-source-6.12.0-160000.8.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-19T16:46:47Z",
"details": "moderate"
}
],
"title": "CVE-2025-40116"
},
{
"cve": "CVE-2025-40118",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40118"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nscsi: pm80xx: Fix array-index-out-of-of-bounds on rmmod\n\nSince commit f7b705c238d1 (\"scsi: pm80xx: Set phy_attached to zero when\ndevice is gone\") UBSAN reports:\n\n UBSAN: array-index-out-of-bounds in drivers/scsi/pm8001/pm8001_sas.c:786:17\n index 28 is out of range for type \u0027pm8001_phy [16]\u0027\n\non rmmod when using an expander.\n\nFor a direct attached device, attached_phy contains the local phy id.\nFor a device behind an expander, attached_phy contains the remote phy\nid, not the local phy id.\n\nI.e. while pm8001_ha will have pm8001_ha-\u003echip-\u003en_phy local phys, for a\ndevice behind an expander, attached_phy can be much larger than\npm8001_ha-\u003echip-\u003en_phy (depending on the amount of phys of the\nexpander).\n\nE.g. on my system pm8001_ha has 8 phys with phy ids 0-7. One of the\nports has an expander connected. The expander has 31 phys with phy ids\n0-30.\n\nThe pm8001_ha-\u003ephy array only contains the phys of the HBA. It does not\ncontain the phys of the expander. Thus, it is wrong to use attached_phy\nto index the pm8001_ha-\u003ephy array for a device behind an expander.\n\nThus, we can only clear phy_attached for devices that are directly\nattached.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Micro 6.2:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-source-6.12.0-160000.8.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40118",
"url": "https://www.suse.com/security/cve/CVE-2025-40118"
},
{
"category": "external",
"summary": "SUSE Bug 1253363 for CVE-2025-40118",
"url": "https://bugzilla.suse.com/1253363"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Micro 6.2:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-source-6.12.0-160000.8.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.1,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Micro 6.2:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-source-6.12.0-160000.8.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-19T16:46:47Z",
"details": "moderate"
}
],
"title": "CVE-2025-40118"
},
{
"cve": "CVE-2025-40120",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40120"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nnet: usb: asix: hold PM usage ref to avoid PM/MDIO + RTNL deadlock\n\nPrevent USB runtime PM (autosuspend) for AX88772* in bind.\n\nusbnet enables runtime PM (autosuspend) by default, so disabling it via\nthe usb_driver flag is ineffective. On AX88772B, autosuspend shows no\nmeasurable power saving with current driver (no link partner, admin\nup/down). The ~0.453 W -\u003e ~0.248 W drop on v6.1 comes from phylib powering\nthe PHY off on admin-down, not from USB autosuspend.\n\nThe real hazard is that with runtime PM enabled, ndo_open() (under RTNL)\nmay synchronously trigger autoresume (usb_autopm_get_interface()) into\nasix_resume() while the USB PM lock is held. Resume paths then invoke\nphylink/phylib and MDIO, which also expect RTNL, leading to possible\ndeadlocks or PM lock vs MDIO wake issues.\n\nTo avoid this, keep the device runtime-PM active by taking a usage\nreference in ax88772_bind() and dropping it in unbind(). A non-zero PM\nusage count blocks runtime suspend regardless of userspace policy\n(.../power/control - pm_runtime_allow/forbid), making this approach\nrobust against sysfs overrides.\n\nHolding a runtime-PM usage ref does not affect system-wide suspend;\nsystem sleep/resume callbacks continue to run as before.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Micro 6.2:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-source-6.12.0-160000.8.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40120",
"url": "https://www.suse.com/security/cve/CVE-2025-40120"
},
{
"category": "external",
"summary": "SUSE Bug 1253360 for CVE-2025-40120",
"url": "https://bugzilla.suse.com/1253360"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Micro 6.2:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-source-6.12.0-160000.8.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Micro 6.2:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-source-6.12.0-160000.8.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-19T16:46:47Z",
"details": "moderate"
}
],
"title": "CVE-2025-40120"
},
{
"cve": "CVE-2025-40121",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40121"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nASoC: Intel: bytcr_rt5651: Fix invalid quirk input mapping\n\nWhen an invalid value is passed via quirk option, currently\nbytcr_rt5640 driver just ignores and leaves as is, which may lead to\nunepxected results like OOB access.\n\nThis patch adds the sanity check and corrects the input mapping to the\ncertain default value if an invalid value is passed.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Micro 6.2:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-source-6.12.0-160000.8.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40121",
"url": "https://www.suse.com/security/cve/CVE-2025-40121"
},
{
"category": "external",
"summary": "SUSE Bug 1253367 for CVE-2025-40121",
"url": "https://bugzilla.suse.com/1253367"
},
{
"category": "external",
"summary": "SUSE Bug 1253430 for CVE-2025-40121",
"url": "https://bugzilla.suse.com/1253430"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Micro 6.2:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-source-6.12.0-160000.8.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Micro 6.2:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-source-6.12.0-160000.8.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-19T16:46:47Z",
"details": "moderate"
}
],
"title": "CVE-2025-40121"
},
{
"cve": "CVE-2025-40127",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40127"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nhwrng: ks-sa - fix division by zero in ks_sa_rng_init\n\nFix division by zero in ks_sa_rng_init caused by missing clock\npointer initialization. The clk_get_rate() call is performed on\nan uninitialized clk pointer, resulting in division by zero when\ncalculating delay values.\n\nAdd clock initialization code before using the clock.\n\n\n drivers/char/hw_random/ks-sa-rng.c | 7 +++++++\n 1 file changed, 7 insertions(+)",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Micro 6.2:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-source-6.12.0-160000.8.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40127",
"url": "https://www.suse.com/security/cve/CVE-2025-40127"
},
{
"category": "external",
"summary": "SUSE Bug 1253369 for CVE-2025-40127",
"url": "https://bugzilla.suse.com/1253369"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Micro 6.2:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-source-6.12.0-160000.8.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Micro 6.2:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-source-6.12.0-160000.8.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-19T16:46:47Z",
"details": "moderate"
}
],
"title": "CVE-2025-40127"
},
{
"cve": "CVE-2025-40129",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40129"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nsunrpc: fix null pointer dereference on zero-length checksum\n\nIn xdr_stream_decode_opaque_auth(), zero-length checksum.len causes\nchecksum.data to be set to NULL. This triggers a NPD when accessing\nchecksum.data in gss_krb5_verify_mic_v2(). This patch ensures that\nthe value of checksum.len is not less than XDR_UNIT.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Micro 6.2:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-source-6.12.0-160000.8.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40129",
"url": "https://www.suse.com/security/cve/CVE-2025-40129"
},
{
"category": "external",
"summary": "SUSE Bug 1253472 for CVE-2025-40129",
"url": "https://bugzilla.suse.com/1253472"
},
{
"category": "external",
"summary": "SUSE Bug 1253473 for CVE-2025-40129",
"url": "https://bugzilla.suse.com/1253473"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Micro 6.2:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-source-6.12.0-160000.8.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Micro 6.2:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-source-6.12.0-160000.8.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-19T16:46:47Z",
"details": "important"
}
],
"title": "CVE-2025-40129"
},
{
"cve": "CVE-2025-40132",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40132"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nASoC: Intel: sof_sdw: Prevent jump to NULL add_sidecar callback\n\nIn create_sdw_dailink() check that sof_end-\u003ecodec_info-\u003eadd_sidecar\nis not NULL before calling it.\n\nThe original code assumed that if include_sidecar is true, the codec\non that link has an add_sidecar callback. But there could be other\ncodecs on the same link that do not have an add_sidecar callback.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Micro 6.2:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-source-6.12.0-160000.8.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40132",
"url": "https://www.suse.com/security/cve/CVE-2025-40132"
},
{
"category": "external",
"summary": "SUSE Bug 1253330 for CVE-2025-40132",
"url": "https://bugzilla.suse.com/1253330"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Micro 6.2:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-source-6.12.0-160000.8.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Micro 6.2:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-source-6.12.0-160000.8.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-19T16:46:47Z",
"details": "moderate"
}
],
"title": "CVE-2025-40132"
},
{
"cve": "CVE-2025-40133",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40133"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nmptcp: Use __sk_dst_get() and dst_dev_rcu() in mptcp_active_enable().\n\nmptcp_active_enable() is called from subflow_finish_connect(),\nwhich is icsk-\u003eicsk_af_ops-\u003esk_rx_dst_set() and it\u0027s not always\nunder RCU.\n\nUsing sk_dst_get(sk)-\u003edev could trigger UAF.\n\nLet\u0027s use __sk_dst_get() and dst_dev_rcu().",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Micro 6.2:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-source-6.12.0-160000.8.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40133",
"url": "https://www.suse.com/security/cve/CVE-2025-40133"
},
{
"category": "external",
"summary": "SUSE Bug 1253328 for CVE-2025-40133",
"url": "https://bugzilla.suse.com/1253328"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Micro 6.2:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-source-6.12.0-160000.8.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Micro 6.2:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-source-6.12.0-160000.8.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-19T16:46:47Z",
"details": "moderate"
}
],
"title": "CVE-2025-40133"
},
{
"cve": "CVE-2025-40134",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40134"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\ndm: fix NULL pointer dereference in __dm_suspend()\n\nThere is a race condition between dm device suspend and table load that\ncan lead to null pointer dereference. The issue occurs when suspend is\ninvoked before table load completes:\n\nBUG: kernel NULL pointer dereference, address: 0000000000000054\nOops: 0000 [#1] PREEMPT SMP PTI\nCPU: 6 PID: 6798 Comm: dmsetup Not tainted 6.6.0-g7e52f5f0ca9b #62\nHardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.16.1-2.fc37 04/01/2014\nRIP: 0010:blk_mq_wait_quiesce_done+0x0/0x50\nCall Trace:\n \u003cTASK\u003e\n blk_mq_quiesce_queue+0x2c/0x50\n dm_stop_queue+0xd/0x20\n __dm_suspend+0x130/0x330\n dm_suspend+0x11a/0x180\n dev_suspend+0x27e/0x560\n ctl_ioctl+0x4cf/0x850\n dm_ctl_ioctl+0xd/0x20\n vfs_ioctl+0x1d/0x50\n __se_sys_ioctl+0x9b/0xc0\n __x64_sys_ioctl+0x19/0x30\n x64_sys_call+0x2c4a/0x4620\n do_syscall_64+0x9e/0x1b0\n\nThe issue can be triggered as below:\n\nT1 \t\t\t\t\t\tT2\ndm_suspend\t\t\t\t\ttable_load\n__dm_suspend\t\t\t\t\tdm_setup_md_queue\n\t\t\t\t\t\tdm_mq_init_request_queue\n\t\t\t\t\t\tblk_mq_init_allocated_queue\n\t\t\t\t\t\t=\u003e q-\u003emq_ops = set-\u003eops; (1)\ndm_stop_queue / dm_wait_for_completion\n=\u003e q-\u003etag_set NULL pointer!\t(2)\n\t\t\t\t\t\t=\u003e q-\u003etag_set = set; (3)\n\nFix this by checking if a valid table (map) exists before performing\nrequest-based suspend and waiting for target I/O. When map is NULL,\nskip these table-dependent suspend steps.\n\nEven when map is NULL, no I/O can reach any target because there is\nno table loaded; I/O submitted in this state will fail early in the\nDM layer. Skipping the table-dependent suspend logic in this case\nis safe and avoids NULL pointer dereferences.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Micro 6.2:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-source-6.12.0-160000.8.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40134",
"url": "https://www.suse.com/security/cve/CVE-2025-40134"
},
{
"category": "external",
"summary": "SUSE Bug 1253386 for CVE-2025-40134",
"url": "https://bugzilla.suse.com/1253386"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Micro 6.2:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-source-6.12.0-160000.8.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.7,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Micro 6.2:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-source-6.12.0-160000.8.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-19T16:46:47Z",
"details": "moderate"
}
],
"title": "CVE-2025-40134"
},
{
"cve": "CVE-2025-40135",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40135"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nipv6: use RCU in ip6_xmit()\n\nUse RCU in ip6_xmit() in order to use dst_dev_rcu() to prevent\npossible UAF.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Micro 6.2:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-source-6.12.0-160000.8.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40135",
"url": "https://www.suse.com/security/cve/CVE-2025-40135"
},
{
"category": "external",
"summary": "SUSE Bug 1253342 for CVE-2025-40135",
"url": "https://bugzilla.suse.com/1253342"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Micro 6.2:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-source-6.12.0-160000.8.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.1,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Micro 6.2:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-source-6.12.0-160000.8.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-19T16:46:47Z",
"details": "moderate"
}
],
"title": "CVE-2025-40135"
},
{
"cve": "CVE-2025-40139",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40139"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nsmc: Use __sk_dst_get() and dst_dev_rcu() in in smc_clc_prfx_set().\n\nsmc_clc_prfx_set() is called during connect() and not under RCU\nnor RTNL.\n\nUsing sk_dst_get(sk)-\u003edev could trigger UAF.\n\nLet\u0027s use __sk_dst_get() and dev_dst_rcu() under rcu_read_lock()\nafter kernel_getsockname().\n\nNote that the returned value of smc_clc_prfx_set() is not used\nin the caller.\n\nWhile at it, we change the 1st arg of smc_clc_prfx_set[46]_rcu()\nnot to touch dst there.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Micro 6.2:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-source-6.12.0-160000.8.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40139",
"url": "https://www.suse.com/security/cve/CVE-2025-40139"
},
{
"category": "external",
"summary": "SUSE Bug 1253409 for CVE-2025-40139",
"url": "https://bugzilla.suse.com/1253409"
},
{
"category": "external",
"summary": "SUSE Bug 1253411 for CVE-2025-40139",
"url": "https://bugzilla.suse.com/1253411"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Micro 6.2:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-source-6.12.0-160000.8.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Micro 6.2:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-source-6.12.0-160000.8.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-19T16:46:47Z",
"details": "important"
}
],
"title": "CVE-2025-40139"
},
{
"cve": "CVE-2025-40140",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40140"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nnet: usb: Remove disruptive netif_wake_queue in rtl8150_set_multicast\n\nsyzbot reported WARNING in rtl8150_start_xmit/usb_submit_urb.\nThis is the sequence of events that leads to the warning:\n\nrtl8150_start_xmit() {\n\tnetif_stop_queue();\n\tusb_submit_urb(dev-\u003etx_urb);\n}\n\nrtl8150_set_multicast() {\n\tnetif_stop_queue();\n\tnetif_wake_queue();\t\t\u003c-- wakes up TX queue before URB is done\n}\n\nrtl8150_start_xmit() {\n\tnetif_stop_queue();\n\tusb_submit_urb(dev-\u003etx_urb);\t\u003c-- double submission\n}\n\nrtl8150_set_multicast being the ndo_set_rx_mode callback should not be\ncalling netif_stop_queue and notif_start_queue as these handle\nTX queue synchronization.\n\nThe net core function dev_set_rx_mode handles the synchronization\nfor rtl8150_set_multicast making it safe to remove these locks.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Micro 6.2:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-source-6.12.0-160000.8.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40140",
"url": "https://www.suse.com/security/cve/CVE-2025-40140"
},
{
"category": "external",
"summary": "SUSE Bug 1253349 for CVE-2025-40140",
"url": "https://bugzilla.suse.com/1253349"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Micro 6.2:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-source-6.12.0-160000.8.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 3.3,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L",
"version": "3.1"
},
"products": [
"SUSE Linux Micro 6.2:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-source-6.12.0-160000.8.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-19T16:46:47Z",
"details": "low"
}
],
"title": "CVE-2025-40140"
},
{
"cve": "CVE-2025-40141",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40141"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nBluetooth: ISO: Fix possible UAF on iso_conn_free\n\nThis attempt to fix similar issue to sco_conn_free where if the\nconn-\u003esk is not set to NULL may lead to UAF on iso_conn_free.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Micro 6.2:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-source-6.12.0-160000.8.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40141",
"url": "https://www.suse.com/security/cve/CVE-2025-40141"
},
{
"category": "external",
"summary": "SUSE Bug 1253352 for CVE-2025-40141",
"url": "https://bugzilla.suse.com/1253352"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Micro 6.2:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-source-6.12.0-160000.8.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Micro 6.2:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-source-6.12.0-160000.8.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-19T16:46:47Z",
"details": "moderate"
}
],
"title": "CVE-2025-40141"
},
{
"cve": "CVE-2025-40142",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40142"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nALSA: pcm: Disable bottom softirqs as part of spin_lock_irq() on PREEMPT_RT\n\nsnd_pcm_group_lock_irq() acquires a spinlock_t and disables interrupts\nvia spin_lock_irq(). This also implicitly disables the handling of\nsoftirqs such as TIMER_SOFTIRQ.\nOn PREEMPT_RT softirqs are preemptible and spin_lock_irq() does not\ndisable them. That means a timer can be invoked during spin_lock_irq()\non the same CPU. Due to synchronisations reasons local_bh_disable() has\na per-CPU lock named softirq_ctrl.lock which synchronizes individual\nsoftirq against each other.\nsyz-bot managed to trigger a lockdep report where softirq_ctrl.lock is\nacquired in hrtimer_cancel() in addition to hrtimer_run_softirq(). This\nis a possible deadlock.\n\nThe softirq_ctrl.lock can not be made part of spin_lock_irq() as this\nwould lead to too much synchronisation against individual threads on the\nsystem. To avoid the possible deadlock, softirqs must be manually\ndisabled before the lock is acquired.\n\nDisable softirqs before the lock is acquired on PREEMPT_RT.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Micro 6.2:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-source-6.12.0-160000.8.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40142",
"url": "https://www.suse.com/security/cve/CVE-2025-40142"
},
{
"category": "external",
"summary": "SUSE Bug 1253348 for CVE-2025-40142",
"url": "https://bugzilla.suse.com/1253348"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Micro 6.2:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-source-6.12.0-160000.8.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.7,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Micro 6.2:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-source-6.12.0-160000.8.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-19T16:46:47Z",
"details": "moderate"
}
],
"title": "CVE-2025-40142"
},
{
"cve": "CVE-2025-40149",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40149"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\ntls: Use __sk_dst_get() and dst_dev_rcu() in get_netdev_for_sock().\n\nget_netdev_for_sock() is called during setsockopt(),\nso not under RCU.\n\nUsing sk_dst_get(sk)-\u003edev could trigger UAF.\n\nLet\u0027s use __sk_dst_get() and dst_dev_rcu().\n\nNote that the only -\u003endo_sk_get_lower_dev() user is\nbond_sk_get_lower_dev(), which uses RCU.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Micro 6.2:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-source-6.12.0-160000.8.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40149",
"url": "https://www.suse.com/security/cve/CVE-2025-40149"
},
{
"category": "external",
"summary": "SUSE Bug 1253355 for CVE-2025-40149",
"url": "https://bugzilla.suse.com/1253355"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Micro 6.2:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-source-6.12.0-160000.8.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Micro 6.2:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-source-6.12.0-160000.8.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-19T16:46:47Z",
"details": "moderate"
}
],
"title": "CVE-2025-40149"
},
{
"cve": "CVE-2025-40153",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40153"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nmm: hugetlb: avoid soft lockup when mprotect to large memory area\n\nWhen calling mprotect() to a large hugetlb memory area in our customer\u0027s\nworkload (~300GB hugetlb memory), soft lockup was observed:\n\nwatchdog: BUG: soft lockup - CPU#98 stuck for 23s! [t2_new_sysv:126916]\n\nCPU: 98 PID: 126916 Comm: t2_new_sysv Kdump: loaded Not tainted 6.17-rc7\nHardware name: GIGACOMPUTING R2A3-T40-AAV1/Jefferson CIO, BIOS 5.4.4.1 07/15/2025\npstate: 20400009 (nzCv daif +PAN -UAO -TCO -DIT -SSBS BTYPE=--)\npc : mte_clear_page_tags+0x14/0x24\nlr : mte_sync_tags+0x1c0/0x240\nsp : ffff80003150bb80\nx29: ffff80003150bb80 x28: ffff00739e9705a8 x27: 0000ffd2d6a00000\nx26: 0000ff8e4bc00000 x25: 00e80046cde00f45 x24: 0000000000022458\nx23: 0000000000000000 x22: 0000000000000004 x21: 000000011b380000\nx20: ffff000000000000 x19: 000000011b379f40 x18: 0000000000000000\nx17: 0000000000000000 x16: 0000000000000000 x15: 0000000000000000\nx14: 0000000000000000 x13: 0000000000000000 x12: 0000000000000000\nx11: 0000000000000000 x10: 0000000000000000 x9 : ffffc875e0aa5e2c\nx8 : 0000000000000000 x7 : 0000000000000000 x6 : 0000000000000000\nx5 : fffffc01ce7a5c00 x4 : 00000000046cde00 x3 : fffffc0000000000\nx2 : 0000000000000004 x1 : 0000000000000040 x0 : ffff0046cde7c000\n\nCall trace:\n mte_clear_page_tags+0x14/0x24\n set_huge_pte_at+0x25c/0x280\n hugetlb_change_protection+0x220/0x430\n change_protection+0x5c/0x8c\n mprotect_fixup+0x10c/0x294\n do_mprotect_pkey.constprop.0+0x2e0/0x3d4\n __arm64_sys_mprotect+0x24/0x44\n invoke_syscall+0x50/0x160\n el0_svc_common+0x48/0x144\n do_el0_svc+0x30/0xe0\n el0_svc+0x30/0xf0\n el0t_64_sync_handler+0xc4/0x148\n el0t_64_sync+0x1a4/0x1a8\n\nSoft lockup is not triggered with THP or base page because there is\ncond_resched() called for each PMD size.\n\nAlthough the soft lockup was triggered by MTE, it should be not MTE\nspecific. The other processing which takes long time in the loop may\ntrigger soft lockup too.\n\nSo add cond_resched() for hugetlb to avoid soft lockup.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Micro 6.2:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-source-6.12.0-160000.8.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40153",
"url": "https://www.suse.com/security/cve/CVE-2025-40153"
},
{
"category": "external",
"summary": "SUSE Bug 1253408 for CVE-2025-40153",
"url": "https://bugzilla.suse.com/1253408"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Micro 6.2:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-source-6.12.0-160000.8.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 3.3,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L",
"version": "3.1"
},
"products": [
"SUSE Linux Micro 6.2:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-source-6.12.0-160000.8.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-19T16:46:47Z",
"details": "low"
}
],
"title": "CVE-2025-40153"
},
{
"cve": "CVE-2025-40154",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40154"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nASoC: Intel: bytcr_rt5640: Fix invalid quirk input mapping\n\nWhen an invalid value is passed via quirk option, currently\nbytcr_rt5640 driver only shows an error message but leaves as is.\nThis may lead to unepxected results like OOB access.\n\nThis patch corrects the input mapping to the certain default value if\nan invalid value is passed.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Micro 6.2:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-source-6.12.0-160000.8.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40154",
"url": "https://www.suse.com/security/cve/CVE-2025-40154"
},
{
"category": "external",
"summary": "SUSE Bug 1253431 for CVE-2025-40154",
"url": "https://bugzilla.suse.com/1253431"
},
{
"category": "external",
"summary": "SUSE Bug 1253432 for CVE-2025-40154",
"url": "https://bugzilla.suse.com/1253432"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Micro 6.2:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-source-6.12.0-160000.8.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Micro 6.2:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-source-6.12.0-160000.8.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-19T16:46:47Z",
"details": "moderate"
}
],
"title": "CVE-2025-40154"
},
{
"cve": "CVE-2025-40156",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40156"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nPM / devfreq: mtk-cci: Fix potential error pointer dereference in probe()\n\nThe drv-\u003esram_reg pointer could be set to ERR_PTR(-EPROBE_DEFER) which\nwould lead to a error pointer dereference. Use IS_ERR_OR_NULL() to check\nthat the pointer is valid.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Micro 6.2:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-source-6.12.0-160000.8.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40156",
"url": "https://www.suse.com/security/cve/CVE-2025-40156"
},
{
"category": "external",
"summary": "SUSE Bug 1253428 for CVE-2025-40156",
"url": "https://bugzilla.suse.com/1253428"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Micro 6.2:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-source-6.12.0-160000.8.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Micro 6.2:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-source-6.12.0-160000.8.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-19T16:46:47Z",
"details": "moderate"
}
],
"title": "CVE-2025-40156"
},
{
"cve": "CVE-2025-40157",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40157"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nEDAC/i10nm: Skip DIMM enumeration on a disabled memory controller\n\nWhen loading the i10nm_edac driver on some Intel Granite Rapids servers,\na call trace may appear as follows:\n\n UBSAN: shift-out-of-bounds in drivers/edac/skx_common.c:453:16\n shift exponent -66 is negative\n ...\n __ubsan_handle_shift_out_of_bounds+0x1e3/0x390\n skx_get_dimm_info.cold+0x47/0xd40 [skx_edac_common]\n i10nm_get_dimm_config+0x23e/0x390 [i10nm_edac]\n skx_register_mci+0x159/0x220 [skx_edac_common]\n i10nm_init+0xcb0/0x1ff0 [i10nm_edac]\n ...\n\nThis occurs because some BIOS may disable a memory controller if there\naren\u0027t any memory DIMMs populated on this memory controller. The DIMMMTR\nregister of this disabled memory controller contains the invalid value\n~0, resulting in the call trace above.\n\nFix this call trace by skipping DIMM enumeration on a disabled memory\ncontroller.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Micro 6.2:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-source-6.12.0-160000.8.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40157",
"url": "https://www.suse.com/security/cve/CVE-2025-40157"
},
{
"category": "external",
"summary": "SUSE Bug 1253423 for CVE-2025-40157",
"url": "https://bugzilla.suse.com/1253423"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Micro 6.2:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-source-6.12.0-160000.8.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.2,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:L/I:L/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Micro 6.2:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-source-6.12.0-160000.8.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-19T16:46:47Z",
"details": "moderate"
}
],
"title": "CVE-2025-40157"
},
{
"cve": "CVE-2025-40158",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40158"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nipv6: use RCU in ip6_output()\n\nUse RCU in ip6_output() in order to use dst_dev_rcu() to prevent\npossible UAF.\n\nWe can remove rcu_read_lock()/rcu_read_unlock() pairs\nfrom ip6_finish_output2().",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Micro 6.2:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-source-6.12.0-160000.8.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40158",
"url": "https://www.suse.com/security/cve/CVE-2025-40158"
},
{
"category": "external",
"summary": "SUSE Bug 1253402 for CVE-2025-40158",
"url": "https://bugzilla.suse.com/1253402"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Micro 6.2:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-source-6.12.0-160000.8.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Micro 6.2:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-source-6.12.0-160000.8.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-19T16:46:47Z",
"details": "moderate"
}
],
"title": "CVE-2025-40158"
},
{
"cve": "CVE-2025-40159",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40159"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nxsk: Harden userspace-supplied xdp_desc validation\n\nTurned out certain clearly invalid values passed in xdp_desc from\nuserspace can pass xp_{,un}aligned_validate_desc() and then lead\nto UBs or just invalid frames to be queued for xmit.\n\ndesc-\u003elen close to ``U32_MAX`` with a non-zero pool-\u003etx_metadata_len\ncan cause positive integer overflow and wraparound, the same way low\nenough desc-\u003eaddr with a non-zero pool-\u003etx_metadata_len can cause\nnegative integer overflow. Both scenarios can then pass the\nvalidation successfully.\nThis doesn\u0027t happen with valid XSk applications, but can be used\nto perform attacks.\n\nAlways promote desc-\u003elen to ``u64`` first to exclude positive\noverflows of it. Use explicit check_{add,sub}_overflow() when\nvalidating desc-\u003eaddr (which is ``u64`` already).\n\nbloat-o-meter reports a little growth of the code size:\n\nadd/remove: 0/0 grow/shrink: 2/1 up/down: 60/-16 (44)\nFunction old new delta\nxskq_cons_peek_desc 299 330 +31\nxsk_tx_peek_release_desc_batch 973 1002 +29\nxsk_generic_xmit 3148 3132 -16\n\nbut hopefully this doesn\u0027t hurt the performance much.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Micro 6.2:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-source-6.12.0-160000.8.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40159",
"url": "https://www.suse.com/security/cve/CVE-2025-40159"
},
{
"category": "external",
"summary": "SUSE Bug 1253403 for CVE-2025-40159",
"url": "https://bugzilla.suse.com/1253403"
},
{
"category": "external",
"summary": "SUSE Bug 1253404 for CVE-2025-40159",
"url": "https://bugzilla.suse.com/1253404"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Micro 6.2:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-source-6.12.0-160000.8.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Micro 6.2:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-source-6.12.0-160000.8.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-19T16:46:47Z",
"details": "important"
}
],
"title": "CVE-2025-40159"
},
{
"cve": "CVE-2025-40161",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40161"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nmailbox: zynqmp-ipi: Fix SGI cleanup on unbind\n\nThe driver incorrectly determines SGI vs SPI interrupts by checking IRQ\nnumber \u003c 16, which fails with dynamic IRQ allocation. During unbind,\nthis causes improper SGI cleanup leading to kernel crash.\n\nAdd explicit irq_type field to pdata for reliable identification of SGI\ninterrupts (type-2) and only clean up SGI resources when appropriate.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Micro 6.2:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-source-6.12.0-160000.8.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40161",
"url": "https://www.suse.com/security/cve/CVE-2025-40161"
},
{
"category": "external",
"summary": "SUSE Bug 1253410 for CVE-2025-40161",
"url": "https://bugzilla.suse.com/1253410"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Micro 6.2:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-source-6.12.0-160000.8.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.1,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Micro 6.2:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-source-6.12.0-160000.8.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-19T16:46:47Z",
"details": "moderate"
}
],
"title": "CVE-2025-40161"
},
{
"cve": "CVE-2025-40162",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40162"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nASoC: amd/sdw_utils: avoid NULL deref when devm_kasprintf() fails\n\ndevm_kasprintf() may return NULL on memory allocation failure,\nbut the debug message prints cpus-\u003edai_name before checking it.\nMove the dev_dbg() call after the NULL check to prevent potential\nNULL pointer dereference.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Micro 6.2:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-source-6.12.0-160000.8.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40162",
"url": "https://www.suse.com/security/cve/CVE-2025-40162"
},
{
"category": "external",
"summary": "SUSE Bug 1253422 for CVE-2025-40162",
"url": "https://bugzilla.suse.com/1253422"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Micro 6.2:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-source-6.12.0-160000.8.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Micro 6.2:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-source-6.12.0-160000.8.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-19T16:46:47Z",
"details": "moderate"
}
],
"title": "CVE-2025-40162"
},
{
"cve": "CVE-2025-40164",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40164"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nusbnet: Fix using smp_processor_id() in preemptible code warnings\n\nSyzbot reported the following warning:\n\nBUG: using smp_processor_id() in preemptible [00000000] code: dhcpcd/2879\ncaller is usbnet_skb_return+0x74/0x490 drivers/net/usb/usbnet.c:331\nCPU: 1 UID: 0 PID: 2879 Comm: dhcpcd Not tainted 6.15.0-rc4-syzkaller-00098-g615dca38c2ea #0 PREEMPT(voluntary)\nCall Trace:\n \u003cTASK\u003e\n __dump_stack lib/dump_stack.c:94 [inline]\n dump_stack_lvl+0x16c/0x1f0 lib/dump_stack.c:120\n check_preemption_disabled+0xd0/0xe0 lib/smp_processor_id.c:49\n usbnet_skb_return+0x74/0x490 drivers/net/usb/usbnet.c:331\n usbnet_resume_rx+0x4b/0x170 drivers/net/usb/usbnet.c:708\n usbnet_change_mtu+0x1be/0x220 drivers/net/usb/usbnet.c:417\n __dev_set_mtu net/core/dev.c:9443 [inline]\n netif_set_mtu_ext+0x369/0x5c0 net/core/dev.c:9496\n netif_set_mtu+0xb0/0x160 net/core/dev.c:9520\n dev_set_mtu+0xae/0x170 net/core/dev_api.c:247\n dev_ifsioc+0xa31/0x18d0 net/core/dev_ioctl.c:572\n dev_ioctl+0x223/0x10e0 net/core/dev_ioctl.c:821\n sock_do_ioctl+0x19d/0x280 net/socket.c:1204\n sock_ioctl+0x42f/0x6a0 net/socket.c:1311\n vfs_ioctl fs/ioctl.c:51 [inline]\n __do_sys_ioctl fs/ioctl.c:906 [inline]\n __se_sys_ioctl fs/ioctl.c:892 [inline]\n __x64_sys_ioctl+0x190/0x200 fs/ioctl.c:892\n do_syscall_x64 arch/x86/entry/syscall_64.c:63 [inline]\n do_syscall_64+0xcd/0x260 arch/x86/entry/syscall_64.c:94\n entry_SYSCALL_64_after_hwframe+0x77/0x7f\n\nFor historical and portability reasons, the netif_rx() is usually\nrun in the softirq or interrupt context, this commit therefore add\nlocal_bh_disable/enable() protection in the usbnet_resume_rx().",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Micro 6.2:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-source-6.12.0-160000.8.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40164",
"url": "https://www.suse.com/security/cve/CVE-2025-40164"
},
{
"category": "external",
"summary": "SUSE Bug 1253407 for CVE-2025-40164",
"url": "https://bugzilla.suse.com/1253407"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Micro 6.2:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-source-6.12.0-160000.8.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.7,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Micro 6.2:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-source-6.12.0-160000.8.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-19T16:46:47Z",
"details": "moderate"
}
],
"title": "CVE-2025-40164"
},
{
"cve": "CVE-2025-40165",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40165"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nmedia: nxp: imx8-isi: m2m: Fix streaming cleanup on release\n\nIf streamon/streamoff calls are imbalanced, such as when exiting an\napplication with Ctrl+C when streaming, the m2m usage_count will never\nreach zero and the ISI channel won\u0027t be freed. Besides from that, if the\ninput line width is more than 2K, it will trigger a WARN_ON():\n\n[ 59.222120] ------------[ cut here ]------------\n[ 59.226758] WARNING: drivers/media/platform/nxp/imx8-isi/imx8-isi-hw.c:631 at mxc_isi_channel_chain+0xa4/0x120, CPU#4: v4l2-ctl/654\n[ 59.238569] Modules linked in: ap1302\n[ 59.242231] CPU: 4 UID: 0 PID: 654 Comm: v4l2-ctl Not tainted 6.16.0-rc4-next-20250704-06511-gff0e002d480a-dirty #258 PREEMPT\n[ 59.253597] Hardware name: NXP i.MX95 15X15 board (DT)\n[ 59.258720] pstate: 80400009 (Nzcv daif +PAN -UAO -TCO -DIT -SSBS BTYPE=--)\n[ 59.265669] pc : mxc_isi_channel_chain+0xa4/0x120\n[ 59.270358] lr : mxc_isi_channel_chain+0x44/0x120\n[ 59.275047] sp : ffff8000848c3b40\n[ 59.278348] x29: ffff8000848c3b40 x28: ffff0000859b4c98 x27: ffff800081939f00\n[ 59.285472] x26: 000000000000000a x25: ffff0000859b4cb8 x24: 0000000000000001\n[ 59.292597] x23: ffff0000816f4760 x22: ffff0000816f4258 x21: ffff000084ceb780\n[ 59.299720] x20: ffff000084342ff8 x19: ffff000084340000 x18: 0000000000000000\n[ 59.306845] x17: 0000000000000000 x16: 0000000000000000 x15: 0000ffffdb369e1c\n[ 59.313969] x14: 0000000000000000 x13: 0000000000000000 x12: 0000000000000000\n[ 59.321093] x11: 0000000000000000 x10: 0000000000000000 x9 : 0000000000000000\n[ 59.328217] x8 : ffff8000848c3d48 x7 : ffff800081930b30 x6 : ffff800081930b30\n[ 59.335340] x5 : ffff0000859b6000 x4 : ffff80008193ae80 x3 : ffff800081022420\n[ 59.342464] x2 : ffff0000852f6900 x1 : 0000000000000001 x0 : ffff000084341000\n[ 59.349590] Call trace:\n[ 59.352025] mxc_isi_channel_chain+0xa4/0x120 (P)\n[ 59.356722] mxc_isi_m2m_streamon+0x160/0x20c\n[ 59.361072] v4l_streamon+0x24/0x30\n[ 59.364556] __video_do_ioctl+0x40c/0x4a0\n[ 59.368560] video_usercopy+0x2bc/0x690\n[ 59.372382] video_ioctl2+0x18/0x24\n[ 59.375857] v4l2_ioctl+0x40/0x60\n[ 59.379168] __arm64_sys_ioctl+0xac/0x104\n[ 59.383172] invoke_syscall+0x48/0x104\n[ 59.386916] el0_svc_common.constprop.0+0xc0/0xe0\n[ 59.391613] do_el0_svc+0x1c/0x28\n[ 59.394915] el0_svc+0x34/0xf4\n[ 59.397966] el0t_64_sync_handler+0xa0/0xe4\n[ 59.402143] el0t_64_sync+0x198/0x19c\n[ 59.405801] ---[ end trace 0000000000000000 ]---\n\nAddress this issue by moving the streaming preparation and cleanup to\nthe vb2 .prepare_streaming() and .unprepare_streaming() operations. This\nalso simplifies the driver by allowing direct usage of the\nv4l2_m2m_ioctl_streamon() and v4l2_m2m_ioctl_streamoff() helpers.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Micro 6.2:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-source-6.12.0-160000.8.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40165",
"url": "https://www.suse.com/security/cve/CVE-2025-40165"
},
{
"category": "external",
"summary": "SUSE Bug 1253405 for CVE-2025-40165",
"url": "https://bugzilla.suse.com/1253405"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Micro 6.2:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-source-6.12.0-160000.8.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.7,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Micro 6.2:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-source-6.12.0-160000.8.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-19T16:46:47Z",
"details": "moderate"
}
],
"title": "CVE-2025-40165"
},
{
"cve": "CVE-2025-40166",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40166"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\ndrm/xe/guc: Check GuC running state before deregistering exec queue\n\nIn normal operation, a registered exec queue is disabled and\nderegistered through the GuC, and freed only after the GuC confirms\ncompletion. However, if the driver is forced to unbind while the exec\nqueue is still running, the user may call exec_destroy() after the GuC\nhas already been stopped and CT communication disabled.\n\nIn this case, the driver cannot receive a response from the GuC,\npreventing proper cleanup of exec queue resources. Fix this by directly\nreleasing the resources when GuC is not running.\n\nHere is the failure dmesg log:\n\"\n[ 468.089581] ---[ end trace 0000000000000000 ]---\n[ 468.089608] pci 0000:03:00.0: [drm] *ERROR* GT0: GUC ID manager unclean (1/65535)\n[ 468.090558] pci 0000:03:00.0: [drm] GT0: total 65535\n[ 468.090562] pci 0000:03:00.0: [drm] GT0: used 1\n[ 468.090564] pci 0000:03:00.0: [drm] GT0: range 1..1 (1)\n[ 468.092716] ------------[ cut here ]------------\n[ 468.092719] WARNING: CPU: 14 PID: 4775 at drivers/gpu/drm/xe/xe_ttm_vram_mgr.c:298 ttm_vram_mgr_fini+0xf8/0x130 [xe]\n\"\n\nv2: use xe_uc_fw_is_running() instead of xe_guc_ct_enabled().\n As CT may go down and come back during VF migration.\n\n(cherry picked from commit 9b42321a02c50a12b2beb6ae9469606257fbecea)",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Micro 6.2:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-source-6.12.0-160000.8.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40166",
"url": "https://www.suse.com/security/cve/CVE-2025-40166"
},
{
"category": "external",
"summary": "SUSE Bug 1253433 for CVE-2025-40166",
"url": "https://bugzilla.suse.com/1253433"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Micro 6.2:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-source-6.12.0-160000.8.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Micro 6.2:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-source-6.12.0-160000.8.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-19T16:46:47Z",
"details": "moderate"
}
],
"title": "CVE-2025-40166"
},
{
"cve": "CVE-2025-40168",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40168"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nsmc: Use __sk_dst_get() and dst_dev_rcu() in smc_clc_prfx_match().\n\nsmc_clc_prfx_match() is called from smc_listen_work() and\nnot under RCU nor RTNL.\n\nUsing sk_dst_get(sk)-\u003edev could trigger UAF.\n\nLet\u0027s use __sk_dst_get() and dst_dev_rcu().\n\nNote that the returned value of smc_clc_prfx_match() is not\nused in the caller.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Micro 6.2:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-source-6.12.0-160000.8.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40168",
"url": "https://www.suse.com/security/cve/CVE-2025-40168"
},
{
"category": "external",
"summary": "SUSE Bug 1253427 for CVE-2025-40168",
"url": "https://bugzilla.suse.com/1253427"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Micro 6.2:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-source-6.12.0-160000.8.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Micro 6.2:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-source-6.12.0-160000.8.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-19T16:46:47Z",
"details": "moderate"
}
],
"title": "CVE-2025-40168"
},
{
"cve": "CVE-2025-40169",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40169"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nbpf: Reject negative offsets for ALU ops\n\nWhen verifying BPF programs, the check_alu_op() function validates\ninstructions with ALU operations. The \u0027offset\u0027 field in these\ninstructions is a signed 16-bit integer.\n\nThe existing check \u0027insn-\u003eoff \u003e 1\u0027 was intended to ensure the offset is\neither 0, or 1 for BPF_MOD/BPF_DIV. However, because \u0027insn-\u003eoff\u0027 is\nsigned, this check incorrectly accepts all negative values (e.g., -1).\n\nThis commit tightens the validation by changing the condition to\n\u0027(insn-\u003eoff != 0 \u0026\u0026 insn-\u003eoff != 1)\u0027. This ensures that any value\nother than the explicitly permitted 0 and 1 is rejected, hardening the\nverifier against malformed BPF programs.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Micro 6.2:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-source-6.12.0-160000.8.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40169",
"url": "https://www.suse.com/security/cve/CVE-2025-40169"
},
{
"category": "external",
"summary": "SUSE Bug 1253416 for CVE-2025-40169",
"url": "https://bugzilla.suse.com/1253416"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Micro 6.2:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-source-6.12.0-160000.8.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.8,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Micro 6.2:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-source-6.12.0-160000.8.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-19T16:46:47Z",
"details": "moderate"
}
],
"title": "CVE-2025-40169"
},
{
"cve": "CVE-2025-40171",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40171"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nnvmet-fc: move lsop put work to nvmet_fc_ls_req_op\n\nIt\u0027s possible for more than one async command to be in flight from\n__nvmet_fc_send_ls_req. For each command, a tgtport reference is taken.\n\nIn the current code, only one put work item is queued at a time, which\nresults in a leaked reference.\n\nTo fix this, move the work item to the nvmet_fc_ls_req_op struct, which\nalready tracks all resources related to the command.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Micro 6.2:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-source-6.12.0-160000.8.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40171",
"url": "https://www.suse.com/security/cve/CVE-2025-40171"
},
{
"category": "external",
"summary": "SUSE Bug 1253412 for CVE-2025-40171",
"url": "https://bugzilla.suse.com/1253412"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Micro 6.2:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-source-6.12.0-160000.8.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Micro 6.2:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-source-6.12.0-160000.8.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-19T16:46:47Z",
"details": "moderate"
}
],
"title": "CVE-2025-40171"
},
{
"cve": "CVE-2025-40172",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40172"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\naccel/qaic: Treat remaining == 0 as error in find_and_map_user_pages()\n\nCurrently, if find_and_map_user_pages() takes a DMA xfer request from the\nuser with a length field set to 0, or in a rare case, the host receives\nQAIC_TRANS_DMA_XFER_CONT from the device where resources-\u003exferred_dma_size\nis equal to the requested transaction size, the function will return 0\nbefore allocating an sgt or setting the fields of the dma_xfer struct.\nIn that case, encode_addr_size_pairs() will try to access the sgt which\nwill lead to a general protection fault.\n\nReturn an EINVAL in case the user provides a zero-sized ALP, or the device\nrequests continuation after all of the bytes have been transferred.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Micro 6.2:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-source-6.12.0-160000.8.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40172",
"url": "https://www.suse.com/security/cve/CVE-2025-40172"
},
{
"category": "external",
"summary": "SUSE Bug 1253424 for CVE-2025-40172",
"url": "https://bugzilla.suse.com/1253424"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Micro 6.2:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-source-6.12.0-160000.8.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Micro 6.2:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-source-6.12.0-160000.8.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-19T16:46:47Z",
"details": "moderate"
}
],
"title": "CVE-2025-40172"
},
{
"cve": "CVE-2025-40173",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40173"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nnet/ip6_tunnel: Prevent perpetual tunnel growth\n\nSimilarly to ipv4 tunnel, ipv6 version updates dev-\u003eneeded_headroom, too.\nWhile ipv4 tunnel headroom adjustment growth was limited in\ncommit 5ae1e9922bbd (\"net: ip_tunnel: prevent perpetual headroom growth\"),\nipv6 tunnel yet increases the headroom without any ceiling.\n\nReflect ipv4 tunnel headroom adjustment limit on ipv6 version.\n\nCredits to Francesco Ruggeri, who was originally debugging this issue\nand wrote local Arista-specific patch and a reproducer.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Micro 6.2:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-source-6.12.0-160000.8.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40173",
"url": "https://www.suse.com/security/cve/CVE-2025-40173"
},
{
"category": "external",
"summary": "SUSE Bug 1253421 for CVE-2025-40173",
"url": "https://bugzilla.suse.com/1253421"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Micro 6.2:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-source-6.12.0-160000.8.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.7,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Micro 6.2:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-source-6.12.0-160000.8.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-19T16:46:47Z",
"details": "moderate"
}
],
"title": "CVE-2025-40173"
},
{
"cve": "CVE-2025-40175",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40175"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nidpf: cleanup remaining SKBs in PTP flows\n\nWhen the driver requests Tx timestamp value, one of the first steps is\nto clone SKB using skb_get. It increases the reference counter for that\nSKB to prevent unexpected freeing by another component.\nHowever, there may be a case where the index is requested, SKB is\nassigned and never consumed by PTP flows - for example due to reset during\nrunning PTP apps.\n\nAdd a check in release timestamping function to verify if the SKB\nassigned to Tx timestamp latch was freed, and release remaining SKBs.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Micro 6.2:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-source-6.12.0-160000.8.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40175",
"url": "https://www.suse.com/security/cve/CVE-2025-40175"
},
{
"category": "external",
"summary": "SUSE Bug 1253426 for CVE-2025-40175",
"url": "https://bugzilla.suse.com/1253426"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Micro 6.2:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-source-6.12.0-160000.8.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.7,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Micro 6.2:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-source-6.12.0-160000.8.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-19T16:46:47Z",
"details": "moderate"
}
],
"title": "CVE-2025-40175"
},
{
"cve": "CVE-2025-40176",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40176"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\ntls: wait for pending async decryptions if tls_strp_msg_hold fails\n\nAsync decryption calls tls_strp_msg_hold to create a clone of the\ninput skb to hold references to the memory it uses. If we fail to\nallocate that clone, proceeding with async decryption can lead to\nvarious issues (UAF on the skb, writing into userspace memory after\nthe recv() call has returned).\n\nIn this case, wait for all pending decryption requests.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Micro 6.2:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-source-6.12.0-160000.8.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40176",
"url": "https://www.suse.com/security/cve/CVE-2025-40176"
},
{
"category": "external",
"summary": "SUSE Bug 1253425 for CVE-2025-40176",
"url": "https://bugzilla.suse.com/1253425"
},
{
"category": "external",
"summary": "SUSE Bug 1254100 for CVE-2025-40176",
"url": "https://bugzilla.suse.com/1254100"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Micro 6.2:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-source-6.12.0-160000.8.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Micro 6.2:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-source-6.12.0-160000.8.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-19T16:46:47Z",
"details": "important"
}
],
"title": "CVE-2025-40176"
},
{
"cve": "CVE-2025-40177",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40177"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\naccel/qaic: Fix bootlog initialization ordering\n\nAs soon as we queue MHI buffers to receive the bootlog from the device,\nwe could be receiving data. Therefore all the resources needed to\nprocess that data need to be setup prior to queuing the buffers.\n\nWe currently initialize some of the resources after queuing the buffers\nwhich creates a race between the probe() and any data that comes back\nfrom the device. If the uninitialized resources are accessed, we could\nsee page faults.\n\nFix the init ordering to close the race.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Micro 6.2:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-source-6.12.0-160000.8.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40177",
"url": "https://www.suse.com/security/cve/CVE-2025-40177"
},
{
"category": "external",
"summary": "SUSE Bug 1253443 for CVE-2025-40177",
"url": "https://bugzilla.suse.com/1253443"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Micro 6.2:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-source-6.12.0-160000.8.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Micro 6.2:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-source-6.12.0-160000.8.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-19T16:46:47Z",
"details": "moderate"
}
],
"title": "CVE-2025-40177"
},
{
"cve": "CVE-2025-40178",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40178"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\npid: Add a judgment for ns null in pid_nr_ns\n\n__task_pid_nr_ns\n ns = task_active_pid_ns(current);\n pid_nr_ns(rcu_dereference(*task_pid_ptr(task, type)), ns);\n if (pid \u0026\u0026 ns-\u003elevel \u003c= pid-\u003elevel) {\n\nSometimes null is returned for task_active_pid_ns. Then it will trigger kernel panic in pid_nr_ns.\n\nFor example:\n\tUnable to handle kernel NULL pointer dereference at virtual address 0000000000000058\n\tMem abort info:\n\tESR = 0x0000000096000007\n\tEC = 0x25: DABT (current EL), IL = 32 bits\n\tSET = 0, FnV = 0\n\tEA = 0, S1PTW = 0\n\tFSC = 0x07: level 3 translation fault\n\tData abort info:\n\tISV = 0, ISS = 0x00000007, ISS2 = 0x00000000\n\tCM = 0, WnR = 0, TnD = 0, TagAccess = 0\n\tGCS = 0, Overlay = 0, DirtyBit = 0, Xs = 0\n\tuser pgtable: 4k pages, 39-bit VAs, pgdp=00000002175aa000\n\t[0000000000000058] pgd=08000002175ab003, p4d=08000002175ab003, pud=08000002175ab003, pmd=08000002175be003, pte=0000000000000000\n\tpstate: 834000c5 (Nzcv daIF +PAN -UAO +TCO +DIT -SSBS BTYPE=--)\n\tpc : __task_pid_nr_ns+0x74/0xd0\n\tlr : __task_pid_nr_ns+0x24/0xd0\n\tsp : ffffffc08001bd10\n\tx29: ffffffc08001bd10 x28: ffffffd4422b2000 x27: 0000000000000001\n\tx26: ffffffd442821168 x25: ffffffd442821000 x24: 00000f89492eab31\n\tx23: 00000000000000c0 x22: ffffff806f5693c0 x21: ffffff806f5693c0\n\tx20: 0000000000000001 x19: 0000000000000000 x18: 0000000000000000\n\tx17: 00000000529c6ef0 x16: 00000000529c6ef0 x15: 00000000023a1adc\n\tx14: 0000000000000003 x13: 00000000007ef6d8 x12: 001167c391c78800\n\tx11: 00ffffffffffffff x10: 0000000000000000 x9 : 0000000000000001\n\tx8 : ffffff80816fa3c0 x7 : 0000000000000000 x6 : 49534d702d535449\n\tx5 : ffffffc080c4c2c0 x4 : ffffffd43ee128c8 x3 : ffffffd43ee124dc\n\tx2 : 0000000000000000 x1 : 0000000000000001 x0 : ffffff806f5693c0\n\tCall trace:\n\t__task_pid_nr_ns+0x74/0xd0\n\t...\n\t__handle_irq_event_percpu+0xd4/0x284\n\thandle_irq_event+0x48/0xb0\n\thandle_fasteoi_irq+0x160/0x2d8\n\tgeneric_handle_domain_irq+0x44/0x60\n\tgic_handle_irq+0x4c/0x114\n\tcall_on_irq_stack+0x3c/0x74\n\tdo_interrupt_handler+0x4c/0x84\n\tel1_interrupt+0x34/0x58\n\tel1h_64_irq_handler+0x18/0x24\n\tel1h_64_irq+0x68/0x6c\n\taccount_kernel_stack+0x60/0x144\n\texit_task_stack_account+0x1c/0x80\n\tdo_exit+0x7e4/0xaf8\n\t...\n\tget_signal+0x7bc/0x8d8\n\tdo_notify_resume+0x128/0x828\n\tel0_svc+0x6c/0x70\n\tel0t_64_sync_handler+0x68/0xbc\n\tel0t_64_sync+0x1a8/0x1ac\n\tCode: 35fffe54 911a02a8 f9400108 b4000128 (b9405a69)\n\t---[ end trace 0000000000000000 ]---\n\tKernel panic - not syncing: Oops: Fatal exception in interrupt",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Micro 6.2:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-source-6.12.0-160000.8.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40178",
"url": "https://www.suse.com/security/cve/CVE-2025-40178"
},
{
"category": "external",
"summary": "SUSE Bug 1253463 for CVE-2025-40178",
"url": "https://bugzilla.suse.com/1253463"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Micro 6.2:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-source-6.12.0-160000.8.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Micro 6.2:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-source-6.12.0-160000.8.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-19T16:46:47Z",
"details": "moderate"
}
],
"title": "CVE-2025-40178"
},
{
"cve": "CVE-2025-40180",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40180"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nmailbox: zynqmp-ipi: Fix out-of-bounds access in mailbox cleanup loop\n\nThe cleanup loop was starting at the wrong array index, causing\nout-of-bounds access.\nStart the loop at the correct index for zero-indexed arrays to prevent\naccessing memory beyond the allocated array bounds.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Micro 6.2:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-source-6.12.0-160000.8.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40180",
"url": "https://www.suse.com/security/cve/CVE-2025-40180"
},
{
"category": "external",
"summary": "SUSE Bug 1253440 for CVE-2025-40180",
"url": "https://bugzilla.suse.com/1253440"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Micro 6.2:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-source-6.12.0-160000.8.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Micro 6.2:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-source-6.12.0-160000.8.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-19T16:46:47Z",
"details": "moderate"
}
],
"title": "CVE-2025-40180"
},
{
"cve": "CVE-2025-40183",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40183"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nbpf: Fix metadata_dst leak __bpf_redirect_neigh_v{4,6}\n\nCilium has a BPF egress gateway feature which forces outgoing K8s Pod\ntraffic to pass through dedicated egress gateways which then SNAT the\ntraffic in order to interact with stable IPs outside the cluster.\n\nThe traffic is directed to the gateway via vxlan tunnel in collect md\nmode. A recent BPF change utilized the bpf_redirect_neigh() helper to\nforward packets after the arrival and decap on vxlan, which turned out\nover time that the kmalloc-256 slab usage in kernel was ever-increasing.\n\nThe issue was that vxlan allocates the metadata_dst object and attaches\nit through a fake dst entry to the skb. The latter was never released\nthough given bpf_redirect_neigh() was merely setting the new dst entry\nvia skb_dst_set() without dropping an existing one first.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Micro 6.2:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-source-6.12.0-160000.8.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40183",
"url": "https://www.suse.com/security/cve/CVE-2025-40183"
},
{
"category": "external",
"summary": "SUSE Bug 1253441 for CVE-2025-40183",
"url": "https://bugzilla.suse.com/1253441"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Micro 6.2:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-source-6.12.0-160000.8.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
"version": "3.1"
},
"products": [
"SUSE Linux Micro 6.2:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-source-6.12.0-160000.8.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-19T16:46:47Z",
"details": "moderate"
}
],
"title": "CVE-2025-40183"
},
{
"cve": "CVE-2025-40185",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40185"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nice: ice_adapter: release xa entry on adapter allocation failure\n\nWhen ice_adapter_new() fails, the reserved XArray entry created by\nxa_insert() is not released. This causes subsequent insertions at\nthe same index to return -EBUSY, potentially leading to\nNULL pointer dereferences.\n\nReorder the operations as suggested by Przemek Kitszel:\n1. Check if adapter already exists (xa_load)\n2. Reserve the XArray slot (xa_reserve)\n3. Allocate the adapter (ice_adapter_new)\n4. Store the adapter (xa_store)",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Micro 6.2:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-source-6.12.0-160000.8.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40185",
"url": "https://www.suse.com/security/cve/CVE-2025-40185"
},
{
"category": "external",
"summary": "SUSE Bug 1253394 for CVE-2025-40185",
"url": "https://bugzilla.suse.com/1253394"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Micro 6.2:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-source-6.12.0-160000.8.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Micro 6.2:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-source-6.12.0-160000.8.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-19T16:46:47Z",
"details": "moderate"
}
],
"title": "CVE-2025-40185"
},
{
"cve": "CVE-2025-40186",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40186"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\ntcp: Don\u0027t call reqsk_fastopen_remove() in tcp_conn_request().\n\nsyzbot reported the splat below in tcp_conn_request(). [0]\n\nIf a listener is close()d while a TFO socket is being processed in\ntcp_conn_request(), inet_csk_reqsk_queue_add() does not set reqsk-\u003esk\nand calls inet_child_forget(), which calls tcp_disconnect() for the\nTFO socket.\n\nAfter the cited commit, tcp_disconnect() calls reqsk_fastopen_remove(),\nwhere reqsk_put() is called due to !reqsk-\u003esk.\n\nThen, reqsk_fastopen_remove() in tcp_conn_request() decrements the\nlast req-\u003ersk_refcnt and frees reqsk, and __reqsk_free() at the\ndrop_and_free label causes the refcount underflow for the listener\nand double-free of the reqsk.\n\nLet\u0027s remove reqsk_fastopen_remove() in tcp_conn_request().\n\nNote that other callers make sure tp-\u003efastopen_rsk is not NULL.\n\n[0]:\nrefcount_t: underflow; use-after-free.\nWARNING: CPU: 12 PID: 5563 at lib/refcount.c:28 refcount_warn_saturate (lib/refcount.c:28)\nModules linked in:\nCPU: 12 UID: 0 PID: 5563 Comm: syz-executor Not tainted syzkaller #0 PREEMPT(full)\nHardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025\nRIP: 0010:refcount_warn_saturate (lib/refcount.c:28)\nCode: ab e8 8e b4 98 ff 0f 0b c3 cc cc cc cc cc 80 3d a4 e4 d6 01 00 75 9c c6 05 9b e4 d6 01 01 48 c7 c7 e8 df fb ab e8 6a b4 98 ff \u003c0f\u003e 0b e9 03 5b 76 00 cc 80 3d 7d e4 d6 01 00 0f 85 74 ff ff ff c6\nRSP: 0018:ffffa79fc0304a98 EFLAGS: 00010246\nRAX: d83af4db1c6b3900 RBX: ffff9f65c7a69020 RCX: d83af4db1c6b3900\nRDX: 0000000000000000 RSI: 00000000ffff7fff RDI: ffffffffac78a280\nRBP: 000000009d781b60 R08: 0000000000007fff R09: ffffffffac6ca280\nR10: 0000000000017ffd R11: 0000000000000004 R12: ffff9f65c7b4f100\nR13: ffff9f65c7d23c00 R14: ffff9f65c7d26000 R15: ffff9f65c7a64ef8\nFS: 00007f9f962176c0(0000) GS:ffff9f65fcf00000(0000) knlGS:0000000000000000\nCS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033\nCR2: 0000200000000180 CR3: 000000000dbbe006 CR4: 0000000000372ef0\nCall Trace:\n \u003cIRQ\u003e\n tcp_conn_request (./include/linux/refcount.h:400 ./include/linux/refcount.h:432 ./include/linux/refcount.h:450 ./include/net/sock.h:1965 ./include/net/request_sock.h:131 net/ipv4/tcp_input.c:7301)\n tcp_rcv_state_process (net/ipv4/tcp_input.c:6708)\n tcp_v6_do_rcv (net/ipv6/tcp_ipv6.c:1670)\n tcp_v6_rcv (net/ipv6/tcp_ipv6.c:1906)\n ip6_protocol_deliver_rcu (net/ipv6/ip6_input.c:438)\n ip6_input (net/ipv6/ip6_input.c:500)\n ipv6_rcv (net/ipv6/ip6_input.c:311)\n __netif_receive_skb (net/core/dev.c:6104)\n process_backlog (net/core/dev.c:6456)\n __napi_poll (net/core/dev.c:7506)\n net_rx_action (net/core/dev.c:7569 net/core/dev.c:7696)\n handle_softirqs (kernel/softirq.c:579)\n do_softirq (kernel/softirq.c:480)\n \u003c/IRQ\u003e",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Micro 6.2:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-source-6.12.0-160000.8.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40186",
"url": "https://www.suse.com/security/cve/CVE-2025-40186"
},
{
"category": "external",
"summary": "SUSE Bug 1253438 for CVE-2025-40186",
"url": "https://bugzilla.suse.com/1253438"
},
{
"category": "external",
"summary": "SUSE Bug 1253439 for CVE-2025-40186",
"url": "https://bugzilla.suse.com/1253439"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Micro 6.2:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-source-6.12.0-160000.8.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Micro 6.2:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-source-6.12.0-160000.8.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-19T16:46:47Z",
"details": "important"
}
],
"title": "CVE-2025-40186"
},
{
"cve": "CVE-2025-40187",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40187"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nnet/sctp: fix a null dereference in sctp_disposition sctp_sf_do_5_1D_ce()\n\nIf new_asoc-\u003epeer.adaptation_ind=0 and sctp_ulpevent_make_authkey=0\nand sctp_ulpevent_make_authkey() returns 0, then the variable\nai_ev remains zero and the zero will be dereferenced\nin the sctp_ulpevent_free() function.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Micro 6.2:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-source-6.12.0-160000.8.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40187",
"url": "https://www.suse.com/security/cve/CVE-2025-40187"
},
{
"category": "external",
"summary": "SUSE Bug 1253647 for CVE-2025-40187",
"url": "https://bugzilla.suse.com/1253647"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Micro 6.2:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-source-6.12.0-160000.8.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.1,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Micro 6.2:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-source-6.12.0-160000.8.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-19T16:46:47Z",
"details": "moderate"
}
],
"title": "CVE-2025-40187"
},
{
"cve": "CVE-2025-40188",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40188"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\npwm: berlin: Fix wrong register in suspend/resume\n\nThe \u0027enable\u0027 register should be BERLIN_PWM_EN rather than\nBERLIN_PWM_ENABLE, otherwise, the driver accesses wrong address, there\nwill be cpu exception then kernel panic during suspend/resume.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Micro 6.2:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-source-6.12.0-160000.8.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40188",
"url": "https://www.suse.com/security/cve/CVE-2025-40188"
},
{
"category": "external",
"summary": "SUSE Bug 1253449 for CVE-2025-40188",
"url": "https://bugzilla.suse.com/1253449"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Micro 6.2:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-source-6.12.0-160000.8.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Micro 6.2:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-source-6.12.0-160000.8.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-19T16:46:47Z",
"details": "moderate"
}
],
"title": "CVE-2025-40188"
},
{
"cve": "CVE-2025-40192",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40192"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nRevert \"ipmi: fix msg stack when IPMI is disconnected\"\n\nThis reverts commit c608966f3f9c2dca596967501d00753282b395fc.\n\nThis patch has a subtle bug that can cause the IPMI driver to go into an\ninfinite loop if the BMC misbehaves in a certain way. Apparently\ncertain BMCs do misbehave this way because several reports have come in\nrecently about this.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Micro 6.2:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-source-6.12.0-160000.8.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40192",
"url": "https://www.suse.com/security/cve/CVE-2025-40192"
},
{
"category": "external",
"summary": "SUSE Bug 1253622 for CVE-2025-40192",
"url": "https://bugzilla.suse.com/1253622"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Micro 6.2:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-source-6.12.0-160000.8.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Micro 6.2:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-source-6.12.0-160000.8.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-19T16:46:47Z",
"details": "moderate"
}
],
"title": "CVE-2025-40192"
},
{
"cve": "CVE-2025-40194",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40194"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\ncpufreq: intel_pstate: Fix object lifecycle issue in update_qos_request()\n\nThe cpufreq_cpu_put() call in update_qos_request() takes place too early\nbecause the latter subsequently calls freq_qos_update_request() that\nindirectly accesses the policy object in question through the QoS request\nobject passed to it.\n\nFortunately, update_qos_request() is called under intel_pstate_driver_lock,\nso this issue does not matter for changing the intel_pstate operation\nmode, but it theoretically can cause a crash to occur on CPU device hot\nremoval (which currently can only happen in virt, but it is formally\nsupported nevertheless).\n\nAddress this issue by modifying update_qos_request() to drop the\nreference to the policy later.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Micro 6.2:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-source-6.12.0-160000.8.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40194",
"url": "https://www.suse.com/security/cve/CVE-2025-40194"
},
{
"category": "external",
"summary": "SUSE Bug 1253445 for CVE-2025-40194",
"url": "https://bugzilla.suse.com/1253445"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Micro 6.2:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-source-6.12.0-160000.8.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.7,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Micro 6.2:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-source-6.12.0-160000.8.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-19T16:46:47Z",
"details": "moderate"
}
],
"title": "CVE-2025-40194"
},
{
"cve": "CVE-2025-40196",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40196"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nfs: quota: create dedicated workqueue for quota_release_work\n\nThere is a kernel panic due to WARN_ONCE when panic_on_warn is set.\n\nThis issue occurs when writeback is triggered due to sync call for an\nopened file(ie, writeback reason is WB_REASON_SYNC). When f2fs balance\nis needed at sync path, flush for quota_release_work is triggered.\nBy default quota_release_work is queued to \"events_unbound\" queue which\ndoes not have WQ_MEM_RECLAIM flag. During f2fs balance \"writeback\"\nworkqueue tries to flush quota_release_work causing kernel panic due to\nMEM_RECLAIM flag mismatch errors.\n\nThis patch creates dedicated workqueue with WQ_MEM_RECLAIM flag\nfor work quota_release_work.\n\n------------[ cut here ]------------\nWARNING: CPU: 4 PID: 14867 at kernel/workqueue.c:3721 check_flush_dependency+0x13c/0x148\nCall trace:\n check_flush_dependency+0x13c/0x148\n __flush_work+0xd0/0x398\n flush_delayed_work+0x44/0x5c\n dquot_writeback_dquots+0x54/0x318\n f2fs_do_quota_sync+0xb8/0x1a8\n f2fs_write_checkpoint+0x3cc/0x99c\n f2fs_gc+0x190/0x750\n f2fs_balance_fs+0x110/0x168\n f2fs_write_single_data_page+0x474/0x7dc\n f2fs_write_data_pages+0x7d0/0xd0c\n do_writepages+0xe0/0x2f4\n __writeback_single_inode+0x44/0x4ac\n writeback_sb_inodes+0x30c/0x538\n wb_writeback+0xf4/0x440\n wb_workfn+0x128/0x5d4\n process_scheduled_works+0x1c4/0x45c\n worker_thread+0x32c/0x3e8\n kthread+0x11c/0x1b0\n ret_from_fork+0x10/0x20\nKernel panic - not syncing: kernel: panic_on_warn set ...",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Micro 6.2:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-source-6.12.0-160000.8.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40196",
"url": "https://www.suse.com/security/cve/CVE-2025-40196"
},
{
"category": "external",
"summary": "SUSE Bug 1253624 for CVE-2025-40196",
"url": "https://bugzilla.suse.com/1253624"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Micro 6.2:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-source-6.12.0-160000.8.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 3.3,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L",
"version": "3.1"
},
"products": [
"SUSE Linux Micro 6.2:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-source-6.12.0-160000.8.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-19T16:46:47Z",
"details": "low"
}
],
"title": "CVE-2025-40196"
},
{
"cve": "CVE-2025-40197",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40197"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nmedia: mc: Clear minor number before put device\n\nThe device minor should not be cleared after the device is released.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Micro 6.2:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-source-6.12.0-160000.8.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40197",
"url": "https://www.suse.com/security/cve/CVE-2025-40197"
},
{
"category": "external",
"summary": "SUSE Bug 1253450 for CVE-2025-40197",
"url": "https://bugzilla.suse.com/1253450"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Micro 6.2:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-source-6.12.0-160000.8.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Micro 6.2:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-source-6.12.0-160000.8.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-19T16:46:47Z",
"details": "moderate"
}
],
"title": "CVE-2025-40197"
},
{
"cve": "CVE-2025-40198",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40198"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\next4: avoid potential buffer over-read in parse_apply_sb_mount_options()\n\nUnlike other strings in the ext4 superblock, we rely on tune2fs to\nmake sure s_mount_opts is NUL terminated. Harden\nparse_apply_sb_mount_options() by treating s_mount_opts as a potential\n__nonstring.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Micro 6.2:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-source-6.12.0-160000.8.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40198",
"url": "https://www.suse.com/security/cve/CVE-2025-40198"
},
{
"category": "external",
"summary": "SUSE Bug 1253453 for CVE-2025-40198",
"url": "https://bugzilla.suse.com/1253453"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Micro 6.2:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-source-6.12.0-160000.8.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Micro 6.2:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-source-6.12.0-160000.8.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-19T16:46:47Z",
"details": "moderate"
}
],
"title": "CVE-2025-40198"
},
{
"cve": "CVE-2025-40200",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40200"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nSquashfs: reject negative file sizes in squashfs_read_inode()\n\nSyskaller reports a \"WARNING in ovl_copy_up_file\" in overlayfs.\n\nThis warning is ultimately caused because the underlying Squashfs file\nsystem returns a file with a negative file size.\n\nThis commit checks for a negative file size and returns EINVAL.\n\n[phillip@squashfs.org.uk: only need to check 64 bit quantity]",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Micro 6.2:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-source-6.12.0-160000.8.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40200",
"url": "https://www.suse.com/security/cve/CVE-2025-40200"
},
{
"category": "external",
"summary": "SUSE Bug 1253448 for CVE-2025-40200",
"url": "https://bugzilla.suse.com/1253448"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Micro 6.2:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-source-6.12.0-160000.8.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Micro 6.2:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-source-6.12.0-160000.8.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-19T16:46:47Z",
"details": "moderate"
}
],
"title": "CVE-2025-40200"
},
{
"cve": "CVE-2025-40201",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40201"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nkernel/sys.c: fix the racy usage of task_lock(tsk-\u003egroup_leader) in sys_prlimit64() paths\n\nThe usage of task_lock(tsk-\u003egroup_leader) in sys_prlimit64()-\u003edo_prlimit()\npath is very broken.\n\nsys_prlimit64() does get_task_struct(tsk) but this only protects task_struct\nitself. If tsk != current and tsk is not a leader, this process can exit/exec\nand task_lock(tsk-\u003egroup_leader) may use the already freed task_struct.\n\nAnother problem is that sys_prlimit64() can race with mt-exec which changes\n-\u003egroup_leader. In this case do_prlimit() may take the wrong lock, or (worse)\n-\u003egroup_leader may change between task_lock() and task_unlock().\n\nChange sys_prlimit64() to take tasklist_lock when necessary. This is not\nnice, but I don\u0027t see a better fix for -stable.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Micro 6.2:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-source-6.12.0-160000.8.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40201",
"url": "https://www.suse.com/security/cve/CVE-2025-40201"
},
{
"category": "external",
"summary": "SUSE Bug 1253455 for CVE-2025-40201",
"url": "https://bugzilla.suse.com/1253455"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Micro 6.2:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-source-6.12.0-160000.8.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Micro 6.2:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-source-6.12.0-160000.8.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-19T16:46:47Z",
"details": "moderate"
}
],
"title": "CVE-2025-40201"
},
{
"cve": "CVE-2025-40202",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40202"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nipmi: Rework user message limit handling\n\nThe limit on the number of user messages had a number of issues,\nimproper counting in some cases and a use after free.\n\nRestructure how this is all done to handle more in the receive message\nallocation routine, so all refcouting and user message limit counts\nare done in that routine. It\u0027s a lot cleaner and safer.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Micro 6.2:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-source-6.12.0-160000.8.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40202",
"url": "https://www.suse.com/security/cve/CVE-2025-40202"
},
{
"category": "external",
"summary": "SUSE Bug 1253451 for CVE-2025-40202",
"url": "https://bugzilla.suse.com/1253451"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Micro 6.2:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-source-6.12.0-160000.8.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Micro 6.2:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-source-6.12.0-160000.8.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-19T16:46:47Z",
"details": "moderate"
}
],
"title": "CVE-2025-40202"
},
{
"cve": "CVE-2025-40203",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40203"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nlistmount: don\u0027t call path_put() under namespace semaphore\n\nMassage listmount() and make sure we don\u0027t call path_put() under the\nnamespace semaphore. If we put the last reference we\u0027re fscked.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Micro 6.2:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-source-6.12.0-160000.8.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40203",
"url": "https://www.suse.com/security/cve/CVE-2025-40203"
},
{
"category": "external",
"summary": "SUSE Bug 1253457 for CVE-2025-40203",
"url": "https://bugzilla.suse.com/1253457"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Micro 6.2:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-source-6.12.0-160000.8.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Micro 6.2:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-source-6.12.0-160000.8.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-19T16:46:47Z",
"details": "moderate"
}
],
"title": "CVE-2025-40203"
},
{
"cve": "CVE-2025-40204",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40204"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nsctp: Fix MAC comparison to be constant-time\n\nTo prevent timing attacks, MACs need to be compared in constant time.\nUse the appropriate helper function for this.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Micro 6.2:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-source-6.12.0-160000.8.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40204",
"url": "https://www.suse.com/security/cve/CVE-2025-40204"
},
{
"category": "external",
"summary": "SUSE Bug 1253436 for CVE-2025-40204",
"url": "https://bugzilla.suse.com/1253436"
},
{
"category": "external",
"summary": "SUSE Bug 1253437 for CVE-2025-40204",
"url": "https://bugzilla.suse.com/1253437"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Micro 6.2:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-source-6.12.0-160000.8.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"SUSE Linux Micro 6.2:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-source-6.12.0-160000.8.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-19T16:46:47Z",
"details": "important"
}
],
"title": "CVE-2025-40204"
},
{
"cve": "CVE-2025-40205",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40205"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nbtrfs: avoid potential out-of-bounds in btrfs_encode_fh()\n\nThe function btrfs_encode_fh() does not properly account for the three\ncases it handles.\n\nBefore writing to the file handle (fh), the function only returns to the\nuser BTRFS_FID_SIZE_NON_CONNECTABLE (5 dwords, 20 bytes) or\nBTRFS_FID_SIZE_CONNECTABLE (8 dwords, 32 bytes).\n\nHowever, when a parent exists and the root ID of the parent and the\ninode are different, the function writes BTRFS_FID_SIZE_CONNECTABLE_ROOT\n(10 dwords, 40 bytes).\n\nIf *max_len is not large enough, this write goes out of bounds because\nBTRFS_FID_SIZE_CONNECTABLE_ROOT is greater than\nBTRFS_FID_SIZE_CONNECTABLE originally returned.\n\nThis results in an 8-byte out-of-bounds write at\nfid-\u003eparent_root_objectid = parent_root_id.\n\nA previous attempt to fix this issue was made but was lost.\n\nhttps://lore.kernel.org/all/4CADAEEC020000780001B32C@vpn.id2.novell.com/\n\nAlthough this issue does not seem to be easily triggerable, it is a\npotential memory corruption bug that should be fixed. This patch\nresolves the issue by ensuring the function returns the appropriate size\nfor all three cases and validates that *max_len is large enough before\nwriting any data.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Micro 6.2:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-source-6.12.0-160000.8.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40205",
"url": "https://www.suse.com/security/cve/CVE-2025-40205"
},
{
"category": "external",
"summary": "SUSE Bug 1253456 for CVE-2025-40205",
"url": "https://bugzilla.suse.com/1253456"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Micro 6.2:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-source-6.12.0-160000.8.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Micro 6.2:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-source-6.12.0-160000.8.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-19T16:46:47Z",
"details": "moderate"
}
],
"title": "CVE-2025-40205"
},
{
"cve": "CVE-2025-40206",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40206"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nnetfilter: nft_objref: validate objref and objrefmap expressions\n\nReferencing a synproxy stateful object from OUTPUT hook causes kernel\ncrash due to infinite recursive calls:\n\nBUG: TASK stack guard page was hit at 000000008bda5b8c (stack is 000000003ab1c4a5..00000000494d8b12)\n[...]\nCall Trace:\n __find_rr_leaf+0x99/0x230\n fib6_table_lookup+0x13b/0x2d0\n ip6_pol_route+0xa4/0x400\n fib6_rule_lookup+0x156/0x240\n ip6_route_output_flags+0xc6/0x150\n __nf_ip6_route+0x23/0x50\n synproxy_send_tcp_ipv6+0x106/0x200\n synproxy_send_client_synack_ipv6+0x1aa/0x1f0\n nft_synproxy_do_eval+0x263/0x310\n nft_do_chain+0x5a8/0x5f0 [nf_tables\n nft_do_chain_inet+0x98/0x110\n nf_hook_slow+0x43/0xc0\n __ip6_local_out+0xf0/0x170\n ip6_local_out+0x17/0x70\n synproxy_send_tcp_ipv6+0x1a2/0x200\n synproxy_send_client_synack_ipv6+0x1aa/0x1f0\n[...]\n\nImplement objref and objrefmap expression validate functions.\n\nCurrently, only NFT_OBJECT_SYNPROXY object type requires validation.\nThis will also handle a jump to a chain using a synproxy object from the\nOUTPUT hook.\n\nNow when trying to reference a synproxy object in the OUTPUT hook, nft\nwill produce the following error:\n\nsynproxy_crash.nft: Error: Could not process rule: Operation not supported\n synproxy name mysynproxy\n ^^^^^^^^^^^^^^^^^^^^^^^^",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Micro 6.2:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-source-6.12.0-160000.8.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40206",
"url": "https://www.suse.com/security/cve/CVE-2025-40206"
},
{
"category": "external",
"summary": "SUSE Bug 1253393 for CVE-2025-40206",
"url": "https://bugzilla.suse.com/1253393"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Micro 6.2:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-source-6.12.0-160000.8.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.1,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Micro 6.2:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-source-6.12.0-160000.8.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-19T16:46:47Z",
"details": "moderate"
}
],
"title": "CVE-2025-40206"
},
{
"cve": "CVE-2025-40207",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40207"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nmedia: v4l2-subdev: Fix alloc failure check in v4l2_subdev_call_state_try()\n\nv4l2_subdev_call_state_try() macro allocates a subdev state with\n__v4l2_subdev_state_alloc(), but does not check the returned value. If\n__v4l2_subdev_state_alloc fails, it returns an ERR_PTR, and that would\ncause v4l2_subdev_call_state_try() to crash.\n\nAdd proper error handling to v4l2_subdev_call_state_try().",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Micro 6.2:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-source-6.12.0-160000.8.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40207",
"url": "https://www.suse.com/security/cve/CVE-2025-40207"
},
{
"category": "external",
"summary": "SUSE Bug 1253395 for CVE-2025-40207",
"url": "https://bugzilla.suse.com/1253395"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Micro 6.2:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-source-6.12.0-160000.8.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Micro 6.2:kernel-64kb-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-devel-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-macros-6.12.0-160000.8.1.noarch",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-livepatch-6.12.0-160000.8.1.x86_64",
"SUSE Linux Micro 6.2:kernel-source-6.12.0-160000.8.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-19T16:46:47Z",
"details": "moderate"
}
],
"title": "CVE-2025-40207"
}
]
}
OPENSUSE-SU-2025:20172-1
Vulnerability from csaf_opensuse - Published: 2025-12-19 17:38 - Updated: 2025-12-19 17:38| URL | Category | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
{
"document": {
"aggregate_severity": {
"namespace": "https://www.suse.com/support/security/rating/",
"text": "important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright 2024 SUSE LLC. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Security update for the Linux Kernel",
"title": "Title of the patch"
},
{
"category": "description",
"text": "\nThe SUSE Linux Enterprise 16.0 kernel was updated to fix various security issues\n\nThe following security issues were fixed:\n\n- CVE-2022-50253: bpf: make sure skb-\u003elen != 0 when redirecting to a tunneling device (bsc#1249912).\n- CVE-2025-37916: pds_core: remove write-after-free of client_id (bsc#1243474).\n- CVE-2025-38084: mm/hugetlb: unshare page tables during VMA split, not before (bsc#1245431 bsc#1245498).\n- CVE-2025-38085: mm/hugetlb: fix huge_pmd_unshare() vs GUP-fast race (bsc#1245431 bsc#1245499).\n- CVE-2025-38321: smb: Log an error when close_all_cached_dirs fails (bsc#1246328).\n- CVE-2025-38728: smb3: fix for slab out of bounds on mount to ksmbd (bsc#1249256).\n- CVE-2025-39805: net: macb: fix unregister_netdev call order in macb_remove() (bsc#1249982).\n- CVE-2025-39819: fs/smb: Fix inconsistent refcnt update (bsc#1250176).\n- CVE-2025-39822: io_uring/kbuf: fix signedness in this_len calculation (bsc#1250034).\n- CVE-2025-39831: fbnic: Move phylink resume out of service_task and into open/close (bsc#1249977).\n- CVE-2025-39859: ptp: ocp: fix use-after-free bugs causing by ptp_ocp_watchdog (bsc#1250252).\n- CVE-2025-39897: net: xilinx: axienet: Add error handling for RX metadata pointer retrieval (bsc#1250746).\n- CVE-2025-39917: bpf: Fix out-of-bounds dynptr write in bpf_crypto_crypt (bsc#1250723).\n- CVE-2025-39944: octeontx2-pf: Fix use-after-free bugs in otx2_sync_tstamp() (bsc#1251120).\n- CVE-2025-39961: iommu/amd/pgtbl: Fix possible race while increase page table level (bsc#1251817).\n- CVE-2025-39980: nexthop: Forbid FDB status change while nexthop is in a group (bsc#1252063).\n- CVE-2025-39990: bpf: Check the helper function is valid in get_helper_proto (bsc#1252054).\n- CVE-2025-40001: scsi: mvsas: Fix use-after-free bugs in mvs_work_queue (bsc#1252303).\n- CVE-2025-40003: net: mscc: ocelot: Fix use-after-free caused by cyclic delayed work (bsc#1252301).\n- CVE-2025-40006: mm/hugetlb: fix folio is still mapped when deleted (bsc#1252342).\n- CVE-2025-40021: tracing: dynevent: Add a missing lockdown check on dynevent (bsc#1252681).\n- CVE-2025-40024: vhost: Take a reference on the task in struct vhost_task (bsc#1252686).\n- CVE-2025-40027: net/9p: fix double req put in p9_fd_cancelled (bsc#1252763).\n- CVE-2025-40031: tee: fix register_shm_helper() (bsc#1252779).\n- CVE-2025-40033: remoteproc: pru: Fix potential NULL pointer dereference in pru_rproc_set_ctable() (bsc#1252824).\n- CVE-2025-40038: KVM: SVM: Skip fastpath emulation on VM-Exit if next RIP isn\u0027t valid (bsc#1252817).\n- CVE-2025-40047: io_uring/waitid: always prune wait queue entry in io_waitid_wait() (bsc#1252790).\n- CVE-2025-40053: net: dlink: handle copy_thresh allocation failure (bsc#1252808).\n- CVE-2025-40055: ocfs2: fix double free in user_cluster_connect() (bsc#1252821).\n- CVE-2025-40059: coresight: Fix incorrect handling for return value of devm_kzalloc (bsc#1252809).\n- CVE-2025-40064: smc: Fix use-after-free in __pnet_find_base_ndev() (bsc#1252845).\n- CVE-2025-40070: pps: fix warning in pps_register_cdev when register device fail (bsc#1252836).\n- CVE-2025-40074: tcp: convert to dev_net_rcu() (bsc#1252794).\n- CVE-2025-40075: tcp_metrics: use dst_dev_net_rcu() (bsc#1252795).\n- CVE-2025-40081: perf: arm_spe: Prevent overflow in PERF_IDX2OFF() (bsc#1252776).\n- CVE-2025-40083: net/sched: sch_qfq: Fix null-deref in agg_dequeue (bsc#1252912).\n- CVE-2025-40086: drm/xe: Don\u0027t allow evicting of BOs in same VM in array of VM binds (bsc#1252923).\n- CVE-2025-40098: ALSA: hda: cs35l41: Fix NULL pointer dereference in cs35l41_get_acpi_mute_state() (bsc#1252917).\n- CVE-2025-40101: btrfs: fix memory leaks when rejecting a non SINGLE data profile without an RST (bsc#1252901).\n- CVE-2025-40102: KVM: arm64: Prevent access to vCPU events before init (bsc#1252919).\n- CVE-2025-40105: vfs: Don\u0027t leak disconnected dentries on umount (bsc#1252928).\n- CVE-2025-40133: mptcp: Call dst_release() in mptcp_active_enable() (bsc#1253328).\n- CVE-2025-40134: dm: fix NULL pointer dereference in __dm_suspend() (bsc#1253386).\n- CVE-2025-40135: ipv6: use RCU in ip6_xmit() (bsc#1253342).\n- CVE-2025-40139: smc: Use __sk_dst_get() and dst_dev_rcu() in in smc_clc_prfx_set() (bsc#1253409).\n- CVE-2025-40149: tls: Use __sk_dst_get() and dst_dev_rcu() in get_netdev_for_sock() (bsc#1253355).\n- CVE-2025-40153: mm: hugetlb: avoid soft lockup when mprotect to large memory area (bsc#1253408).\n- CVE-2025-40157: EDAC/i10nm: Skip DIMM enumeration on a disabled memory controller (bsc#1253423).\n- CVE-2025-40158: ipv6: use RCU in ip6_output() (bsc#1253402).\n- CVE-2025-40159: xsk: Harden userspace-supplied xdp_desc validation (bsc#1253403).\n- CVE-2025-40168: smc: Use __sk_dst_get() and dst_dev_rcu() in smc_clc_prfx_match() (bsc#1253427).\n- CVE-2025-40169: bpf: Reject negative offsets for ALU ops (bsc#1253416).\n- CVE-2025-40173: net/ip6_tunnel: Prevent perpetual tunnel growth (bsc#1253421).\n- CVE-2025-40175: idpf: cleanup remaining SKBs in PTP flows (bsc#1253426).\n- CVE-2025-40176: tls: wait for pending async decryptions if tls_strp_msg_hold fails (bsc#1253425).\n- CVE-2025-40178: pid: Add a judgment for ns null in pid_nr_ns (bsc#1253463).\n- CVE-2025-40185: ice: ice_adapter: release xa entry on adapter allocation failure (bsc#1253394).\n- CVE-2025-40201: kernel/sys.c: fix the racy usage of task_lock(tsk-\u003egroup_leader) in sys_prlimit64() paths (bsc#1253455).\n- CVE-2025-40203: listmount: don\u0027t call path_put() under namespace semaphore (bsc#1253457).\n\nThe following non security issues were fixed:\n\n- ACPI: scan: Update honor list for RPMI System MSI (stable-fixes).\n- ACPICA: Update dsmethod.c to get rid of unused variable warning (stable-fixes).\n- Disable CONFIG_CPU5_WDT The cpu5wdt driver doesn\u0027t implement a\n proper watchdog interface and has many code issues. It only handles\n obscure and obsolete hardware. Stop building and supporting this driver\n (jsc#PED-14062).\n- Fix \"drm/xe: Don\u0027t allow evicting of BOs in same VM in array of VM binds\" (bsc#1252923)\n- KVM: SVM: Delete IRTE link from previous vCPU before setting new IRTE (git-fixes).\n- KVM: SVM: Delete IRTE link from previous vCPU irrespective of new routing (git-fixes).\n- KVM: SVM: Mark VMCB_LBR dirty when MSR_IA32_DEBUGCTLMSR is updated (git-fixes).\n- KVM: s390: improve interrupt cpu for wakeup (bsc#1235463).\n- KVM: s390: kABI backport for \u0027last_sleep_cpu\u0027 (bsc#1252352).\n- KVM: x86/mmu: Return -EAGAIN if userspace deletes/moves memslot during prefault (git-fixes).\n- PCI/ERR: Update device error_state already after reset (stable-fixes).\n- PM: EM: Slightly reduce em_check_capacity_update() overhead (stable-fixes).\n- Revert \"net/mlx5e: Update and set Xon/Xoff upon MTU set\" (git-fixes).\n- Revert \"net/mlx5e: Update and set Xon/Xoff upon port speed set\" (git-fixes).\n- Update config files: enable zstd module decompression (jsc#PED-14115).\n- bpf/selftests: Fix test_tcpnotify_user (bsc#1253635).\n- btrfs: do not clear read-only when adding sprout device (bsc#1253238).\n- btrfs: do not update last_log_commit when logging inode due to a new name (git-fixes).\n- dm: fix queue start/stop imbalance under suspend/load/resume races (bsc#1253386)\n- drm/amd/display: Add AVI infoframe copy in copy_stream_update_to_stream (stable-fixes).\n- drm/amd/display: update color on atomic commit time (stable-fixes).\n- drm/amd/display: update dpp/disp clock from smu clock table (stable-fixes).\n- drm/radeon: delete radeon_fence_process in is_signaled, no deadlock (stable-fixes).\n- hwmon: (lenovo-ec-sensors) Update P8 supprt (stable-fixes).\n- media: amphion: Delete v4l2_fh synchronously in .release() (stable-fixes).\n- mount: handle NULL values in mnt_ns_release() (bsc#1254308)\n- net/smc: Remove validation of reserved bits in CLC Decline (bsc#1252357).\n- net: phy: move realtek PHY driver to its own subdirectory (jsc#PED-14353).\n- net: phy: realtek: add defines for shadowed c45 standard registers (jsc#PED-14353).\n- net: phy: realtek: add helper RTL822X_VND2_C22_REG (jsc#PED-14353).\n- net: phy: realtek: change order of calls in C22 read_status() (jsc#PED-14353).\n- net: phy: realtek: clear 1000Base-T link partner advertisement (jsc#PED-14353).\n- net: phy: realtek: improve mmd register access for internal PHY\u0027s (jsc#PED-14353).\n- net: phy: realtek: read duplex and gbit master from PHYSR register (jsc#PED-14353).\n- net: phy: realtek: switch from paged to MMD ops in rtl822x functions (jsc#PED-14353).\n- net: phy: realtek: use string choices helpers (jsc#PED-14353).\n- net: xilinx: axienet: Fix IRQ coalescing packet count overflow (bsc#1250746)\n- net: xilinx: axienet: Fix RX skb ring management in DMAengine mode (bsc#1250746)\n- net: xilinx: axienet: Fix Tx skb circular buffer occupancy check in dmaengine xmit (bsc#1250746)\n- nvmet-auth: update sc_c in host response (git-fixes bsc#1249397).\n- nvmet-auth: update sc_c in target host hash calculation (git-fixes).\n- perf list: Add IBM z17 event descriptions (jsc#PED-13611).\n- platform/x86:intel/pmc: Update Arrow Lake telemetry GUID (git-fixes).\n- powercap: intel_rapl: Add support for Panther Lake platform (jsc#PED-13949).\n- pwm: pca9685: Use bulk write to atomicially update registers (stable-fixes).\n- r8169: add PHY c45 ops for MDIO_MMD_VENDOR2 registers (jsc#PED-14353).\n- r8169: add support for Intel Killer E5000 (jsc#PED-14353).\n- r8169: add support for RTL8125BP rev.b (jsc#PED-14353).\n- r8169: add support for RTL8125D rev.b (jsc#PED-14353).\n- r8169: adjust version numbering for RTL8126 (jsc#PED-14353).\n- r8169: align RTL8125 EEE config with vendor driver (jsc#PED-14353).\n- r8169: align RTL8125/RTL8126 PHY config with vendor driver (jsc#PED-14353).\n- r8169: align RTL8126 EEE config with vendor driver (jsc#PED-14353).\n- r8169: align WAKE_PHY handling with r8125/r8126 vendor drivers (jsc#PED-14353).\n- r8169: avoid duplicated messages if loading firmware fails and switch to warn level (jsc#PED-14353).\n- r8169: don\u0027t take RTNL lock in rtl_task() (jsc#PED-14353).\n- r8169: enable EEE at 2.5G per default on RTL8125B (jsc#PED-14353).\n- r8169: enable RTL8168H/RTL8168EP/RTL8168FP ASPM support (jsc#PED-14353).\n- r8169: fix inconsistent indenting in rtl8169_get_eth_mac_stats (jsc#PED-14353).\n- r8169: implement additional ethtool stats ops (jsc#PED-14353).\n- r8169: improve __rtl8169_set_wol (jsc#PED-14353).\n- r8169: improve initialization of RSS registers on RTL8125/RTL8126 (jsc#PED-14353).\n- r8169: improve rtl_set_d3_pll_down (jsc#PED-14353).\n- r8169: increase max jumbo packet size on RTL8125/RTL8126 (jsc#PED-14353).\n- r8169: remove leftover locks after reverted change (jsc#PED-14353).\n- r8169: remove original workaround for RTL8125 broken rx issue (jsc#PED-14353).\n- r8169: remove rtl_dash_loop_wait_high/low (jsc#PED-14353).\n- r8169: remove support for chip version 11 (jsc#PED-14353).\n- r8169: remove unused flag RTL_FLAG_TASK_RESET_NO_QUEUE_WAKE (jsc#PED-14353).\n- r8169: replace custom flag with disable_work() et al (jsc#PED-14353).\n- r8169: switch away from deprecated pcim_iomap_table (jsc#PED-14353).\n- r8169: use helper r8169_mod_reg8_cond to simplify rtl_jumbo_config (jsc#PED-14353).\n- ring-buffer: Update pages_touched to reflect persistent buffer content (git-fixes).\n- s390/mm: Fix __ptep_rdp() inline assembly (bsc#1253643).\n- sched/fair: Get rid of sched_domains_curr_level hack for tl-\u003ecpumask() (bsc#1246843).\n- sched/fair: Have SD_SERIALIZE affect newidle balancing (bsc#1248792).\n- sched/fair: Proportional newidle balance (bsc#1248792).\n- sched/fair: Proportional newidle balance -KABI (bsc#1248792).\n- sched/fair: Revert max_newidle_lb_cost bump (bsc#1248792).\n- sched/fair: Skip sched_balance_running cmpxchg when balance is not due (bsc#1248792).\n- sched/fair: Small cleanup to sched_balance_newidle() (bsc#1248792).\n- sched/fair: Small cleanup to update_newidle_cost() (bsc#1248792).\n- scsi: lpfc: Add capability to register Platform Name ID to fabric (bsc#1254119).\n- scsi: lpfc: Allow support for BB credit recovery in point-to-point topology (bsc#1254119).\n- scsi: lpfc: Ensure unregistration of rpis for received PLOGIs (bsc#1254119).\n- scsi: lpfc: Fix leaked ndlp krefs when in point-to-point topology (bsc#1254119).\n- scsi: lpfc: Fix reusing an ndlp that is marked NLP_DROPPED during FLOGI (bsc#1254119).\n- scsi: lpfc: Modify kref handling for Fabric Controller ndlps (bsc#1254119).\n- scsi: lpfc: Remove redundant NULL ptr assignment in lpfc_els_free_iocb() (bsc#1254119).\n- scsi: lpfc: Revise discovery related function headers and comments (bsc#1254119).\n- scsi: lpfc: Update lpfc version to 14.4.0.12 (bsc#1254119).\n- scsi: lpfc: Update various NPIV diagnostic log messaging (bsc#1254119).\n- selftests/run_kselftest.sh: Add `--skip` argument option (bsc#1254221).\n- smpboot: introduce SDTL_INIT() helper to tidy sched topology setup (bsc#1246843).\n- soc/tegra: fuse: speedo-tegra210: Update speedo IDs (git-fixes).\n- spi: tegra210-quad: Check hardware status on timeout (bsc#1253155)\n- spi: tegra210-quad: Fix timeout handling (bsc#1253155)\n- spi: tegra210-quad: Refactor error handling into helper functions (bsc#1253155)\n- spi: tegra210-quad: Update dummy sequence configuration (git-fixes)\n- tcp_bpf: Call sk_msg_free() when tcp_bpf_send_verdict() fails to allocate psock-\u003ecork (bsc#1250705).\n- wifi: ath11k: Add quirk entries for Thinkpad T14s Gen3 AMD (bsc#1254181).\n- wifi: mt76: do not add wcid entries to sta poll list during MCU reset (bsc#1254315).\n- wifi: mt76: introduce mt792x_config_mac_addr_list routine (bsc#1254315).\n- wifi: mt76: mt7925: Fix logical vs bitwise typo (bsc#1254315).\n- wifi: mt76: mt7925: Remove unnecessary if-check (bsc#1254315).\n- wifi: mt76: mt7925: Simplify HIF suspend handling to avoid suspend fail (bsc#1254315).\n- wifi: mt76: mt7925: add EHT control support based on the CLC data (bsc#1254315).\n- wifi: mt76: mt7925: add handler to hif suspend/resume event (bsc#1254315).\n- wifi: mt76: mt7925: add pci restore for hibernate (bsc#1254315).\n- wifi: mt76: mt7925: config the dwell time by firmware (bsc#1254315).\n- wifi: mt76: mt7925: extend MCU support for testmode (bsc#1254315).\n- wifi: mt76: mt7925: fix CLC command timeout when suspend/resume (bsc#1254315).\n- wifi: mt76: mt7925: fix missing hdr_trans_tlv command for broadcast wtbl (bsc#1254315).\n- wifi: mt76: mt7925: fix the unfinished command of regd_notifier before suspend (bsc#1254315).\n- wifi: mt76: mt7925: refine the txpower initialization flow (bsc#1254315).\n- wifi: mt76: mt7925: replace zero-length array with flexible-array member (bsc#1254315).\n- wifi: mt76: mt7925: update the channel usage when the regd domain changed (bsc#1254315).\n- wifi: mt76: mt7925e: fix too long of wifi resume time (bsc#1254315).\n- x86/smpboot: avoid SMT domain attach/destroy if SMT is not enabled (bsc#1246843).\n- x86/smpboot: moves x86_topology to static initialize and truncate (bsc#1246843).\n- x86/smpboot: remove redundant CONFIG_SCHED_SMT (bsc#1246843).\n",
"title": "Description of the patch"
},
{
"category": "details",
"text": "openSUSE-Leap-16.0-113",
"title": "Patchnames"
},
{
"category": "legal_disclaimer",
"text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
"title": "Terms of use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://www.suse.com/support/security/contact/",
"name": "SUSE Product Security Team",
"namespace": "https://www.suse.com/"
},
"references": [
{
"category": "external",
"summary": "SUSE ratings",
"url": "https://www.suse.com/support/security/rating/"
},
{
"category": "self",
"summary": "URL of this CSAF notice",
"url": "https://ftp.suse.com/pub/projects/security/csaf/opensuse-su-2025_20172-1.json"
},
{
"category": "self",
"summary": "SUSE Bug 1235463",
"url": "https://bugzilla.suse.com/1235463"
},
{
"category": "self",
"summary": "SUSE Bug 1243474",
"url": "https://bugzilla.suse.com/1243474"
},
{
"category": "self",
"summary": "SUSE Bug 1245193",
"url": "https://bugzilla.suse.com/1245193"
},
{
"category": "self",
"summary": "SUSE Bug 1245431",
"url": "https://bugzilla.suse.com/1245431"
},
{
"category": "self",
"summary": "SUSE Bug 1245498",
"url": "https://bugzilla.suse.com/1245498"
},
{
"category": "self",
"summary": "SUSE Bug 1245499",
"url": "https://bugzilla.suse.com/1245499"
},
{
"category": "self",
"summary": "SUSE Bug 1246328",
"url": "https://bugzilla.suse.com/1246328"
},
{
"category": "self",
"summary": "SUSE Bug 1246843",
"url": "https://bugzilla.suse.com/1246843"
},
{
"category": "self",
"summary": "SUSE Bug 1247500",
"url": "https://bugzilla.suse.com/1247500"
},
{
"category": "self",
"summary": "SUSE Bug 1248792",
"url": "https://bugzilla.suse.com/1248792"
},
{
"category": "self",
"summary": "SUSE Bug 1249256",
"url": "https://bugzilla.suse.com/1249256"
},
{
"category": "self",
"summary": "SUSE Bug 1249397",
"url": "https://bugzilla.suse.com/1249397"
},
{
"category": "self",
"summary": "SUSE Bug 1249912",
"url": "https://bugzilla.suse.com/1249912"
},
{
"category": "self",
"summary": "SUSE Bug 1249977",
"url": "https://bugzilla.suse.com/1249977"
},
{
"category": "self",
"summary": "SUSE Bug 1249982",
"url": "https://bugzilla.suse.com/1249982"
},
{
"category": "self",
"summary": "SUSE Bug 1250034",
"url": "https://bugzilla.suse.com/1250034"
},
{
"category": "self",
"summary": "SUSE Bug 1250176",
"url": "https://bugzilla.suse.com/1250176"
},
{
"category": "self",
"summary": "SUSE Bug 1250237",
"url": "https://bugzilla.suse.com/1250237"
},
{
"category": "self",
"summary": "SUSE Bug 1250252",
"url": "https://bugzilla.suse.com/1250252"
},
{
"category": "self",
"summary": "SUSE Bug 1250705",
"url": "https://bugzilla.suse.com/1250705"
},
{
"category": "self",
"summary": "SUSE Bug 1250723",
"url": "https://bugzilla.suse.com/1250723"
},
{
"category": "self",
"summary": "SUSE Bug 1250746",
"url": "https://bugzilla.suse.com/1250746"
},
{
"category": "self",
"summary": "SUSE Bug 1251120",
"url": "https://bugzilla.suse.com/1251120"
},
{
"category": "self",
"summary": "SUSE Bug 1251817",
"url": "https://bugzilla.suse.com/1251817"
},
{
"category": "self",
"summary": "SUSE Bug 1252054",
"url": "https://bugzilla.suse.com/1252054"
},
{
"category": "self",
"summary": "SUSE Bug 1252063",
"url": "https://bugzilla.suse.com/1252063"
},
{
"category": "self",
"summary": "SUSE Bug 1252301",
"url": "https://bugzilla.suse.com/1252301"
},
{
"category": "self",
"summary": "SUSE Bug 1252303",
"url": "https://bugzilla.suse.com/1252303"
},
{
"category": "self",
"summary": "SUSE Bug 1252342",
"url": "https://bugzilla.suse.com/1252342"
},
{
"category": "self",
"summary": "SUSE Bug 1252352",
"url": "https://bugzilla.suse.com/1252352"
},
{
"category": "self",
"summary": "SUSE Bug 1252357",
"url": "https://bugzilla.suse.com/1252357"
},
{
"category": "self",
"summary": "SUSE Bug 1252681",
"url": "https://bugzilla.suse.com/1252681"
},
{
"category": "self",
"summary": "SUSE Bug 1252686",
"url": "https://bugzilla.suse.com/1252686"
},
{
"category": "self",
"summary": "SUSE Bug 1252763",
"url": "https://bugzilla.suse.com/1252763"
},
{
"category": "self",
"summary": "SUSE Bug 1252776",
"url": "https://bugzilla.suse.com/1252776"
},
{
"category": "self",
"summary": "SUSE Bug 1252779",
"url": "https://bugzilla.suse.com/1252779"
},
{
"category": "self",
"summary": "SUSE Bug 1252790",
"url": "https://bugzilla.suse.com/1252790"
},
{
"category": "self",
"summary": "SUSE Bug 1252794",
"url": "https://bugzilla.suse.com/1252794"
},
{
"category": "self",
"summary": "SUSE Bug 1252795",
"url": "https://bugzilla.suse.com/1252795"
},
{
"category": "self",
"summary": "SUSE Bug 1252808",
"url": "https://bugzilla.suse.com/1252808"
},
{
"category": "self",
"summary": "SUSE Bug 1252809",
"url": "https://bugzilla.suse.com/1252809"
},
{
"category": "self",
"summary": "SUSE Bug 1252817",
"url": "https://bugzilla.suse.com/1252817"
},
{
"category": "self",
"summary": "SUSE Bug 1252821",
"url": "https://bugzilla.suse.com/1252821"
},
{
"category": "self",
"summary": "SUSE Bug 1252824",
"url": "https://bugzilla.suse.com/1252824"
},
{
"category": "self",
"summary": "SUSE Bug 1252836",
"url": "https://bugzilla.suse.com/1252836"
},
{
"category": "self",
"summary": "SUSE Bug 1252845",
"url": "https://bugzilla.suse.com/1252845"
},
{
"category": "self",
"summary": "SUSE Bug 1252901",
"url": "https://bugzilla.suse.com/1252901"
},
{
"category": "self",
"summary": "SUSE Bug 1252912",
"url": "https://bugzilla.suse.com/1252912"
},
{
"category": "self",
"summary": "SUSE Bug 1252917",
"url": "https://bugzilla.suse.com/1252917"
},
{
"category": "self",
"summary": "SUSE Bug 1252919",
"url": "https://bugzilla.suse.com/1252919"
},
{
"category": "self",
"summary": "SUSE Bug 1252923",
"url": "https://bugzilla.suse.com/1252923"
},
{
"category": "self",
"summary": "SUSE Bug 1252928",
"url": "https://bugzilla.suse.com/1252928"
},
{
"category": "self",
"summary": "SUSE Bug 1253018",
"url": "https://bugzilla.suse.com/1253018"
},
{
"category": "self",
"summary": "SUSE Bug 1253155",
"url": "https://bugzilla.suse.com/1253155"
},
{
"category": "self",
"summary": "SUSE Bug 1253176",
"url": "https://bugzilla.suse.com/1253176"
},
{
"category": "self",
"summary": "SUSE Bug 1253238",
"url": "https://bugzilla.suse.com/1253238"
},
{
"category": "self",
"summary": "SUSE Bug 1253275",
"url": "https://bugzilla.suse.com/1253275"
},
{
"category": "self",
"summary": "SUSE Bug 1253318",
"url": "https://bugzilla.suse.com/1253318"
},
{
"category": "self",
"summary": "SUSE Bug 1253324",
"url": "https://bugzilla.suse.com/1253324"
},
{
"category": "self",
"summary": "SUSE Bug 1253328",
"url": "https://bugzilla.suse.com/1253328"
},
{
"category": "self",
"summary": "SUSE Bug 1253330",
"url": "https://bugzilla.suse.com/1253330"
},
{
"category": "self",
"summary": "SUSE Bug 1253342",
"url": "https://bugzilla.suse.com/1253342"
},
{
"category": "self",
"summary": "SUSE Bug 1253348",
"url": "https://bugzilla.suse.com/1253348"
},
{
"category": "self",
"summary": "SUSE Bug 1253349",
"url": "https://bugzilla.suse.com/1253349"
},
{
"category": "self",
"summary": "SUSE Bug 1253352",
"url": "https://bugzilla.suse.com/1253352"
},
{
"category": "self",
"summary": "SUSE Bug 1253355",
"url": "https://bugzilla.suse.com/1253355"
},
{
"category": "self",
"summary": "SUSE Bug 1253360",
"url": "https://bugzilla.suse.com/1253360"
},
{
"category": "self",
"summary": "SUSE Bug 1253362",
"url": "https://bugzilla.suse.com/1253362"
},
{
"category": "self",
"summary": "SUSE Bug 1253363",
"url": "https://bugzilla.suse.com/1253363"
},
{
"category": "self",
"summary": "SUSE Bug 1253367",
"url": "https://bugzilla.suse.com/1253367"
},
{
"category": "self",
"summary": "SUSE Bug 1253369",
"url": "https://bugzilla.suse.com/1253369"
},
{
"category": "self",
"summary": "SUSE Bug 1253386",
"url": "https://bugzilla.suse.com/1253386"
},
{
"category": "self",
"summary": "SUSE Bug 1253394",
"url": "https://bugzilla.suse.com/1253394"
},
{
"category": "self",
"summary": "SUSE Bug 1253395",
"url": "https://bugzilla.suse.com/1253395"
},
{
"category": "self",
"summary": "SUSE Bug 1253402",
"url": "https://bugzilla.suse.com/1253402"
},
{
"category": "self",
"summary": "SUSE Bug 1253403",
"url": "https://bugzilla.suse.com/1253403"
},
{
"category": "self",
"summary": "SUSE Bug 1253405",
"url": "https://bugzilla.suse.com/1253405"
},
{
"category": "self",
"summary": "SUSE Bug 1253407",
"url": "https://bugzilla.suse.com/1253407"
},
{
"category": "self",
"summary": "SUSE Bug 1253408",
"url": "https://bugzilla.suse.com/1253408"
},
{
"category": "self",
"summary": "SUSE Bug 1253409",
"url": "https://bugzilla.suse.com/1253409"
},
{
"category": "self",
"summary": "SUSE Bug 1253410",
"url": "https://bugzilla.suse.com/1253410"
},
{
"category": "self",
"summary": "SUSE Bug 1253412",
"url": "https://bugzilla.suse.com/1253412"
},
{
"category": "self",
"summary": "SUSE Bug 1253416",
"url": "https://bugzilla.suse.com/1253416"
},
{
"category": "self",
"summary": "SUSE Bug 1253421",
"url": "https://bugzilla.suse.com/1253421"
},
{
"category": "self",
"summary": "SUSE Bug 1253422",
"url": "https://bugzilla.suse.com/1253422"
},
{
"category": "self",
"summary": "SUSE Bug 1253423",
"url": "https://bugzilla.suse.com/1253423"
},
{
"category": "self",
"summary": "SUSE Bug 1253424",
"url": "https://bugzilla.suse.com/1253424"
},
{
"category": "self",
"summary": "SUSE Bug 1253425",
"url": "https://bugzilla.suse.com/1253425"
},
{
"category": "self",
"summary": "SUSE Bug 1253426",
"url": "https://bugzilla.suse.com/1253426"
},
{
"category": "self",
"summary": "SUSE Bug 1253427",
"url": "https://bugzilla.suse.com/1253427"
},
{
"category": "self",
"summary": "SUSE Bug 1253428",
"url": "https://bugzilla.suse.com/1253428"
},
{
"category": "self",
"summary": "SUSE Bug 1253431",
"url": "https://bugzilla.suse.com/1253431"
},
{
"category": "self",
"summary": "SUSE Bug 1253433",
"url": "https://bugzilla.suse.com/1253433"
},
{
"category": "self",
"summary": "SUSE Bug 1253436",
"url": "https://bugzilla.suse.com/1253436"
},
{
"category": "self",
"summary": "SUSE Bug 1253438",
"url": "https://bugzilla.suse.com/1253438"
},
{
"category": "self",
"summary": "SUSE Bug 1253440",
"url": "https://bugzilla.suse.com/1253440"
},
{
"category": "self",
"summary": "SUSE Bug 1253441",
"url": "https://bugzilla.suse.com/1253441"
},
{
"category": "self",
"summary": "SUSE Bug 1253443",
"url": "https://bugzilla.suse.com/1253443"
},
{
"category": "self",
"summary": "SUSE Bug 1253445",
"url": "https://bugzilla.suse.com/1253445"
},
{
"category": "self",
"summary": "SUSE Bug 1253448",
"url": "https://bugzilla.suse.com/1253448"
},
{
"category": "self",
"summary": "SUSE Bug 1253449",
"url": "https://bugzilla.suse.com/1253449"
},
{
"category": "self",
"summary": "SUSE Bug 1253450",
"url": "https://bugzilla.suse.com/1253450"
},
{
"category": "self",
"summary": "SUSE Bug 1253451",
"url": "https://bugzilla.suse.com/1253451"
},
{
"category": "self",
"summary": "SUSE Bug 1253453",
"url": "https://bugzilla.suse.com/1253453"
},
{
"category": "self",
"summary": "SUSE Bug 1253455",
"url": "https://bugzilla.suse.com/1253455"
},
{
"category": "self",
"summary": "SUSE Bug 1253456",
"url": "https://bugzilla.suse.com/1253456"
},
{
"category": "self",
"summary": "SUSE Bug 1253457",
"url": "https://bugzilla.suse.com/1253457"
},
{
"category": "self",
"summary": "SUSE Bug 1253463",
"url": "https://bugzilla.suse.com/1253463"
},
{
"category": "self",
"summary": "SUSE Bug 1253472",
"url": "https://bugzilla.suse.com/1253472"
},
{
"category": "self",
"summary": "SUSE Bug 1253622",
"url": "https://bugzilla.suse.com/1253622"
},
{
"category": "self",
"summary": "SUSE Bug 1253624",
"url": "https://bugzilla.suse.com/1253624"
},
{
"category": "self",
"summary": "SUSE Bug 1253635",
"url": "https://bugzilla.suse.com/1253635"
},
{
"category": "self",
"summary": "SUSE Bug 1253643",
"url": "https://bugzilla.suse.com/1253643"
},
{
"category": "self",
"summary": "SUSE Bug 1253647",
"url": "https://bugzilla.suse.com/1253647"
},
{
"category": "self",
"summary": "SUSE Bug 1254119",
"url": "https://bugzilla.suse.com/1254119"
},
{
"category": "self",
"summary": "SUSE Bug 1254181",
"url": "https://bugzilla.suse.com/1254181"
},
{
"category": "self",
"summary": "SUSE Bug 1254221",
"url": "https://bugzilla.suse.com/1254221"
},
{
"category": "self",
"summary": "SUSE Bug 1254308",
"url": "https://bugzilla.suse.com/1254308"
},
{
"category": "self",
"summary": "SUSE Bug 1254315",
"url": "https://bugzilla.suse.com/1254315"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-50253 page",
"url": "https://www.suse.com/security/cve/CVE-2022-50253/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-37916 page",
"url": "https://www.suse.com/security/cve/CVE-2025-37916/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-38084 page",
"url": "https://www.suse.com/security/cve/CVE-2025-38084/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-38085 page",
"url": "https://www.suse.com/security/cve/CVE-2025-38085/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-38321 page",
"url": "https://www.suse.com/security/cve/CVE-2025-38321/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-38728 page",
"url": "https://www.suse.com/security/cve/CVE-2025-38728/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-39805 page",
"url": "https://www.suse.com/security/cve/CVE-2025-39805/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-39819 page",
"url": "https://www.suse.com/security/cve/CVE-2025-39819/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-39822 page",
"url": "https://www.suse.com/security/cve/CVE-2025-39822/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-39831 page",
"url": "https://www.suse.com/security/cve/CVE-2025-39831/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-39859 page",
"url": "https://www.suse.com/security/cve/CVE-2025-39859/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-39897 page",
"url": "https://www.suse.com/security/cve/CVE-2025-39897/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-39917 page",
"url": "https://www.suse.com/security/cve/CVE-2025-39917/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-39944 page",
"url": "https://www.suse.com/security/cve/CVE-2025-39944/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-39961 page",
"url": "https://www.suse.com/security/cve/CVE-2025-39961/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-39980 page",
"url": "https://www.suse.com/security/cve/CVE-2025-39980/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-39990 page",
"url": "https://www.suse.com/security/cve/CVE-2025-39990/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40001 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40001/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40003 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40003/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40006 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40006/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40021 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40021/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40024 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40024/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40027 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40027/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40031 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40031/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40033 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40033/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40038 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40038/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40047 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40047/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40053 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40053/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40055 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40055/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40059 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40059/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40064 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40064/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40070 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40070/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40074 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40074/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40075 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40075/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40081 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40081/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40083 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40083/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40086 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40086/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40098 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40098/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40101 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40101/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40102 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40102/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40105 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40105/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40107 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40107/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40109 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40109/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40110 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40110/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40111 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40111/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40115 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40115/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40116 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40116/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40118 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40118/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40120 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40120/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40121 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40121/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40127 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40127/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40129 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40129/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40132 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40132/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40133 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40133/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40134 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40134/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40135 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40135/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40139 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40139/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40140 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40140/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40141 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40141/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40142 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40142/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40149 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40149/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40153 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40153/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40154 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40154/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40156 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40156/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40157 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40157/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40158 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40158/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40159 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40159/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40161 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40161/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40162 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40162/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40164 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40164/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40165 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40165/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40166 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40166/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40168 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40168/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40169 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40169/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40171 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40171/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40172 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40172/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40173 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40173/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40175 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40175/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40176 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40176/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40177 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40177/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40178 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40178/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40180 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40180/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40183 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40183/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40185 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40185/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40186 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40186/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40187 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40187/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40188 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40188/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40192 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40192/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40194 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40194/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40196 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40196/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40197 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40197/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40198 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40198/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40200 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40200/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40201 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40201/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40202 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40202/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40203 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40203/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40204 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40204/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40205 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40205/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40206 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40206/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40207 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40207/"
}
],
"title": "Security update for the Linux Kernel",
"tracking": {
"current_release_date": "2025-12-19T17:38:16Z",
"generator": {
"date": "2025-12-19T17:38:16Z",
"engine": {
"name": "cve-database.git:bin/generate-csaf.pl",
"version": "1"
}
},
"id": "openSUSE-SU-2025:20172-1",
"initial_release_date": "2025-12-19T17:38:16Z",
"revision_history": [
{
"date": "2025-12-19T17:38:16Z",
"number": "1",
"summary": "Current version"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "cluster-md-kmp-64kb-6.12.0-160000.8.1.aarch64",
"product": {
"name": "cluster-md-kmp-64kb-6.12.0-160000.8.1.aarch64",
"product_id": "cluster-md-kmp-64kb-6.12.0-160000.8.1.aarch64"
}
},
{
"category": "product_version",
"name": "cluster-md-kmp-default-6.12.0-160000.8.1.aarch64",
"product": {
"name": "cluster-md-kmp-default-6.12.0-160000.8.1.aarch64",
"product_id": "cluster-md-kmp-default-6.12.0-160000.8.1.aarch64"
}
},
{
"category": "product_version",
"name": "cluster-md-kmp-rt-6.12.0-160000.8.1.aarch64",
"product": {
"name": "cluster-md-kmp-rt-6.12.0-160000.8.1.aarch64",
"product_id": "cluster-md-kmp-rt-6.12.0-160000.8.1.aarch64"
}
},
{
"category": "product_version",
"name": "dlm-kmp-64kb-6.12.0-160000.8.1.aarch64",
"product": {
"name": "dlm-kmp-64kb-6.12.0-160000.8.1.aarch64",
"product_id": "dlm-kmp-64kb-6.12.0-160000.8.1.aarch64"
}
},
{
"category": "product_version",
"name": "dlm-kmp-default-6.12.0-160000.8.1.aarch64",
"product": {
"name": "dlm-kmp-default-6.12.0-160000.8.1.aarch64",
"product_id": "dlm-kmp-default-6.12.0-160000.8.1.aarch64"
}
},
{
"category": "product_version",
"name": "dlm-kmp-rt-6.12.0-160000.8.1.aarch64",
"product": {
"name": "dlm-kmp-rt-6.12.0-160000.8.1.aarch64",
"product_id": "dlm-kmp-rt-6.12.0-160000.8.1.aarch64"
}
},
{
"category": "product_version",
"name": "dtb-allwinner-6.12.0-160000.8.1.aarch64",
"product": {
"name": "dtb-allwinner-6.12.0-160000.8.1.aarch64",
"product_id": "dtb-allwinner-6.12.0-160000.8.1.aarch64"
}
},
{
"category": "product_version",
"name": "dtb-altera-6.12.0-160000.8.1.aarch64",
"product": {
"name": "dtb-altera-6.12.0-160000.8.1.aarch64",
"product_id": "dtb-altera-6.12.0-160000.8.1.aarch64"
}
},
{
"category": "product_version",
"name": "dtb-amazon-6.12.0-160000.8.1.aarch64",
"product": {
"name": "dtb-amazon-6.12.0-160000.8.1.aarch64",
"product_id": "dtb-amazon-6.12.0-160000.8.1.aarch64"
}
},
{
"category": "product_version",
"name": "dtb-amd-6.12.0-160000.8.1.aarch64",
"product": {
"name": "dtb-amd-6.12.0-160000.8.1.aarch64",
"product_id": "dtb-amd-6.12.0-160000.8.1.aarch64"
}
},
{
"category": "product_version",
"name": "dtb-amlogic-6.12.0-160000.8.1.aarch64",
"product": {
"name": "dtb-amlogic-6.12.0-160000.8.1.aarch64",
"product_id": "dtb-amlogic-6.12.0-160000.8.1.aarch64"
}
},
{
"category": "product_version",
"name": "dtb-apm-6.12.0-160000.8.1.aarch64",
"product": {
"name": "dtb-apm-6.12.0-160000.8.1.aarch64",
"product_id": "dtb-apm-6.12.0-160000.8.1.aarch64"
}
},
{
"category": "product_version",
"name": "dtb-apple-6.12.0-160000.8.1.aarch64",
"product": {
"name": "dtb-apple-6.12.0-160000.8.1.aarch64",
"product_id": "dtb-apple-6.12.0-160000.8.1.aarch64"
}
},
{
"category": "product_version",
"name": "dtb-arm-6.12.0-160000.8.1.aarch64",
"product": {
"name": "dtb-arm-6.12.0-160000.8.1.aarch64",
"product_id": "dtb-arm-6.12.0-160000.8.1.aarch64"
}
},
{
"category": "product_version",
"name": "dtb-broadcom-6.12.0-160000.8.1.aarch64",
"product": {
"name": "dtb-broadcom-6.12.0-160000.8.1.aarch64",
"product_id": "dtb-broadcom-6.12.0-160000.8.1.aarch64"
}
},
{
"category": "product_version",
"name": "dtb-cavium-6.12.0-160000.8.1.aarch64",
"product": {
"name": "dtb-cavium-6.12.0-160000.8.1.aarch64",
"product_id": "dtb-cavium-6.12.0-160000.8.1.aarch64"
}
},
{
"category": "product_version",
"name": "dtb-exynos-6.12.0-160000.8.1.aarch64",
"product": {
"name": "dtb-exynos-6.12.0-160000.8.1.aarch64",
"product_id": "dtb-exynos-6.12.0-160000.8.1.aarch64"
}
},
{
"category": "product_version",
"name": "dtb-freescale-6.12.0-160000.8.1.aarch64",
"product": {
"name": "dtb-freescale-6.12.0-160000.8.1.aarch64",
"product_id": "dtb-freescale-6.12.0-160000.8.1.aarch64"
}
},
{
"category": "product_version",
"name": "dtb-hisilicon-6.12.0-160000.8.1.aarch64",
"product": {
"name": "dtb-hisilicon-6.12.0-160000.8.1.aarch64",
"product_id": "dtb-hisilicon-6.12.0-160000.8.1.aarch64"
}
},
{
"category": "product_version",
"name": "dtb-lg-6.12.0-160000.8.1.aarch64",
"product": {
"name": "dtb-lg-6.12.0-160000.8.1.aarch64",
"product_id": "dtb-lg-6.12.0-160000.8.1.aarch64"
}
},
{
"category": "product_version",
"name": "dtb-marvell-6.12.0-160000.8.1.aarch64",
"product": {
"name": "dtb-marvell-6.12.0-160000.8.1.aarch64",
"product_id": "dtb-marvell-6.12.0-160000.8.1.aarch64"
}
},
{
"category": "product_version",
"name": "dtb-mediatek-6.12.0-160000.8.1.aarch64",
"product": {
"name": "dtb-mediatek-6.12.0-160000.8.1.aarch64",
"product_id": "dtb-mediatek-6.12.0-160000.8.1.aarch64"
}
},
{
"category": "product_version",
"name": "dtb-nvidia-6.12.0-160000.8.1.aarch64",
"product": {
"name": "dtb-nvidia-6.12.0-160000.8.1.aarch64",
"product_id": "dtb-nvidia-6.12.0-160000.8.1.aarch64"
}
},
{
"category": "product_version",
"name": "dtb-qcom-6.12.0-160000.8.1.aarch64",
"product": {
"name": "dtb-qcom-6.12.0-160000.8.1.aarch64",
"product_id": "dtb-qcom-6.12.0-160000.8.1.aarch64"
}
},
{
"category": "product_version",
"name": "dtb-renesas-6.12.0-160000.8.1.aarch64",
"product": {
"name": "dtb-renesas-6.12.0-160000.8.1.aarch64",
"product_id": "dtb-renesas-6.12.0-160000.8.1.aarch64"
}
},
{
"category": "product_version",
"name": "dtb-rockchip-6.12.0-160000.8.1.aarch64",
"product": {
"name": "dtb-rockchip-6.12.0-160000.8.1.aarch64",
"product_id": "dtb-rockchip-6.12.0-160000.8.1.aarch64"
}
},
{
"category": "product_version",
"name": "dtb-socionext-6.12.0-160000.8.1.aarch64",
"product": {
"name": "dtb-socionext-6.12.0-160000.8.1.aarch64",
"product_id": "dtb-socionext-6.12.0-160000.8.1.aarch64"
}
},
{
"category": "product_version",
"name": "dtb-sprd-6.12.0-160000.8.1.aarch64",
"product": {
"name": "dtb-sprd-6.12.0-160000.8.1.aarch64",
"product_id": "dtb-sprd-6.12.0-160000.8.1.aarch64"
}
},
{
"category": "product_version",
"name": "dtb-xilinx-6.12.0-160000.8.1.aarch64",
"product": {
"name": "dtb-xilinx-6.12.0-160000.8.1.aarch64",
"product_id": "dtb-xilinx-6.12.0-160000.8.1.aarch64"
}
},
{
"category": "product_version",
"name": "gfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"product": {
"name": "gfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"product_id": "gfs2-kmp-64kb-6.12.0-160000.8.1.aarch64"
}
},
{
"category": "product_version",
"name": "gfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"product": {
"name": "gfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"product_id": "gfs2-kmp-default-6.12.0-160000.8.1.aarch64"
}
},
{
"category": "product_version",
"name": "gfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"product": {
"name": "gfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"product_id": "gfs2-kmp-rt-6.12.0-160000.8.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-64kb-6.12.0-160000.8.1.aarch64",
"product": {
"name": "kernel-64kb-6.12.0-160000.8.1.aarch64",
"product_id": "kernel-64kb-6.12.0-160000.8.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"product": {
"name": "kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"product_id": "kernel-64kb-devel-6.12.0-160000.8.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"product": {
"name": "kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"product_id": "kernel-64kb-extra-6.12.0-160000.8.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-64kb-optional-6.12.0-160000.8.1.aarch64",
"product": {
"name": "kernel-64kb-optional-6.12.0-160000.8.1.aarch64",
"product_id": "kernel-64kb-optional-6.12.0-160000.8.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-default-6.12.0-160000.8.1.aarch64",
"product": {
"name": "kernel-default-6.12.0-160000.8.1.aarch64",
"product_id": "kernel-default-6.12.0-160000.8.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"product": {
"name": "kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"product_id": "kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-default-devel-6.12.0-160000.8.1.aarch64",
"product": {
"name": "kernel-default-devel-6.12.0-160000.8.1.aarch64",
"product_id": "kernel-default-devel-6.12.0-160000.8.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-default-extra-6.12.0-160000.8.1.aarch64",
"product": {
"name": "kernel-default-extra-6.12.0-160000.8.1.aarch64",
"product_id": "kernel-default-extra-6.12.0-160000.8.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-default-optional-6.12.0-160000.8.1.aarch64",
"product": {
"name": "kernel-default-optional-6.12.0-160000.8.1.aarch64",
"product_id": "kernel-default-optional-6.12.0-160000.8.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"product": {
"name": "kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"product_id": "kernel-kvmsmall-6.12.0-160000.8.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"product": {
"name": "kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"product_id": "kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-obs-build-6.12.0-160000.8.1.aarch64",
"product": {
"name": "kernel-obs-build-6.12.0-160000.8.1.aarch64",
"product_id": "kernel-obs-build-6.12.0-160000.8.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"product": {
"name": "kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"product_id": "kernel-obs-qa-6.12.0-160000.8.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-rt-6.12.0-160000.8.1.aarch64",
"product": {
"name": "kernel-rt-6.12.0-160000.8.1.aarch64",
"product_id": "kernel-rt-6.12.0-160000.8.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"product": {
"name": "kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"product_id": "kernel-rt-devel-6.12.0-160000.8.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-rt-extra-6.12.0-160000.8.1.aarch64",
"product": {
"name": "kernel-rt-extra-6.12.0-160000.8.1.aarch64",
"product_id": "kernel-rt-extra-6.12.0-160000.8.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-rt-optional-6.12.0-160000.8.1.aarch64",
"product": {
"name": "kernel-rt-optional-6.12.0-160000.8.1.aarch64",
"product_id": "kernel-rt-optional-6.12.0-160000.8.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-syms-6.12.0-160000.8.1.aarch64",
"product": {
"name": "kernel-syms-6.12.0-160000.8.1.aarch64",
"product_id": "kernel-syms-6.12.0-160000.8.1.aarch64"
}
},
{
"category": "product_version",
"name": "kselftests-kmp-64kb-6.12.0-160000.8.1.aarch64",
"product": {
"name": "kselftests-kmp-64kb-6.12.0-160000.8.1.aarch64",
"product_id": "kselftests-kmp-64kb-6.12.0-160000.8.1.aarch64"
}
},
{
"category": "product_version",
"name": "kselftests-kmp-default-6.12.0-160000.8.1.aarch64",
"product": {
"name": "kselftests-kmp-default-6.12.0-160000.8.1.aarch64",
"product_id": "kselftests-kmp-default-6.12.0-160000.8.1.aarch64"
}
},
{
"category": "product_version",
"name": "kselftests-kmp-rt-6.12.0-160000.8.1.aarch64",
"product": {
"name": "kselftests-kmp-rt-6.12.0-160000.8.1.aarch64",
"product_id": "kselftests-kmp-rt-6.12.0-160000.8.1.aarch64"
}
},
{
"category": "product_version",
"name": "ocfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"product": {
"name": "ocfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"product_id": "ocfs2-kmp-64kb-6.12.0-160000.8.1.aarch64"
}
},
{
"category": "product_version",
"name": "ocfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"product": {
"name": "ocfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"product_id": "ocfs2-kmp-default-6.12.0-160000.8.1.aarch64"
}
},
{
"category": "product_version",
"name": "ocfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"product": {
"name": "ocfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"product_id": "ocfs2-kmp-rt-6.12.0-160000.8.1.aarch64"
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-devel-6.12.0-160000.8.1.noarch",
"product": {
"name": "kernel-devel-6.12.0-160000.8.1.noarch",
"product_id": "kernel-devel-6.12.0-160000.8.1.noarch"
}
},
{
"category": "product_version",
"name": "kernel-docs-6.12.0-160000.8.1.noarch",
"product": {
"name": "kernel-docs-6.12.0-160000.8.1.noarch",
"product_id": "kernel-docs-6.12.0-160000.8.1.noarch"
}
},
{
"category": "product_version",
"name": "kernel-docs-html-6.12.0-160000.8.1.noarch",
"product": {
"name": "kernel-docs-html-6.12.0-160000.8.1.noarch",
"product_id": "kernel-docs-html-6.12.0-160000.8.1.noarch"
}
},
{
"category": "product_version",
"name": "kernel-macros-6.12.0-160000.8.1.noarch",
"product": {
"name": "kernel-macros-6.12.0-160000.8.1.noarch",
"product_id": "kernel-macros-6.12.0-160000.8.1.noarch"
}
},
{
"category": "product_version",
"name": "kernel-source-6.12.0-160000.8.1.noarch",
"product": {
"name": "kernel-source-6.12.0-160000.8.1.noarch",
"product_id": "kernel-source-6.12.0-160000.8.1.noarch"
}
},
{
"category": "product_version",
"name": "kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"product": {
"name": "kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"product_id": "kernel-source-vanilla-6.12.0-160000.8.1.noarch"
}
}
],
"category": "architecture",
"name": "noarch"
},
{
"branches": [
{
"category": "product_version",
"name": "cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"product": {
"name": "cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"product_id": "cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le"
}
},
{
"category": "product_version",
"name": "dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"product": {
"name": "dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"product_id": "dlm-kmp-default-6.12.0-160000.8.1.ppc64le"
}
},
{
"category": "product_version",
"name": "gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"product": {
"name": "gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"product_id": "gfs2-kmp-default-6.12.0-160000.8.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-default-6.12.0-160000.8.1.ppc64le",
"product": {
"name": "kernel-default-6.12.0-160000.8.1.ppc64le",
"product_id": "kernel-default-6.12.0-160000.8.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"product": {
"name": "kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"product_id": "kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"product": {
"name": "kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"product_id": "kernel-default-devel-6.12.0-160000.8.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"product": {
"name": "kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"product_id": "kernel-default-extra-6.12.0-160000.8.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-default-optional-6.12.0-160000.8.1.ppc64le",
"product": {
"name": "kernel-default-optional-6.12.0-160000.8.1.ppc64le",
"product_id": "kernel-default-optional-6.12.0-160000.8.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"product": {
"name": "kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"product_id": "kernel-kvmsmall-6.12.0-160000.8.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"product": {
"name": "kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"product_id": "kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-obs-build-6.12.0-160000.8.1.ppc64le",
"product": {
"name": "kernel-obs-build-6.12.0-160000.8.1.ppc64le",
"product_id": "kernel-obs-build-6.12.0-160000.8.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"product": {
"name": "kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"product_id": "kernel-obs-qa-6.12.0-160000.8.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-syms-6.12.0-160000.8.1.ppc64le",
"product": {
"name": "kernel-syms-6.12.0-160000.8.1.ppc64le",
"product_id": "kernel-syms-6.12.0-160000.8.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kselftests-kmp-default-6.12.0-160000.8.1.ppc64le",
"product": {
"name": "kselftests-kmp-default-6.12.0-160000.8.1.ppc64le",
"product_id": "kselftests-kmp-default-6.12.0-160000.8.1.ppc64le"
}
},
{
"category": "product_version",
"name": "ocfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"product": {
"name": "ocfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"product_id": "ocfs2-kmp-default-6.12.0-160000.8.1.ppc64le"
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"product": {
"name": "cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"product_id": "cluster-md-kmp-default-6.12.0-160000.8.1.s390x"
}
},
{
"category": "product_version",
"name": "dlm-kmp-default-6.12.0-160000.8.1.s390x",
"product": {
"name": "dlm-kmp-default-6.12.0-160000.8.1.s390x",
"product_id": "dlm-kmp-default-6.12.0-160000.8.1.s390x"
}
},
{
"category": "product_version",
"name": "gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"product": {
"name": "gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"product_id": "gfs2-kmp-default-6.12.0-160000.8.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-default-6.12.0-160000.8.1.s390x",
"product": {
"name": "kernel-default-6.12.0-160000.8.1.s390x",
"product_id": "kernel-default-6.12.0-160000.8.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-default-devel-6.12.0-160000.8.1.s390x",
"product": {
"name": "kernel-default-devel-6.12.0-160000.8.1.s390x",
"product_id": "kernel-default-devel-6.12.0-160000.8.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-default-extra-6.12.0-160000.8.1.s390x",
"product": {
"name": "kernel-default-extra-6.12.0-160000.8.1.s390x",
"product_id": "kernel-default-extra-6.12.0-160000.8.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-default-optional-6.12.0-160000.8.1.s390x",
"product": {
"name": "kernel-default-optional-6.12.0-160000.8.1.s390x",
"product_id": "kernel-default-optional-6.12.0-160000.8.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-obs-build-6.12.0-160000.8.1.s390x",
"product": {
"name": "kernel-obs-build-6.12.0-160000.8.1.s390x",
"product_id": "kernel-obs-build-6.12.0-160000.8.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-obs-qa-6.12.0-160000.8.1.s390x",
"product": {
"name": "kernel-obs-qa-6.12.0-160000.8.1.s390x",
"product_id": "kernel-obs-qa-6.12.0-160000.8.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-syms-6.12.0-160000.8.1.s390x",
"product": {
"name": "kernel-syms-6.12.0-160000.8.1.s390x",
"product_id": "kernel-syms-6.12.0-160000.8.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"product": {
"name": "kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"product_id": "kernel-zfcpdump-6.12.0-160000.8.1.s390x"
}
},
{
"category": "product_version",
"name": "kselftests-kmp-default-6.12.0-160000.8.1.s390x",
"product": {
"name": "kselftests-kmp-default-6.12.0-160000.8.1.s390x",
"product_id": "kselftests-kmp-default-6.12.0-160000.8.1.s390x"
}
},
{
"category": "product_version",
"name": "ocfs2-kmp-default-6.12.0-160000.8.1.s390x",
"product": {
"name": "ocfs2-kmp-default-6.12.0-160000.8.1.s390x",
"product_id": "ocfs2-kmp-default-6.12.0-160000.8.1.s390x"
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"product": {
"name": "cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"product_id": "cluster-md-kmp-default-6.12.0-160000.8.1.x86_64"
}
},
{
"category": "product_version",
"name": "cluster-md-kmp-rt-6.12.0-160000.8.1.x86_64",
"product": {
"name": "cluster-md-kmp-rt-6.12.0-160000.8.1.x86_64",
"product_id": "cluster-md-kmp-rt-6.12.0-160000.8.1.x86_64"
}
},
{
"category": "product_version",
"name": "dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"product": {
"name": "dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"product_id": "dlm-kmp-default-6.12.0-160000.8.1.x86_64"
}
},
{
"category": "product_version",
"name": "dlm-kmp-rt-6.12.0-160000.8.1.x86_64",
"product": {
"name": "dlm-kmp-rt-6.12.0-160000.8.1.x86_64",
"product_id": "dlm-kmp-rt-6.12.0-160000.8.1.x86_64"
}
},
{
"category": "product_version",
"name": "gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"product": {
"name": "gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"product_id": "gfs2-kmp-default-6.12.0-160000.8.1.x86_64"
}
},
{
"category": "product_version",
"name": "gfs2-kmp-rt-6.12.0-160000.8.1.x86_64",
"product": {
"name": "gfs2-kmp-rt-6.12.0-160000.8.1.x86_64",
"product_id": "gfs2-kmp-rt-6.12.0-160000.8.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-default-6.12.0-160000.8.1.x86_64",
"product": {
"name": "kernel-default-6.12.0-160000.8.1.x86_64",
"product_id": "kernel-default-6.12.0-160000.8.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"product": {
"name": "kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"product_id": "kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-default-devel-6.12.0-160000.8.1.x86_64",
"product": {
"name": "kernel-default-devel-6.12.0-160000.8.1.x86_64",
"product_id": "kernel-default-devel-6.12.0-160000.8.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-default-extra-6.12.0-160000.8.1.x86_64",
"product": {
"name": "kernel-default-extra-6.12.0-160000.8.1.x86_64",
"product_id": "kernel-default-extra-6.12.0-160000.8.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-default-optional-6.12.0-160000.8.1.x86_64",
"product": {
"name": "kernel-default-optional-6.12.0-160000.8.1.x86_64",
"product_id": "kernel-default-optional-6.12.0-160000.8.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"product": {
"name": "kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"product_id": "kernel-default-vdso-6.12.0-160000.8.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"product": {
"name": "kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"product_id": "kernel-kvmsmall-6.12.0-160000.8.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"product": {
"name": "kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"product_id": "kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"product": {
"name": "kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"product_id": "kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-obs-build-6.12.0-160000.8.1.x86_64",
"product": {
"name": "kernel-obs-build-6.12.0-160000.8.1.x86_64",
"product_id": "kernel-obs-build-6.12.0-160000.8.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"product": {
"name": "kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"product_id": "kernel-obs-qa-6.12.0-160000.8.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-rt-6.12.0-160000.8.1.x86_64",
"product": {
"name": "kernel-rt-6.12.0-160000.8.1.x86_64",
"product_id": "kernel-rt-6.12.0-160000.8.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"product": {
"name": "kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"product_id": "kernel-rt-devel-6.12.0-160000.8.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-rt-extra-6.12.0-160000.8.1.x86_64",
"product": {
"name": "kernel-rt-extra-6.12.0-160000.8.1.x86_64",
"product_id": "kernel-rt-extra-6.12.0-160000.8.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-rt-optional-6.12.0-160000.8.1.x86_64",
"product": {
"name": "kernel-rt-optional-6.12.0-160000.8.1.x86_64",
"product_id": "kernel-rt-optional-6.12.0-160000.8.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-rt-vdso-6.12.0-160000.8.1.x86_64",
"product": {
"name": "kernel-rt-vdso-6.12.0-160000.8.1.x86_64",
"product_id": "kernel-rt-vdso-6.12.0-160000.8.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-syms-6.12.0-160000.8.1.x86_64",
"product": {
"name": "kernel-syms-6.12.0-160000.8.1.x86_64",
"product_id": "kernel-syms-6.12.0-160000.8.1.x86_64"
}
},
{
"category": "product_version",
"name": "kselftests-kmp-default-6.12.0-160000.8.1.x86_64",
"product": {
"name": "kselftests-kmp-default-6.12.0-160000.8.1.x86_64",
"product_id": "kselftests-kmp-default-6.12.0-160000.8.1.x86_64"
}
},
{
"category": "product_version",
"name": "kselftests-kmp-rt-6.12.0-160000.8.1.x86_64",
"product": {
"name": "kselftests-kmp-rt-6.12.0-160000.8.1.x86_64",
"product_id": "kselftests-kmp-rt-6.12.0-160000.8.1.x86_64"
}
},
{
"category": "product_version",
"name": "ocfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"product": {
"name": "ocfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"product_id": "ocfs2-kmp-default-6.12.0-160000.8.1.x86_64"
}
},
{
"category": "product_version",
"name": "ocfs2-kmp-rt-6.12.0-160000.8.1.x86_64",
"product": {
"name": "ocfs2-kmp-rt-6.12.0-160000.8.1.x86_64",
"product_id": "ocfs2-kmp-rt-6.12.0-160000.8.1.x86_64"
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_name",
"name": "openSUSE Leap 16.0",
"product": {
"name": "openSUSE Leap 16.0",
"product_id": "openSUSE Leap 16.0"
}
}
],
"category": "product_family",
"name": "SUSE Linux Enterprise"
}
],
"category": "vendor",
"name": "SUSE"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "cluster-md-kmp-64kb-6.12.0-160000.8.1.aarch64 as component of openSUSE Leap 16.0",
"product_id": "openSUSE Leap 16.0:cluster-md-kmp-64kb-6.12.0-160000.8.1.aarch64"
},
"product_reference": "cluster-md-kmp-64kb-6.12.0-160000.8.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cluster-md-kmp-default-6.12.0-160000.8.1.aarch64 as component of openSUSE Leap 16.0",
"product_id": "openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.aarch64"
},
"product_reference": "cluster-md-kmp-default-6.12.0-160000.8.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le as component of openSUSE Leap 16.0",
"product_id": "openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le"
},
"product_reference": "cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"relates_to_product_reference": "openSUSE Leap 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cluster-md-kmp-default-6.12.0-160000.8.1.s390x as component of openSUSE Leap 16.0",
"product_id": "openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x"
},
"product_reference": "cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"relates_to_product_reference": "openSUSE Leap 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cluster-md-kmp-default-6.12.0-160000.8.1.x86_64 as component of openSUSE Leap 16.0",
"product_id": "openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64"
},
"product_reference": "cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cluster-md-kmp-rt-6.12.0-160000.8.1.aarch64 as component of openSUSE Leap 16.0",
"product_id": "openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.aarch64"
},
"product_reference": "cluster-md-kmp-rt-6.12.0-160000.8.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cluster-md-kmp-rt-6.12.0-160000.8.1.x86_64 as component of openSUSE Leap 16.0",
"product_id": "openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.x86_64"
},
"product_reference": "cluster-md-kmp-rt-6.12.0-160000.8.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dlm-kmp-64kb-6.12.0-160000.8.1.aarch64 as component of openSUSE Leap 16.0",
"product_id": "openSUSE Leap 16.0:dlm-kmp-64kb-6.12.0-160000.8.1.aarch64"
},
"product_reference": "dlm-kmp-64kb-6.12.0-160000.8.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dlm-kmp-default-6.12.0-160000.8.1.aarch64 as component of openSUSE Leap 16.0",
"product_id": "openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.aarch64"
},
"product_reference": "dlm-kmp-default-6.12.0-160000.8.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dlm-kmp-default-6.12.0-160000.8.1.ppc64le as component of openSUSE Leap 16.0",
"product_id": "openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le"
},
"product_reference": "dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"relates_to_product_reference": "openSUSE Leap 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dlm-kmp-default-6.12.0-160000.8.1.s390x as component of openSUSE Leap 16.0",
"product_id": "openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x"
},
"product_reference": "dlm-kmp-default-6.12.0-160000.8.1.s390x",
"relates_to_product_reference": "openSUSE Leap 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dlm-kmp-default-6.12.0-160000.8.1.x86_64 as component of openSUSE Leap 16.0",
"product_id": "openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64"
},
"product_reference": "dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dlm-kmp-rt-6.12.0-160000.8.1.aarch64 as component of openSUSE Leap 16.0",
"product_id": "openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.aarch64"
},
"product_reference": "dlm-kmp-rt-6.12.0-160000.8.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dlm-kmp-rt-6.12.0-160000.8.1.x86_64 as component of openSUSE Leap 16.0",
"product_id": "openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.x86_64"
},
"product_reference": "dlm-kmp-rt-6.12.0-160000.8.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dtb-allwinner-6.12.0-160000.8.1.aarch64 as component of openSUSE Leap 16.0",
"product_id": "openSUSE Leap 16.0:dtb-allwinner-6.12.0-160000.8.1.aarch64"
},
"product_reference": "dtb-allwinner-6.12.0-160000.8.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dtb-altera-6.12.0-160000.8.1.aarch64 as component of openSUSE Leap 16.0",
"product_id": "openSUSE Leap 16.0:dtb-altera-6.12.0-160000.8.1.aarch64"
},
"product_reference": "dtb-altera-6.12.0-160000.8.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dtb-amazon-6.12.0-160000.8.1.aarch64 as component of openSUSE Leap 16.0",
"product_id": "openSUSE Leap 16.0:dtb-amazon-6.12.0-160000.8.1.aarch64"
},
"product_reference": "dtb-amazon-6.12.0-160000.8.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dtb-amd-6.12.0-160000.8.1.aarch64 as component of openSUSE Leap 16.0",
"product_id": "openSUSE Leap 16.0:dtb-amd-6.12.0-160000.8.1.aarch64"
},
"product_reference": "dtb-amd-6.12.0-160000.8.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dtb-amlogic-6.12.0-160000.8.1.aarch64 as component of openSUSE Leap 16.0",
"product_id": "openSUSE Leap 16.0:dtb-amlogic-6.12.0-160000.8.1.aarch64"
},
"product_reference": "dtb-amlogic-6.12.0-160000.8.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dtb-apm-6.12.0-160000.8.1.aarch64 as component of openSUSE Leap 16.0",
"product_id": "openSUSE Leap 16.0:dtb-apm-6.12.0-160000.8.1.aarch64"
},
"product_reference": "dtb-apm-6.12.0-160000.8.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dtb-apple-6.12.0-160000.8.1.aarch64 as component of openSUSE Leap 16.0",
"product_id": "openSUSE Leap 16.0:dtb-apple-6.12.0-160000.8.1.aarch64"
},
"product_reference": "dtb-apple-6.12.0-160000.8.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dtb-arm-6.12.0-160000.8.1.aarch64 as component of openSUSE Leap 16.0",
"product_id": "openSUSE Leap 16.0:dtb-arm-6.12.0-160000.8.1.aarch64"
},
"product_reference": "dtb-arm-6.12.0-160000.8.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dtb-broadcom-6.12.0-160000.8.1.aarch64 as component of openSUSE Leap 16.0",
"product_id": "openSUSE Leap 16.0:dtb-broadcom-6.12.0-160000.8.1.aarch64"
},
"product_reference": "dtb-broadcom-6.12.0-160000.8.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dtb-cavium-6.12.0-160000.8.1.aarch64 as component of openSUSE Leap 16.0",
"product_id": "openSUSE Leap 16.0:dtb-cavium-6.12.0-160000.8.1.aarch64"
},
"product_reference": "dtb-cavium-6.12.0-160000.8.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dtb-exynos-6.12.0-160000.8.1.aarch64 as component of openSUSE Leap 16.0",
"product_id": "openSUSE Leap 16.0:dtb-exynos-6.12.0-160000.8.1.aarch64"
},
"product_reference": "dtb-exynos-6.12.0-160000.8.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dtb-freescale-6.12.0-160000.8.1.aarch64 as component of openSUSE Leap 16.0",
"product_id": "openSUSE Leap 16.0:dtb-freescale-6.12.0-160000.8.1.aarch64"
},
"product_reference": "dtb-freescale-6.12.0-160000.8.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dtb-hisilicon-6.12.0-160000.8.1.aarch64 as component of openSUSE Leap 16.0",
"product_id": "openSUSE Leap 16.0:dtb-hisilicon-6.12.0-160000.8.1.aarch64"
},
"product_reference": "dtb-hisilicon-6.12.0-160000.8.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dtb-lg-6.12.0-160000.8.1.aarch64 as component of openSUSE Leap 16.0",
"product_id": "openSUSE Leap 16.0:dtb-lg-6.12.0-160000.8.1.aarch64"
},
"product_reference": "dtb-lg-6.12.0-160000.8.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dtb-marvell-6.12.0-160000.8.1.aarch64 as component of openSUSE Leap 16.0",
"product_id": "openSUSE Leap 16.0:dtb-marvell-6.12.0-160000.8.1.aarch64"
},
"product_reference": "dtb-marvell-6.12.0-160000.8.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dtb-mediatek-6.12.0-160000.8.1.aarch64 as component of openSUSE Leap 16.0",
"product_id": "openSUSE Leap 16.0:dtb-mediatek-6.12.0-160000.8.1.aarch64"
},
"product_reference": "dtb-mediatek-6.12.0-160000.8.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dtb-nvidia-6.12.0-160000.8.1.aarch64 as component of openSUSE Leap 16.0",
"product_id": "openSUSE Leap 16.0:dtb-nvidia-6.12.0-160000.8.1.aarch64"
},
"product_reference": "dtb-nvidia-6.12.0-160000.8.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dtb-qcom-6.12.0-160000.8.1.aarch64 as component of openSUSE Leap 16.0",
"product_id": "openSUSE Leap 16.0:dtb-qcom-6.12.0-160000.8.1.aarch64"
},
"product_reference": "dtb-qcom-6.12.0-160000.8.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dtb-renesas-6.12.0-160000.8.1.aarch64 as component of openSUSE Leap 16.0",
"product_id": "openSUSE Leap 16.0:dtb-renesas-6.12.0-160000.8.1.aarch64"
},
"product_reference": "dtb-renesas-6.12.0-160000.8.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dtb-rockchip-6.12.0-160000.8.1.aarch64 as component of openSUSE Leap 16.0",
"product_id": "openSUSE Leap 16.0:dtb-rockchip-6.12.0-160000.8.1.aarch64"
},
"product_reference": "dtb-rockchip-6.12.0-160000.8.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dtb-socionext-6.12.0-160000.8.1.aarch64 as component of openSUSE Leap 16.0",
"product_id": "openSUSE Leap 16.0:dtb-socionext-6.12.0-160000.8.1.aarch64"
},
"product_reference": "dtb-socionext-6.12.0-160000.8.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dtb-sprd-6.12.0-160000.8.1.aarch64 as component of openSUSE Leap 16.0",
"product_id": "openSUSE Leap 16.0:dtb-sprd-6.12.0-160000.8.1.aarch64"
},
"product_reference": "dtb-sprd-6.12.0-160000.8.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dtb-xilinx-6.12.0-160000.8.1.aarch64 as component of openSUSE Leap 16.0",
"product_id": "openSUSE Leap 16.0:dtb-xilinx-6.12.0-160000.8.1.aarch64"
},
"product_reference": "dtb-xilinx-6.12.0-160000.8.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "gfs2-kmp-64kb-6.12.0-160000.8.1.aarch64 as component of openSUSE Leap 16.0",
"product_id": "openSUSE Leap 16.0:gfs2-kmp-64kb-6.12.0-160000.8.1.aarch64"
},
"product_reference": "gfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "gfs2-kmp-default-6.12.0-160000.8.1.aarch64 as component of openSUSE Leap 16.0",
"product_id": "openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.aarch64"
},
"product_reference": "gfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "gfs2-kmp-default-6.12.0-160000.8.1.ppc64le as component of openSUSE Leap 16.0",
"product_id": "openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le"
},
"product_reference": "gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"relates_to_product_reference": "openSUSE Leap 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "gfs2-kmp-default-6.12.0-160000.8.1.s390x as component of openSUSE Leap 16.0",
"product_id": "openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x"
},
"product_reference": "gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"relates_to_product_reference": "openSUSE Leap 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "gfs2-kmp-default-6.12.0-160000.8.1.x86_64 as component of openSUSE Leap 16.0",
"product_id": "openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64"
},
"product_reference": "gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "gfs2-kmp-rt-6.12.0-160000.8.1.aarch64 as component of openSUSE Leap 16.0",
"product_id": "openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.aarch64"
},
"product_reference": "gfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "gfs2-kmp-rt-6.12.0-160000.8.1.x86_64 as component of openSUSE Leap 16.0",
"product_id": "openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.x86_64"
},
"product_reference": "gfs2-kmp-rt-6.12.0-160000.8.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-64kb-6.12.0-160000.8.1.aarch64 as component of openSUSE Leap 16.0",
"product_id": "openSUSE Leap 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64"
},
"product_reference": "kernel-64kb-6.12.0-160000.8.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-64kb-devel-6.12.0-160000.8.1.aarch64 as component of openSUSE Leap 16.0",
"product_id": "openSUSE Leap 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64"
},
"product_reference": "kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-64kb-extra-6.12.0-160000.8.1.aarch64 as component of openSUSE Leap 16.0",
"product_id": "openSUSE Leap 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64"
},
"product_reference": "kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-64kb-optional-6.12.0-160000.8.1.aarch64 as component of openSUSE Leap 16.0",
"product_id": "openSUSE Leap 16.0:kernel-64kb-optional-6.12.0-160000.8.1.aarch64"
},
"product_reference": "kernel-64kb-optional-6.12.0-160000.8.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-6.12.0-160000.8.1.aarch64 as component of openSUSE Leap 16.0",
"product_id": "openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.aarch64"
},
"product_reference": "kernel-default-6.12.0-160000.8.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-6.12.0-160000.8.1.ppc64le as component of openSUSE Leap 16.0",
"product_id": "openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.ppc64le"
},
"product_reference": "kernel-default-6.12.0-160000.8.1.ppc64le",
"relates_to_product_reference": "openSUSE Leap 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-6.12.0-160000.8.1.s390x as component of openSUSE Leap 16.0",
"product_id": "openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.s390x"
},
"product_reference": "kernel-default-6.12.0-160000.8.1.s390x",
"relates_to_product_reference": "openSUSE Leap 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-6.12.0-160000.8.1.x86_64 as component of openSUSE Leap 16.0",
"product_id": "openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.x86_64"
},
"product_reference": "kernel-default-6.12.0-160000.8.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64 as component of openSUSE Leap 16.0",
"product_id": "openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64"
},
"product_reference": "kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"relates_to_product_reference": "openSUSE Leap 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le as component of openSUSE Leap 16.0",
"product_id": "openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le"
},
"product_reference": "kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"relates_to_product_reference": "openSUSE Leap 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64 as component of openSUSE Leap 16.0",
"product_id": "openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64"
},
"product_reference": "kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"relates_to_product_reference": "openSUSE Leap 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-devel-6.12.0-160000.8.1.aarch64 as component of openSUSE Leap 16.0",
"product_id": "openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64"
},
"product_reference": "kernel-default-devel-6.12.0-160000.8.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-devel-6.12.0-160000.8.1.ppc64le as component of openSUSE Leap 16.0",
"product_id": "openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le"
},
"product_reference": "kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"relates_to_product_reference": "openSUSE Leap 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-devel-6.12.0-160000.8.1.s390x as component of openSUSE Leap 16.0",
"product_id": "openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x"
},
"product_reference": "kernel-default-devel-6.12.0-160000.8.1.s390x",
"relates_to_product_reference": "openSUSE Leap 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-devel-6.12.0-160000.8.1.x86_64 as component of openSUSE Leap 16.0",
"product_id": "openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64"
},
"product_reference": "kernel-default-devel-6.12.0-160000.8.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-extra-6.12.0-160000.8.1.aarch64 as component of openSUSE Leap 16.0",
"product_id": "openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64"
},
"product_reference": "kernel-default-extra-6.12.0-160000.8.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-extra-6.12.0-160000.8.1.ppc64le as component of openSUSE Leap 16.0",
"product_id": "openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le"
},
"product_reference": "kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"relates_to_product_reference": "openSUSE Leap 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-extra-6.12.0-160000.8.1.s390x as component of openSUSE Leap 16.0",
"product_id": "openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x"
},
"product_reference": "kernel-default-extra-6.12.0-160000.8.1.s390x",
"relates_to_product_reference": "openSUSE Leap 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-extra-6.12.0-160000.8.1.x86_64 as component of openSUSE Leap 16.0",
"product_id": "openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64"
},
"product_reference": "kernel-default-extra-6.12.0-160000.8.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-optional-6.12.0-160000.8.1.aarch64 as component of openSUSE Leap 16.0",
"product_id": "openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.aarch64"
},
"product_reference": "kernel-default-optional-6.12.0-160000.8.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-optional-6.12.0-160000.8.1.ppc64le as component of openSUSE Leap 16.0",
"product_id": "openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.ppc64le"
},
"product_reference": "kernel-default-optional-6.12.0-160000.8.1.ppc64le",
"relates_to_product_reference": "openSUSE Leap 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-optional-6.12.0-160000.8.1.s390x as component of openSUSE Leap 16.0",
"product_id": "openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.s390x"
},
"product_reference": "kernel-default-optional-6.12.0-160000.8.1.s390x",
"relates_to_product_reference": "openSUSE Leap 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-optional-6.12.0-160000.8.1.x86_64 as component of openSUSE Leap 16.0",
"product_id": "openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.x86_64"
},
"product_reference": "kernel-default-optional-6.12.0-160000.8.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-vdso-6.12.0-160000.8.1.x86_64 as component of openSUSE Leap 16.0",
"product_id": "openSUSE Leap 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64"
},
"product_reference": "kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-6.12.0-160000.8.1.noarch as component of openSUSE Leap 16.0",
"product_id": "openSUSE Leap 16.0:kernel-devel-6.12.0-160000.8.1.noarch"
},
"product_reference": "kernel-devel-6.12.0-160000.8.1.noarch",
"relates_to_product_reference": "openSUSE Leap 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-docs-6.12.0-160000.8.1.noarch as component of openSUSE Leap 16.0",
"product_id": "openSUSE Leap 16.0:kernel-docs-6.12.0-160000.8.1.noarch"
},
"product_reference": "kernel-docs-6.12.0-160000.8.1.noarch",
"relates_to_product_reference": "openSUSE Leap 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-docs-html-6.12.0-160000.8.1.noarch as component of openSUSE Leap 16.0",
"product_id": "openSUSE Leap 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch"
},
"product_reference": "kernel-docs-html-6.12.0-160000.8.1.noarch",
"relates_to_product_reference": "openSUSE Leap 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kvmsmall-6.12.0-160000.8.1.aarch64 as component of openSUSE Leap 16.0",
"product_id": "openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64"
},
"product_reference": "kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kvmsmall-6.12.0-160000.8.1.ppc64le as component of openSUSE Leap 16.0",
"product_id": "openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le"
},
"product_reference": "kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"relates_to_product_reference": "openSUSE Leap 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kvmsmall-6.12.0-160000.8.1.x86_64 as component of openSUSE Leap 16.0",
"product_id": "openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64"
},
"product_reference": "kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64 as component of openSUSE Leap 16.0",
"product_id": "openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64"
},
"product_reference": "kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le as component of openSUSE Leap 16.0",
"product_id": "openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le"
},
"product_reference": "kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"relates_to_product_reference": "openSUSE Leap 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64 as component of openSUSE Leap 16.0",
"product_id": "openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64"
},
"product_reference": "kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64 as component of openSUSE Leap 16.0",
"product_id": "openSUSE Leap 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64"
},
"product_reference": "kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-macros-6.12.0-160000.8.1.noarch as component of openSUSE Leap 16.0",
"product_id": "openSUSE Leap 16.0:kernel-macros-6.12.0-160000.8.1.noarch"
},
"product_reference": "kernel-macros-6.12.0-160000.8.1.noarch",
"relates_to_product_reference": "openSUSE Leap 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-obs-build-6.12.0-160000.8.1.aarch64 as component of openSUSE Leap 16.0",
"product_id": "openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.aarch64"
},
"product_reference": "kernel-obs-build-6.12.0-160000.8.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-obs-build-6.12.0-160000.8.1.ppc64le as component of openSUSE Leap 16.0",
"product_id": "openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.ppc64le"
},
"product_reference": "kernel-obs-build-6.12.0-160000.8.1.ppc64le",
"relates_to_product_reference": "openSUSE Leap 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-obs-build-6.12.0-160000.8.1.s390x as component of openSUSE Leap 16.0",
"product_id": "openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.s390x"
},
"product_reference": "kernel-obs-build-6.12.0-160000.8.1.s390x",
"relates_to_product_reference": "openSUSE Leap 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-obs-build-6.12.0-160000.8.1.x86_64 as component of openSUSE Leap 16.0",
"product_id": "openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.x86_64"
},
"product_reference": "kernel-obs-build-6.12.0-160000.8.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-obs-qa-6.12.0-160000.8.1.aarch64 as component of openSUSE Leap 16.0",
"product_id": "openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64"
},
"product_reference": "kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-obs-qa-6.12.0-160000.8.1.ppc64le as component of openSUSE Leap 16.0",
"product_id": "openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le"
},
"product_reference": "kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"relates_to_product_reference": "openSUSE Leap 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-obs-qa-6.12.0-160000.8.1.s390x as component of openSUSE Leap 16.0",
"product_id": "openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x"
},
"product_reference": "kernel-obs-qa-6.12.0-160000.8.1.s390x",
"relates_to_product_reference": "openSUSE Leap 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-obs-qa-6.12.0-160000.8.1.x86_64 as component of openSUSE Leap 16.0",
"product_id": "openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64"
},
"product_reference": "kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-6.12.0-160000.8.1.aarch64 as component of openSUSE Leap 16.0",
"product_id": "openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.aarch64"
},
"product_reference": "kernel-rt-6.12.0-160000.8.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-6.12.0-160000.8.1.x86_64 as component of openSUSE Leap 16.0",
"product_id": "openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.x86_64"
},
"product_reference": "kernel-rt-6.12.0-160000.8.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-devel-6.12.0-160000.8.1.aarch64 as component of openSUSE Leap 16.0",
"product_id": "openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.aarch64"
},
"product_reference": "kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-devel-6.12.0-160000.8.1.x86_64 as component of openSUSE Leap 16.0",
"product_id": "openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.x86_64"
},
"product_reference": "kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-extra-6.12.0-160000.8.1.aarch64 as component of openSUSE Leap 16.0",
"product_id": "openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.aarch64"
},
"product_reference": "kernel-rt-extra-6.12.0-160000.8.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-extra-6.12.0-160000.8.1.x86_64 as component of openSUSE Leap 16.0",
"product_id": "openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.x86_64"
},
"product_reference": "kernel-rt-extra-6.12.0-160000.8.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-optional-6.12.0-160000.8.1.aarch64 as component of openSUSE Leap 16.0",
"product_id": "openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.aarch64"
},
"product_reference": "kernel-rt-optional-6.12.0-160000.8.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-optional-6.12.0-160000.8.1.x86_64 as component of openSUSE Leap 16.0",
"product_id": "openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.x86_64"
},
"product_reference": "kernel-rt-optional-6.12.0-160000.8.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-vdso-6.12.0-160000.8.1.x86_64 as component of openSUSE Leap 16.0",
"product_id": "openSUSE Leap 16.0:kernel-rt-vdso-6.12.0-160000.8.1.x86_64"
},
"product_reference": "kernel-rt-vdso-6.12.0-160000.8.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-source-6.12.0-160000.8.1.noarch as component of openSUSE Leap 16.0",
"product_id": "openSUSE Leap 16.0:kernel-source-6.12.0-160000.8.1.noarch"
},
"product_reference": "kernel-source-6.12.0-160000.8.1.noarch",
"relates_to_product_reference": "openSUSE Leap 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-source-vanilla-6.12.0-160000.8.1.noarch as component of openSUSE Leap 16.0",
"product_id": "openSUSE Leap 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch"
},
"product_reference": "kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"relates_to_product_reference": "openSUSE Leap 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-syms-6.12.0-160000.8.1.aarch64 as component of openSUSE Leap 16.0",
"product_id": "openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.aarch64"
},
"product_reference": "kernel-syms-6.12.0-160000.8.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-syms-6.12.0-160000.8.1.ppc64le as component of openSUSE Leap 16.0",
"product_id": "openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le"
},
"product_reference": "kernel-syms-6.12.0-160000.8.1.ppc64le",
"relates_to_product_reference": "openSUSE Leap 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-syms-6.12.0-160000.8.1.s390x as component of openSUSE Leap 16.0",
"product_id": "openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.s390x"
},
"product_reference": "kernel-syms-6.12.0-160000.8.1.s390x",
"relates_to_product_reference": "openSUSE Leap 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-syms-6.12.0-160000.8.1.x86_64 as component of openSUSE Leap 16.0",
"product_id": "openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.x86_64"
},
"product_reference": "kernel-syms-6.12.0-160000.8.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-zfcpdump-6.12.0-160000.8.1.s390x as component of openSUSE Leap 16.0",
"product_id": "openSUSE Leap 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x"
},
"product_reference": "kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"relates_to_product_reference": "openSUSE Leap 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kselftests-kmp-64kb-6.12.0-160000.8.1.aarch64 as component of openSUSE Leap 16.0",
"product_id": "openSUSE Leap 16.0:kselftests-kmp-64kb-6.12.0-160000.8.1.aarch64"
},
"product_reference": "kselftests-kmp-64kb-6.12.0-160000.8.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kselftests-kmp-default-6.12.0-160000.8.1.aarch64 as component of openSUSE Leap 16.0",
"product_id": "openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.aarch64"
},
"product_reference": "kselftests-kmp-default-6.12.0-160000.8.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kselftests-kmp-default-6.12.0-160000.8.1.ppc64le as component of openSUSE Leap 16.0",
"product_id": "openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.ppc64le"
},
"product_reference": "kselftests-kmp-default-6.12.0-160000.8.1.ppc64le",
"relates_to_product_reference": "openSUSE Leap 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kselftests-kmp-default-6.12.0-160000.8.1.s390x as component of openSUSE Leap 16.0",
"product_id": "openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.s390x"
},
"product_reference": "kselftests-kmp-default-6.12.0-160000.8.1.s390x",
"relates_to_product_reference": "openSUSE Leap 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kselftests-kmp-default-6.12.0-160000.8.1.x86_64 as component of openSUSE Leap 16.0",
"product_id": "openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.x86_64"
},
"product_reference": "kselftests-kmp-default-6.12.0-160000.8.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kselftests-kmp-rt-6.12.0-160000.8.1.aarch64 as component of openSUSE Leap 16.0",
"product_id": "openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.aarch64"
},
"product_reference": "kselftests-kmp-rt-6.12.0-160000.8.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kselftests-kmp-rt-6.12.0-160000.8.1.x86_64 as component of openSUSE Leap 16.0",
"product_id": "openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.x86_64"
},
"product_reference": "kselftests-kmp-rt-6.12.0-160000.8.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ocfs2-kmp-64kb-6.12.0-160000.8.1.aarch64 as component of openSUSE Leap 16.0",
"product_id": "openSUSE Leap 16.0:ocfs2-kmp-64kb-6.12.0-160000.8.1.aarch64"
},
"product_reference": "ocfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ocfs2-kmp-default-6.12.0-160000.8.1.aarch64 as component of openSUSE Leap 16.0",
"product_id": "openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.aarch64"
},
"product_reference": "ocfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ocfs2-kmp-default-6.12.0-160000.8.1.ppc64le as component of openSUSE Leap 16.0",
"product_id": "openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.ppc64le"
},
"product_reference": "ocfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"relates_to_product_reference": "openSUSE Leap 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ocfs2-kmp-default-6.12.0-160000.8.1.s390x as component of openSUSE Leap 16.0",
"product_id": "openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.s390x"
},
"product_reference": "ocfs2-kmp-default-6.12.0-160000.8.1.s390x",
"relates_to_product_reference": "openSUSE Leap 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ocfs2-kmp-default-6.12.0-160000.8.1.x86_64 as component of openSUSE Leap 16.0",
"product_id": "openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.x86_64"
},
"product_reference": "ocfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ocfs2-kmp-rt-6.12.0-160000.8.1.aarch64 as component of openSUSE Leap 16.0",
"product_id": "openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.aarch64"
},
"product_reference": "ocfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ocfs2-kmp-rt-6.12.0-160000.8.1.x86_64 as component of openSUSE Leap 16.0",
"product_id": "openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.x86_64"
},
"product_reference": "ocfs2-kmp-rt-6.12.0-160000.8.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 16.0"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2022-50253",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-50253"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nbpf: make sure skb-\u003elen != 0 when redirecting to a tunneling device\n\nsyzkaller managed to trigger another case where skb-\u003elen == 0\nwhen we enter __dev_queue_xmit:\n\nWARNING: CPU: 0 PID: 2470 at include/linux/skbuff.h:2576 skb_assert_len include/linux/skbuff.h:2576 [inline]\nWARNING: CPU: 0 PID: 2470 at include/linux/skbuff.h:2576 __dev_queue_xmit+0x2069/0x35e0 net/core/dev.c:4295\n\nCall Trace:\n dev_queue_xmit+0x17/0x20 net/core/dev.c:4406\n __bpf_tx_skb net/core/filter.c:2115 [inline]\n __bpf_redirect_no_mac net/core/filter.c:2140 [inline]\n __bpf_redirect+0x5fb/0xda0 net/core/filter.c:2163\n ____bpf_clone_redirect net/core/filter.c:2447 [inline]\n bpf_clone_redirect+0x247/0x390 net/core/filter.c:2419\n bpf_prog_48159a89cb4a9a16+0x59/0x5e\n bpf_dispatcher_nop_func include/linux/bpf.h:897 [inline]\n __bpf_prog_run include/linux/filter.h:596 [inline]\n bpf_prog_run include/linux/filter.h:603 [inline]\n bpf_test_run+0x46c/0x890 net/bpf/test_run.c:402\n bpf_prog_test_run_skb+0xbdc/0x14c0 net/bpf/test_run.c:1170\n bpf_prog_test_run+0x345/0x3c0 kernel/bpf/syscall.c:3648\n __sys_bpf+0x43a/0x6c0 kernel/bpf/syscall.c:5005\n __do_sys_bpf kernel/bpf/syscall.c:5091 [inline]\n __se_sys_bpf kernel/bpf/syscall.c:5089 [inline]\n __x64_sys_bpf+0x7c/0x90 kernel/bpf/syscall.c:5089\n do_syscall_64+0x54/0x70 arch/x86/entry/common.c:48\n entry_SYSCALL_64_after_hwframe+0x61/0xc6\n\nThe reproducer doesn\u0027t really reproduce outside of syzkaller\nenvironment, so I\u0027m taking a guess here. It looks like we\ndo generate correct ETH_HLEN-sized packet, but we redirect\nthe packet to the tunneling device. Before we do so, we\n__skb_pull l2 header and arrive again at skb-\u003elen == 0.\nDoesn\u0027t seem like we can do anything better than having\nan explicit check after __skb_pull?",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 16.0:cluster-md-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dtb-allwinner-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-altera-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amazon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amlogic-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apple-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-arm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-broadcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-cavium-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-exynos-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-freescale-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-hisilicon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-lg-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-marvell-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-mediatek-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-nvidia-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-qcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-renesas-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-rockchip-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-socionext-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-sprd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-xilinx-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-50253",
"url": "https://www.suse.com/security/cve/CVE-2022-50253"
},
{
"category": "external",
"summary": "SUSE Bug 1249912 for CVE-2022-50253",
"url": "https://bugzilla.suse.com/1249912"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 16.0:cluster-md-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dtb-allwinner-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-altera-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amazon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amlogic-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apple-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-arm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-broadcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-cavium-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-exynos-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-freescale-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-hisilicon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-lg-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-marvell-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-mediatek-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-nvidia-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-qcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-renesas-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-rockchip-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-socionext-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-sprd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-xilinx-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"openSUSE Leap 16.0:cluster-md-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dtb-allwinner-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-altera-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amazon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amlogic-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apple-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-arm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-broadcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-cavium-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-exynos-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-freescale-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-hisilicon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-lg-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-marvell-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-mediatek-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-nvidia-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-qcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-renesas-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-rockchip-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-socionext-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-sprd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-xilinx-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-19T17:38:16Z",
"details": "moderate"
}
],
"title": "CVE-2022-50253"
},
{
"cve": "CVE-2025-37916",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-37916"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\npds_core: remove write-after-free of client_id\n\nA use-after-free error popped up in stress testing:\n\n[Mon Apr 21 21:21:33 2025] BUG: KFENCE: use-after-free write in pdsc_auxbus_dev_del+0xef/0x160 [pds_core]\n[Mon Apr 21 21:21:33 2025] Use-after-free write at 0x000000007013ecd1 (in kfence-#47):\n[Mon Apr 21 21:21:33 2025] pdsc_auxbus_dev_del+0xef/0x160 [pds_core]\n[Mon Apr 21 21:21:33 2025] pdsc_remove+0xc0/0x1b0 [pds_core]\n[Mon Apr 21 21:21:33 2025] pci_device_remove+0x24/0x70\n[Mon Apr 21 21:21:33 2025] device_release_driver_internal+0x11f/0x180\n[Mon Apr 21 21:21:33 2025] driver_detach+0x45/0x80\n[Mon Apr 21 21:21:33 2025] bus_remove_driver+0x83/0xe0\n[Mon Apr 21 21:21:33 2025] pci_unregister_driver+0x1a/0x80\n\nThe actual device uninit usually happens on a separate thread\nscheduled after this code runs, but there is no guarantee of order\nof thread execution, so this could be a problem. There\u0027s no\nactual need to clear the client_id at this point, so simply\nremove the offending code.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 16.0:cluster-md-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dtb-allwinner-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-altera-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amazon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amlogic-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apple-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-arm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-broadcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-cavium-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-exynos-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-freescale-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-hisilicon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-lg-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-marvell-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-mediatek-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-nvidia-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-qcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-renesas-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-rockchip-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-socionext-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-sprd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-xilinx-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-37916",
"url": "https://www.suse.com/security/cve/CVE-2025-37916"
},
{
"category": "external",
"summary": "SUSE Bug 1243474 for CVE-2025-37916",
"url": "https://bugzilla.suse.com/1243474"
},
{
"category": "external",
"summary": "SUSE Bug 1243535 for CVE-2025-37916",
"url": "https://bugzilla.suse.com/1243535"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 16.0:cluster-md-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dtb-allwinner-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-altera-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amazon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amlogic-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apple-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-arm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-broadcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-cavium-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-exynos-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-freescale-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-hisilicon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-lg-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-marvell-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-mediatek-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-nvidia-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-qcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-renesas-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-rockchip-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-socionext-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-sprd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-xilinx-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"openSUSE Leap 16.0:cluster-md-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dtb-allwinner-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-altera-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amazon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amlogic-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apple-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-arm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-broadcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-cavium-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-exynos-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-freescale-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-hisilicon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-lg-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-marvell-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-mediatek-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-nvidia-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-qcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-renesas-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-rockchip-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-socionext-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-sprd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-xilinx-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-19T17:38:16Z",
"details": "moderate"
}
],
"title": "CVE-2025-37916"
},
{
"cve": "CVE-2025-38084",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-38084"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nmm/hugetlb: unshare page tables during VMA split, not before\n\nCurrently, __split_vma() triggers hugetlb page table unsharing through\nvm_ops-\u003emay_split(). This happens before the VMA lock and rmap locks are\ntaken - which is too early, it allows racing VMA-locked page faults in our\nprocess and racing rmap walks from other processes to cause page tables to\nbe shared again before we actually perform the split.\n\nFix it by explicitly calling into the hugetlb unshare logic from\n__split_vma() in the same place where THP splitting also happens. At that\npoint, both the VMA and the rmap(s) are write-locked.\n\nAn annoying detail is that we can now call into the helper\nhugetlb_unshare_pmds() from two different locking contexts:\n\n1. from hugetlb_split(), holding:\n - mmap lock (exclusively)\n - VMA lock\n - file rmap lock (exclusively)\n2. hugetlb_unshare_all_pmds(), which I think is designed to be able to\n call us with only the mmap lock held (in shared mode), but currently\n only runs while holding mmap lock (exclusively) and VMA lock\n\nBackporting note:\nThis commit fixes a racy protection that was introduced in commit\nb30c14cd6102 (\"hugetlb: unshare some PMDs when splitting VMAs\"); that\ncommit claimed to fix an issue introduced in 5.13, but it should actually\nalso go all the way back.\n\n[jannh@google.com: v2]",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 16.0:cluster-md-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dtb-allwinner-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-altera-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amazon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amlogic-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apple-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-arm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-broadcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-cavium-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-exynos-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-freescale-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-hisilicon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-lg-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-marvell-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-mediatek-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-nvidia-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-qcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-renesas-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-rockchip-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-socionext-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-sprd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-xilinx-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-38084",
"url": "https://www.suse.com/security/cve/CVE-2025-38084"
},
{
"category": "external",
"summary": "SUSE Bug 1245498 for CVE-2025-38084",
"url": "https://bugzilla.suse.com/1245498"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 16.0:cluster-md-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dtb-allwinner-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-altera-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amazon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amlogic-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apple-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-arm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-broadcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-cavium-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-exynos-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-freescale-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-hisilicon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-lg-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-marvell-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-mediatek-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-nvidia-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-qcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-renesas-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-rockchip-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-socionext-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-sprd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-xilinx-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.8,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:H",
"version": "3.1"
},
"products": [
"openSUSE Leap 16.0:cluster-md-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dtb-allwinner-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-altera-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amazon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amlogic-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apple-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-arm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-broadcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-cavium-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-exynos-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-freescale-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-hisilicon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-lg-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-marvell-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-mediatek-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-nvidia-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-qcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-renesas-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-rockchip-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-socionext-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-sprd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-xilinx-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-19T17:38:16Z",
"details": "moderate"
}
],
"title": "CVE-2025-38084"
},
{
"cve": "CVE-2025-38085",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-38085"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nmm/hugetlb: fix huge_pmd_unshare() vs GUP-fast race\n\nhuge_pmd_unshare() drops a reference on a page table that may have\npreviously been shared across processes, potentially turning it into a\nnormal page table used in another process in which unrelated VMAs can\nafterwards be installed.\n\nIf this happens in the middle of a concurrent gup_fast(), gup_fast() could\nend up walking the page tables of another process. While I don\u0027t see any\nway in which that immediately leads to kernel memory corruption, it is\nreally weird and unexpected.\n\nFix it with an explicit broadcast IPI through tlb_remove_table_sync_one(),\njust like we do in khugepaged when removing page tables for a THP\ncollapse.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 16.0:cluster-md-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dtb-allwinner-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-altera-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amazon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amlogic-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apple-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-arm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-broadcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-cavium-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-exynos-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-freescale-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-hisilicon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-lg-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-marvell-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-mediatek-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-nvidia-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-qcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-renesas-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-rockchip-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-socionext-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-sprd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-xilinx-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-38085",
"url": "https://www.suse.com/security/cve/CVE-2025-38085"
},
{
"category": "external",
"summary": "SUSE Bug 1245499 for CVE-2025-38085",
"url": "https://bugzilla.suse.com/1245499"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 16.0:cluster-md-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dtb-allwinner-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-altera-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amazon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amlogic-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apple-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-arm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-broadcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-cavium-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-exynos-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-freescale-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-hisilicon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-lg-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-marvell-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-mediatek-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-nvidia-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-qcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-renesas-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-rockchip-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-socionext-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-sprd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-xilinx-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.6,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H",
"version": "3.1"
},
"products": [
"openSUSE Leap 16.0:cluster-md-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dtb-allwinner-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-altera-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amazon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amlogic-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apple-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-arm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-broadcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-cavium-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-exynos-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-freescale-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-hisilicon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-lg-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-marvell-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-mediatek-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-nvidia-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-qcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-renesas-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-rockchip-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-socionext-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-sprd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-xilinx-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-19T17:38:16Z",
"details": "moderate"
}
],
"title": "CVE-2025-38085"
},
{
"cve": "CVE-2025-38321",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-38321"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nsmb: Log an error when close_all_cached_dirs fails\n\nUnder low-memory conditions, close_all_cached_dirs() can\u0027t move the\ndentries to a separate list to dput() them once the locks are dropped.\nThis will result in a \"Dentry still in use\" error, so add an error\nmessage that makes it clear this is what happened:\n\n[ 495.281119] CIFS: VFS: \\\\otters.example.com\\share Out of memory while dropping dentries\n[ 495.281595] ------------[ cut here ]------------\n[ 495.281887] BUG: Dentry ffff888115531138{i=78,n=/} still in use (2) [unmount of cifs cifs]\n[ 495.282391] WARNING: CPU: 1 PID: 2329 at fs/dcache.c:1536 umount_check+0xc8/0xf0\n\nAlso, bail out of looping through all tcons as soon as a single\nallocation fails, since we\u0027re already in trouble, and kmalloc() attempts\nfor subseqeuent tcons are likely to fail just like the first one did.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 16.0:cluster-md-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dtb-allwinner-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-altera-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amazon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amlogic-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apple-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-arm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-broadcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-cavium-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-exynos-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-freescale-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-hisilicon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-lg-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-marvell-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-mediatek-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-nvidia-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-qcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-renesas-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-rockchip-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-socionext-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-sprd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-xilinx-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-38321",
"url": "https://www.suse.com/security/cve/CVE-2025-38321"
},
{
"category": "external",
"summary": "SUSE Bug 1246328 for CVE-2025-38321",
"url": "https://bugzilla.suse.com/1246328"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 16.0:cluster-md-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dtb-allwinner-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-altera-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amazon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amlogic-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apple-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-arm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-broadcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-cavium-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-exynos-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-freescale-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-hisilicon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-lg-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-marvell-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-mediatek-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-nvidia-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-qcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-renesas-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-rockchip-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-socionext-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-sprd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-xilinx-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L",
"version": "3.1"
},
"products": [
"openSUSE Leap 16.0:cluster-md-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dtb-allwinner-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-altera-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amazon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amlogic-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apple-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-arm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-broadcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-cavium-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-exynos-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-freescale-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-hisilicon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-lg-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-marvell-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-mediatek-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-nvidia-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-qcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-renesas-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-rockchip-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-socionext-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-sprd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-xilinx-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-19T17:38:16Z",
"details": "moderate"
}
],
"title": "CVE-2025-38321"
},
{
"cve": "CVE-2025-38728",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-38728"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nsmb3: fix for slab out of bounds on mount to ksmbd\n\nWith KASAN enabled, it is possible to get a slab out of bounds\nduring mount to ksmbd due to missing check in parse_server_interfaces()\n(see below):\n\n BUG: KASAN: slab-out-of-bounds in\n parse_server_interfaces+0x14ee/0x1880 [cifs]\n Read of size 4 at addr ffff8881433dba98 by task mount/9827\n\n CPU: 5 UID: 0 PID: 9827 Comm: mount Tainted: G\n OE 6.16.0-rc2-kasan #2 PREEMPT(voluntary)\n Tainted: [O]=OOT_MODULE, [E]=UNSIGNED_MODULE\n Hardware name: Dell Inc. Precision Tower 3620/0MWYPT,\n BIOS 2.13.1 06/14/2019\n Call Trace:\n \u003cTASK\u003e\n dump_stack_lvl+0x9f/0xf0\n print_report+0xd1/0x670\n __virt_addr_valid+0x22c/0x430\n ? parse_server_interfaces+0x14ee/0x1880 [cifs]\n ? kasan_complete_mode_report_info+0x2a/0x1f0\n ? parse_server_interfaces+0x14ee/0x1880 [cifs]\n kasan_report+0xd6/0x110\n parse_server_interfaces+0x14ee/0x1880 [cifs]\n __asan_report_load_n_noabort+0x13/0x20\n parse_server_interfaces+0x14ee/0x1880 [cifs]\n ? __pfx_parse_server_interfaces+0x10/0x10 [cifs]\n ? trace_hardirqs_on+0x51/0x60\n SMB3_request_interfaces+0x1ad/0x3f0 [cifs]\n ? __pfx_SMB3_request_interfaces+0x10/0x10 [cifs]\n ? SMB2_tcon+0x23c/0x15d0 [cifs]\n smb3_qfs_tcon+0x173/0x2b0 [cifs]\n ? __pfx_smb3_qfs_tcon+0x10/0x10 [cifs]\n ? cifs_get_tcon+0x105d/0x2120 [cifs]\n ? do_raw_spin_unlock+0x5d/0x200\n ? cifs_get_tcon+0x105d/0x2120 [cifs]\n ? __pfx_smb3_qfs_tcon+0x10/0x10 [cifs]\n cifs_mount_get_tcon+0x369/0xb90 [cifs]\n ? dfs_cache_find+0xe7/0x150 [cifs]\n dfs_mount_share+0x985/0x2970 [cifs]\n ? check_path.constprop.0+0x28/0x50\n ? save_trace+0x54/0x370\n ? __pfx_dfs_mount_share+0x10/0x10 [cifs]\n ? __lock_acquire+0xb82/0x2ba0\n ? __kasan_check_write+0x18/0x20\n cifs_mount+0xbc/0x9e0 [cifs]\n ? __pfx_cifs_mount+0x10/0x10 [cifs]\n ? do_raw_spin_unlock+0x5d/0x200\n ? cifs_setup_cifs_sb+0x29d/0x810 [cifs]\n cifs_smb3_do_mount+0x263/0x1990 [cifs]",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 16.0:cluster-md-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dtb-allwinner-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-altera-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amazon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amlogic-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apple-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-arm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-broadcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-cavium-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-exynos-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-freescale-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-hisilicon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-lg-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-marvell-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-mediatek-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-nvidia-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-qcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-renesas-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-rockchip-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-socionext-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-sprd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-xilinx-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-38728",
"url": "https://www.suse.com/security/cve/CVE-2025-38728"
},
{
"category": "external",
"summary": "SUSE Bug 1249256 for CVE-2025-38728",
"url": "https://bugzilla.suse.com/1249256"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 16.0:cluster-md-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dtb-allwinner-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-altera-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amazon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amlogic-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apple-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-arm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-broadcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-cavium-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-exynos-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-freescale-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-hisilicon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-lg-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-marvell-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-mediatek-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-nvidia-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-qcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-renesas-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-rockchip-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-socionext-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-sprd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-xilinx-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"openSUSE Leap 16.0:cluster-md-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dtb-allwinner-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-altera-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amazon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amlogic-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apple-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-arm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-broadcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-cavium-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-exynos-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-freescale-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-hisilicon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-lg-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-marvell-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-mediatek-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-nvidia-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-qcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-renesas-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-rockchip-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-socionext-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-sprd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-xilinx-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-19T17:38:16Z",
"details": "moderate"
}
],
"title": "CVE-2025-38728"
},
{
"cve": "CVE-2025-39805",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-39805"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nnet: macb: fix unregister_netdev call order in macb_remove()\n\nWhen removing a macb device, the driver calls phy_exit() before\nunregister_netdev(). This leads to a WARN from kernfs:\n\n ------------[ cut here ]------------\n kernfs: can not remove \u0027attached_dev\u0027, no directory\n WARNING: CPU: 1 PID: 27146 at fs/kernfs/dir.c:1683\n Call trace:\n kernfs_remove_by_name_ns+0xd8/0xf0\n sysfs_remove_link+0x24/0x58\n phy_detach+0x5c/0x168\n phy_disconnect+0x4c/0x70\n phylink_disconnect_phy+0x6c/0xc0 [phylink]\n macb_close+0x6c/0x170 [macb]\n ...\n macb_remove+0x60/0x168 [macb]\n platform_remove+0x5c/0x80\n ...\n\nThe warning happens because the PHY is being exited while the netdev\nis still registered. The correct order is to unregister the netdev\nbefore shutting down the PHY and cleaning up the MDIO bus.\n\nFix this by moving unregister_netdev() ahead of phy_exit() in\nmacb_remove().",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 16.0:cluster-md-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dtb-allwinner-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-altera-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amazon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amlogic-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apple-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-arm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-broadcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-cavium-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-exynos-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-freescale-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-hisilicon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-lg-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-marvell-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-mediatek-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-nvidia-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-qcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-renesas-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-rockchip-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-socionext-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-sprd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-xilinx-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-39805",
"url": "https://www.suse.com/security/cve/CVE-2025-39805"
},
{
"category": "external",
"summary": "SUSE Bug 1249982 for CVE-2025-39805",
"url": "https://bugzilla.suse.com/1249982"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 16.0:cluster-md-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dtb-allwinner-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-altera-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amazon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amlogic-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apple-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-arm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-broadcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-cavium-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-exynos-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-freescale-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-hisilicon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-lg-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-marvell-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-mediatek-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-nvidia-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-qcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-renesas-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-rockchip-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-socionext-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-sprd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-xilinx-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"openSUSE Leap 16.0:cluster-md-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dtb-allwinner-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-altera-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amazon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amlogic-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apple-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-arm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-broadcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-cavium-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-exynos-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-freescale-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-hisilicon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-lg-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-marvell-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-mediatek-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-nvidia-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-qcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-renesas-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-rockchip-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-socionext-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-sprd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-xilinx-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-19T17:38:16Z",
"details": "moderate"
}
],
"title": "CVE-2025-39805"
},
{
"cve": "CVE-2025-39819",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-39819"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nfs/smb: Fix inconsistent refcnt update\n\nA possible inconsistent update of refcount was identified in `smb2_compound_op`.\nSuch inconsistent update could lead to possible resource leaks.\n\nWhy it is a possible bug:\n1. In the comment section of the function, it clearly states that the\nreference to `cfile` should be dropped after calling this function.\n2. Every control flow path would check and drop the reference to\n`cfile`, except the patched one.\n3. Existing callers would not handle refcount update of `cfile` if\n-ENOMEM is returned.\n\nTo fix the bug, an extra goto label \"out\" is added, to make sure that the\ncleanup logic would always be respected. As the problem is caused by the\nallocation failure of `vars`, the cleanup logic between label \"finished\"\nand \"out\" can be safely ignored. According to the definition of function\n`is_replayable_error`, the error code of \"-ENOMEM\" is not recoverable.\nTherefore, the replay logic also gets ignored.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 16.0:cluster-md-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dtb-allwinner-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-altera-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amazon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amlogic-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apple-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-arm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-broadcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-cavium-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-exynos-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-freescale-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-hisilicon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-lg-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-marvell-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-mediatek-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-nvidia-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-qcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-renesas-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-rockchip-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-socionext-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-sprd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-xilinx-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-39819",
"url": "https://www.suse.com/security/cve/CVE-2025-39819"
},
{
"category": "external",
"summary": "SUSE Bug 1250176 for CVE-2025-39819",
"url": "https://bugzilla.suse.com/1250176"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 16.0:cluster-md-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dtb-allwinner-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-altera-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amazon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amlogic-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apple-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-arm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-broadcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-cavium-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-exynos-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-freescale-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-hisilicon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-lg-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-marvell-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-mediatek-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-nvidia-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-qcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-renesas-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-rockchip-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-socionext-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-sprd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-xilinx-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"openSUSE Leap 16.0:cluster-md-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dtb-allwinner-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-altera-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amazon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amlogic-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apple-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-arm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-broadcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-cavium-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-exynos-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-freescale-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-hisilicon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-lg-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-marvell-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-mediatek-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-nvidia-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-qcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-renesas-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-rockchip-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-socionext-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-sprd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-xilinx-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-19T17:38:16Z",
"details": "moderate"
}
],
"title": "CVE-2025-39819"
},
{
"cve": "CVE-2025-39822",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-39822"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nio_uring/kbuf: fix signedness in this_len calculation\n\nWhen importing and using buffers, buf-\u003elen is considered unsigned.\nHowever, buf-\u003elen is converted to signed int when committing. This can\nlead to unexpected behavior if the buffer is large enough to be\ninterpreted as a negative value. Make min_t calculation unsigned.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 16.0:cluster-md-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dtb-allwinner-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-altera-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amazon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amlogic-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apple-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-arm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-broadcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-cavium-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-exynos-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-freescale-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-hisilicon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-lg-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-marvell-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-mediatek-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-nvidia-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-qcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-renesas-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-rockchip-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-socionext-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-sprd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-xilinx-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-39822",
"url": "https://www.suse.com/security/cve/CVE-2025-39822"
},
{
"category": "external",
"summary": "SUSE Bug 1250034 for CVE-2025-39822",
"url": "https://bugzilla.suse.com/1250034"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 16.0:cluster-md-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dtb-allwinner-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-altera-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amazon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amlogic-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apple-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-arm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-broadcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-cavium-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-exynos-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-freescale-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-hisilicon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-lg-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-marvell-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-mediatek-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-nvidia-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-qcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-renesas-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-rockchip-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-socionext-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-sprd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-xilinx-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"openSUSE Leap 16.0:cluster-md-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dtb-allwinner-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-altera-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amazon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amlogic-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apple-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-arm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-broadcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-cavium-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-exynos-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-freescale-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-hisilicon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-lg-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-marvell-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-mediatek-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-nvidia-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-qcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-renesas-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-rockchip-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-socionext-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-sprd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-xilinx-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-19T17:38:16Z",
"details": "moderate"
}
],
"title": "CVE-2025-39822"
},
{
"cve": "CVE-2025-39831",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-39831"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nfbnic: Move phylink resume out of service_task and into open/close\n\nThe fbnic driver was presenting with the following locking assert coming\nout of a PM resume:\n[ 42.208116][ T164] RTNL: assertion failed at drivers/net/phy/phylink.c (2611)\n[ 42.208492][ T164] WARNING: CPU: 1 PID: 164 at drivers/net/phy/phylink.c:2611 phylink_resume+0x190/0x1e0\n[ 42.208872][ T164] Modules linked in:\n[ 42.209140][ T164] CPU: 1 UID: 0 PID: 164 Comm: bash Not tainted 6.17.0-rc2-virtme #134 PREEMPT(full)\n[ 42.209496][ T164] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.17.0-5.fc42 04/01/2014\n[ 42.209861][ T164] RIP: 0010:phylink_resume+0x190/0x1e0\n[ 42.210057][ T164] Code: 83 e5 01 0f 85 b0 fe ff ff c6 05 1c cd 3e 02 01 90 ba 33 0a 00 00 48 c7 c6 20 3a 1d a5 48 c7 c7 e0 3e 1d a5 e8 21 b8 90 fe 90 \u003c0f\u003e 0b 90 90 e9 86 fe ff ff e8 42 ea 1f ff e9 e2 fe ff ff 48 89 ef\n[ 42.210708][ T164] RSP: 0018:ffffc90000affbd8 EFLAGS: 00010296\n[ 42.210983][ T164] RAX: 0000000000000000 RBX: ffff8880078d8400 RCX: 0000000000000000\n[ 42.211235][ T164] RDX: 0000000000000000 RSI: 1ffffffff4f10938 RDI: 0000000000000001\n[ 42.211466][ T164] RBP: 0000000000000000 R08: ffffffffa2ae79ea R09: fffffbfff4b3eb84\n[ 42.211707][ T164] R10: 0000000000000003 R11: 0000000000000000 R12: ffff888007ad8000\n[ 42.211997][ T164] R13: 0000000000000002 R14: ffff888006a18800 R15: ffffffffa34c59e0\n[ 42.212234][ T164] FS: 00007f0dc8e39740(0000) GS:ffff88808f51f000(0000) knlGS:0000000000000000\n[ 42.212505][ T164] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033\n[ 42.212704][ T164] CR2: 00007f0dc8e9fe10 CR3: 000000000b56d003 CR4: 0000000000772ef0\n[ 42.213227][ T164] PKRU: 55555554\n[ 42.213366][ T164] Call Trace:\n[ 42.213483][ T164] \u003cTASK\u003e\n[ 42.213565][ T164] __fbnic_pm_attach.isra.0+0x8e/0xa0\n[ 42.213725][ T164] pci_reset_function+0x116/0x1d0\n[ 42.213895][ T164] reset_store+0xa0/0x100\n[ 42.214025][ T164] ? pci_dev_reset_attr_is_visible+0x50/0x50\n[ 42.214221][ T164] ? sysfs_file_kobj+0xc1/0x1e0\n[ 42.214374][ T164] ? sysfs_kf_write+0x65/0x160\n[ 42.214526][ T164] kernfs_fop_write_iter+0x2f8/0x4c0\n[ 42.214677][ T164] ? kernfs_vma_page_mkwrite+0x1f0/0x1f0\n[ 42.214836][ T164] new_sync_write+0x308/0x6f0\n[ 42.214987][ T164] ? __lock_acquire+0x34c/0x740\n[ 42.215135][ T164] ? new_sync_read+0x6f0/0x6f0\n[ 42.215288][ T164] ? lock_acquire.part.0+0xbc/0x260\n[ 42.215440][ T164] ? ksys_write+0xff/0x200\n[ 42.215590][ T164] ? perf_trace_sched_switch+0x6d0/0x6d0\n[ 42.215742][ T164] vfs_write+0x65e/0xbb0\n[ 42.215876][ T164] ksys_write+0xff/0x200\n[ 42.215994][ T164] ? __ia32_sys_read+0xc0/0xc0\n[ 42.216141][ T164] ? do_user_addr_fault+0x269/0x9f0\n[ 42.216292][ T164] ? rcu_is_watching+0x15/0xd0\n[ 42.216442][ T164] do_syscall_64+0xbb/0x360\n[ 42.216591][ T164] entry_SYSCALL_64_after_hwframe+0x4b/0x53\n[ 42.216784][ T164] RIP: 0033:0x7f0dc8ea9986\n\nA bit of digging showed that we were invoking the phylink_resume as a part\nof the fbnic_up path when we were enabling the service task while not\nholding the RTNL lock. We should be enabling this sooner as a part of the\nndo_open path and then just letting the service task come online later.\nThis will help to enforce the correct locking and brings the phylink\ninterface online at the same time as the network interface, instead of at a\nlater time.\n\nI tested this on QEMU to verify this was working by putting the system to\nsleep using \"echo mem \u003e /sys/power/state\" to put the system to sleep in the\nguest and then using the command \"system_wakeup\" in the QEMU monitor.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 16.0:cluster-md-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dtb-allwinner-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-altera-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amazon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amlogic-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apple-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-arm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-broadcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-cavium-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-exynos-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-freescale-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-hisilicon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-lg-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-marvell-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-mediatek-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-nvidia-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-qcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-renesas-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-rockchip-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-socionext-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-sprd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-xilinx-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-39831",
"url": "https://www.suse.com/security/cve/CVE-2025-39831"
},
{
"category": "external",
"summary": "SUSE Bug 1249977 for CVE-2025-39831",
"url": "https://bugzilla.suse.com/1249977"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 16.0:cluster-md-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dtb-allwinner-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-altera-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amazon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amlogic-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apple-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-arm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-broadcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-cavium-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-exynos-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-freescale-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-hisilicon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-lg-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-marvell-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-mediatek-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-nvidia-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-qcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-renesas-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-rockchip-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-socionext-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-sprd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-xilinx-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"openSUSE Leap 16.0:cluster-md-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dtb-allwinner-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-altera-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amazon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amlogic-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apple-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-arm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-broadcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-cavium-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-exynos-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-freescale-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-hisilicon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-lg-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-marvell-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-mediatek-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-nvidia-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-qcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-renesas-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-rockchip-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-socionext-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-sprd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-xilinx-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-19T17:38:16Z",
"details": "moderate"
}
],
"title": "CVE-2025-39831"
},
{
"cve": "CVE-2025-39859",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-39859"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nptp: ocp: fix use-after-free bugs causing by ptp_ocp_watchdog\n\nThe ptp_ocp_detach() only shuts down the watchdog timer if it is\npending. However, if the timer handler is already running, the\ntimer_delete_sync() is not called. This leads to race conditions\nwhere the devlink that contains the ptp_ocp is deallocated while\nthe timer handler is still accessing it, resulting in use-after-free\nbugs. The following details one of the race scenarios.\n\n(thread 1) | (thread 2)\nptp_ocp_remove() |\n ptp_ocp_detach() | ptp_ocp_watchdog()\n if (timer_pending(\u0026bp-\u003ewatchdog))| bp = timer_container_of()\n timer_delete_sync() |\n |\n devlink_free(devlink) //free |\n | bp-\u003e //use\n\nResolve this by unconditionally calling timer_delete_sync() to ensure\nthe timer is reliably deactivated, preventing any access after free.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 16.0:cluster-md-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dtb-allwinner-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-altera-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amazon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amlogic-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apple-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-arm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-broadcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-cavium-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-exynos-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-freescale-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-hisilicon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-lg-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-marvell-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-mediatek-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-nvidia-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-qcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-renesas-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-rockchip-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-socionext-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-sprd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-xilinx-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-39859",
"url": "https://www.suse.com/security/cve/CVE-2025-39859"
},
{
"category": "external",
"summary": "SUSE Bug 1250252 for CVE-2025-39859",
"url": "https://bugzilla.suse.com/1250252"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 16.0:cluster-md-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dtb-allwinner-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-altera-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amazon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amlogic-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apple-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-arm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-broadcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-cavium-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-exynos-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-freescale-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-hisilicon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-lg-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-marvell-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-mediatek-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-nvidia-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-qcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-renesas-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-rockchip-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-socionext-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-sprd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-xilinx-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"openSUSE Leap 16.0:cluster-md-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dtb-allwinner-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-altera-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amazon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amlogic-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apple-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-arm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-broadcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-cavium-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-exynos-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-freescale-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-hisilicon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-lg-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-marvell-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-mediatek-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-nvidia-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-qcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-renesas-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-rockchip-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-socionext-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-sprd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-xilinx-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-19T17:38:16Z",
"details": "moderate"
}
],
"title": "CVE-2025-39859"
},
{
"cve": "CVE-2025-39897",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-39897"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nnet: xilinx: axienet: Add error handling for RX metadata pointer retrieval\n\nAdd proper error checking for dmaengine_desc_get_metadata_ptr() which\ncan return an error pointer and lead to potential crashes or undefined\nbehaviour if the pointer retrieval fails.\n\nProperly handle the error by unmapping DMA buffer, freeing the skb and\nreturning early to prevent further processing with invalid data.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 16.0:cluster-md-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dtb-allwinner-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-altera-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amazon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amlogic-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apple-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-arm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-broadcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-cavium-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-exynos-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-freescale-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-hisilicon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-lg-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-marvell-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-mediatek-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-nvidia-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-qcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-renesas-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-rockchip-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-socionext-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-sprd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-xilinx-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-39897",
"url": "https://www.suse.com/security/cve/CVE-2025-39897"
},
{
"category": "external",
"summary": "SUSE Bug 1250746 for CVE-2025-39897",
"url": "https://bugzilla.suse.com/1250746"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 16.0:cluster-md-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dtb-allwinner-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-altera-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amazon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amlogic-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apple-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-arm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-broadcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-cavium-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-exynos-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-freescale-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-hisilicon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-lg-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-marvell-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-mediatek-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-nvidia-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-qcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-renesas-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-rockchip-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-socionext-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-sprd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-xilinx-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.6,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H",
"version": "3.1"
},
"products": [
"openSUSE Leap 16.0:cluster-md-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dtb-allwinner-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-altera-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amazon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amlogic-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apple-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-arm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-broadcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-cavium-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-exynos-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-freescale-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-hisilicon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-lg-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-marvell-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-mediatek-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-nvidia-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-qcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-renesas-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-rockchip-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-socionext-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-sprd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-xilinx-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-19T17:38:16Z",
"details": "moderate"
}
],
"title": "CVE-2025-39897"
},
{
"cve": "CVE-2025-39917",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-39917"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nbpf: Fix out-of-bounds dynptr write in bpf_crypto_crypt\n\nStanislav reported that in bpf_crypto_crypt() the destination dynptr\u0027s\nsize is not validated to be at least as large as the source dynptr\u0027s\nsize before calling into the crypto backend with \u0027len = src_len\u0027. This\ncan result in an OOB write when the destination is smaller than the\nsource.\n\nConcretely, in mentioned function, psrc and pdst are both linear\nbuffers fetched from each dynptr:\n\n psrc = __bpf_dynptr_data(src, src_len);\n [...]\n pdst = __bpf_dynptr_data_rw(dst, dst_len);\n [...]\n err = decrypt ?\n ctx-\u003etype-\u003edecrypt(ctx-\u003etfm, psrc, pdst, src_len, piv) :\n ctx-\u003etype-\u003eencrypt(ctx-\u003etfm, psrc, pdst, src_len, piv);\n\nThe crypto backend expects pdst to be large enough with a src_len length\nthat can be written. Add an additional src_len \u003e dst_len check and bail\nout if it\u0027s the case. Note that these kfuncs are accessible under root\nprivileges only.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 16.0:cluster-md-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dtb-allwinner-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-altera-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amazon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amlogic-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apple-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-arm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-broadcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-cavium-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-exynos-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-freescale-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-hisilicon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-lg-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-marvell-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-mediatek-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-nvidia-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-qcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-renesas-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-rockchip-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-socionext-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-sprd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-xilinx-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-39917",
"url": "https://www.suse.com/security/cve/CVE-2025-39917"
},
{
"category": "external",
"summary": "SUSE Bug 1250723 for CVE-2025-39917",
"url": "https://bugzilla.suse.com/1250723"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 16.0:cluster-md-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dtb-allwinner-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-altera-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amazon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amlogic-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apple-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-arm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-broadcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-cavium-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-exynos-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-freescale-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-hisilicon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-lg-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-marvell-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-mediatek-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-nvidia-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-qcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-renesas-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-rockchip-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-socionext-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-sprd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-xilinx-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:H/A:N",
"version": "3.1"
},
"products": [
"openSUSE Leap 16.0:cluster-md-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dtb-allwinner-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-altera-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amazon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amlogic-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apple-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-arm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-broadcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-cavium-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-exynos-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-freescale-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-hisilicon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-lg-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-marvell-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-mediatek-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-nvidia-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-qcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-renesas-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-rockchip-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-socionext-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-sprd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-xilinx-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-19T17:38:16Z",
"details": "moderate"
}
],
"title": "CVE-2025-39917"
},
{
"cve": "CVE-2025-39944",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-39944"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nocteontx2-pf: Fix use-after-free bugs in otx2_sync_tstamp()\n\nThe original code relies on cancel_delayed_work() in otx2_ptp_destroy(),\nwhich does not ensure that the delayed work item synctstamp_work has fully\ncompleted if it was already running. This leads to use-after-free scenarios\nwhere otx2_ptp is deallocated by otx2_ptp_destroy(), while synctstamp_work\nremains active and attempts to dereference otx2_ptp in otx2_sync_tstamp().\nFurthermore, the synctstamp_work is cyclic, the likelihood of triggering\nthe bug is nonnegligible.\n\nA typical race condition is illustrated below:\n\nCPU 0 (cleanup) | CPU 1 (delayed work callback)\notx2_remove() |\n otx2_ptp_destroy() | otx2_sync_tstamp()\n cancel_delayed_work() |\n kfree(ptp) |\n | ptp = container_of(...); //UAF\n | ptp-\u003e //UAF\n\nThis is confirmed by a KASAN report:\n\nBUG: KASAN: slab-use-after-free in __run_timer_base.part.0+0x7d7/0x8c0\nWrite of size 8 at addr ffff88800aa09a18 by task bash/136\n...\nCall Trace:\n \u003cIRQ\u003e\n dump_stack_lvl+0x55/0x70\n print_report+0xcf/0x610\n ? __run_timer_base.part.0+0x7d7/0x8c0\n kasan_report+0xb8/0xf0\n ? __run_timer_base.part.0+0x7d7/0x8c0\n __run_timer_base.part.0+0x7d7/0x8c0\n ? __pfx___run_timer_base.part.0+0x10/0x10\n ? __pfx_read_tsc+0x10/0x10\n ? ktime_get+0x60/0x140\n ? lapic_next_event+0x11/0x20\n ? clockevents_program_event+0x1d4/0x2a0\n run_timer_softirq+0xd1/0x190\n handle_softirqs+0x16a/0x550\n irq_exit_rcu+0xaf/0xe0\n sysvec_apic_timer_interrupt+0x70/0x80\n \u003c/IRQ\u003e\n...\nAllocated by task 1:\n kasan_save_stack+0x24/0x50\n kasan_save_track+0x14/0x30\n __kasan_kmalloc+0x7f/0x90\n otx2_ptp_init+0xb1/0x860\n otx2_probe+0x4eb/0xc30\n local_pci_probe+0xdc/0x190\n pci_device_probe+0x2fe/0x470\n really_probe+0x1ca/0x5c0\n __driver_probe_device+0x248/0x310\n driver_probe_device+0x44/0x120\n __driver_attach+0xd2/0x310\n bus_for_each_dev+0xed/0x170\n bus_add_driver+0x208/0x500\n driver_register+0x132/0x460\n do_one_initcall+0x89/0x300\n kernel_init_freeable+0x40d/0x720\n kernel_init+0x1a/0x150\n ret_from_fork+0x10c/0x1a0\n ret_from_fork_asm+0x1a/0x30\n\nFreed by task 136:\n kasan_save_stack+0x24/0x50\n kasan_save_track+0x14/0x30\n kasan_save_free_info+0x3a/0x60\n __kasan_slab_free+0x3f/0x50\n kfree+0x137/0x370\n otx2_ptp_destroy+0x38/0x80\n otx2_remove+0x10d/0x4c0\n pci_device_remove+0xa6/0x1d0\n device_release_driver_internal+0xf8/0x210\n pci_stop_bus_device+0x105/0x150\n pci_stop_and_remove_bus_device_locked+0x15/0x30\n remove_store+0xcc/0xe0\n kernfs_fop_write_iter+0x2c3/0x440\n vfs_write+0x871/0xd70\n ksys_write+0xee/0x1c0\n do_syscall_64+0xac/0x280\n entry_SYSCALL_64_after_hwframe+0x77/0x7f\n...\n\nReplace cancel_delayed_work() with cancel_delayed_work_sync() to ensure\nthat the delayed work item is properly canceled before the otx2_ptp is\ndeallocated.\n\nThis bug was initially identified through static analysis. To reproduce\nand test it, I simulated the OcteonTX2 PCI device in QEMU and introduced\nartificial delays within the otx2_sync_tstamp() function to increase the\nlikelihood of triggering the bug.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 16.0:cluster-md-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dtb-allwinner-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-altera-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amazon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amlogic-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apple-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-arm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-broadcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-cavium-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-exynos-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-freescale-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-hisilicon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-lg-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-marvell-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-mediatek-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-nvidia-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-qcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-renesas-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-rockchip-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-socionext-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-sprd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-xilinx-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-39944",
"url": "https://www.suse.com/security/cve/CVE-2025-39944"
},
{
"category": "external",
"summary": "SUSE Bug 1251120 for CVE-2025-39944",
"url": "https://bugzilla.suse.com/1251120"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 16.0:cluster-md-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dtb-allwinner-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-altera-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amazon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amlogic-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apple-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-arm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-broadcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-cavium-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-exynos-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-freescale-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-hisilicon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-lg-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-marvell-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-mediatek-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-nvidia-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-qcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-renesas-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-rockchip-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-socionext-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-sprd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-xilinx-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"openSUSE Leap 16.0:cluster-md-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dtb-allwinner-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-altera-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amazon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amlogic-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apple-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-arm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-broadcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-cavium-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-exynos-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-freescale-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-hisilicon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-lg-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-marvell-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-mediatek-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-nvidia-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-qcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-renesas-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-rockchip-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-socionext-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-sprd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-xilinx-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-19T17:38:16Z",
"details": "moderate"
}
],
"title": "CVE-2025-39944"
},
{
"cve": "CVE-2025-39961",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-39961"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\niommu/amd/pgtbl: Fix possible race while increase page table level\n\nThe AMD IOMMU host page table implementation supports dynamic page table levels\n(up to 6 levels), starting with a 3-level configuration that expands based on\nIOVA address. The kernel maintains a root pointer and current page table level\nto enable proper page table walks in alloc_pte()/fetch_pte() operations.\n\nThe IOMMU IOVA allocator initially starts with 32-bit address and onces its\nexhuasted it switches to 64-bit address (max address is determined based\non IOMMU and device DMA capability). To support larger IOVA, AMD IOMMU\ndriver increases page table level.\n\nBut in unmap path (iommu_v1_unmap_pages()), fetch_pte() reads\npgtable-\u003e[root/mode] without lock. So its possible that in exteme corner case,\nwhen increase_address_space() is updating pgtable-\u003e[root/mode], fetch_pte()\nreads wrong page table level (pgtable-\u003emode). It does compare the value with\nlevel encoded in page table and returns NULL. This will result is\niommu_unmap ops to fail and upper layer may retry/log WARN_ON.\n\nCPU 0 CPU 1\n------ ------\nmap pages unmap pages\nalloc_pte() -\u003e increase_address_space() iommu_v1_unmap_pages() -\u003e fetch_pte()\n pgtable-\u003eroot = pte (new root value)\n READ pgtable-\u003e[mode/root]\n\t\t\t\t\t Reads new root, old mode\n Updates mode (pgtable-\u003emode += 1)\n\nSince Page table level updates are infrequent and already synchronized with a\nspinlock, implement seqcount to enable lock-free read operations on the read path.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 16.0:cluster-md-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dtb-allwinner-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-altera-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amazon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amlogic-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apple-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-arm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-broadcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-cavium-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-exynos-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-freescale-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-hisilicon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-lg-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-marvell-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-mediatek-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-nvidia-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-qcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-renesas-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-rockchip-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-socionext-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-sprd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-xilinx-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-39961",
"url": "https://www.suse.com/security/cve/CVE-2025-39961"
},
{
"category": "external",
"summary": "SUSE Bug 1251817 for CVE-2025-39961",
"url": "https://bugzilla.suse.com/1251817"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 16.0:cluster-md-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dtb-allwinner-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-altera-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amazon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amlogic-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apple-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-arm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-broadcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-cavium-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-exynos-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-freescale-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-hisilicon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-lg-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-marvell-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-mediatek-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-nvidia-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-qcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-renesas-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-rockchip-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-socionext-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-sprd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-xilinx-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.8,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:H",
"version": "3.1"
},
"products": [
"openSUSE Leap 16.0:cluster-md-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dtb-allwinner-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-altera-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amazon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amlogic-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apple-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-arm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-broadcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-cavium-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-exynos-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-freescale-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-hisilicon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-lg-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-marvell-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-mediatek-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-nvidia-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-qcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-renesas-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-rockchip-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-socionext-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-sprd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-xilinx-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-19T17:38:16Z",
"details": "moderate"
}
],
"title": "CVE-2025-39961"
},
{
"cve": "CVE-2025-39980",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-39980"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nnexthop: Forbid FDB status change while nexthop is in a group\n\nThe kernel forbids the creation of non-FDB nexthop groups with FDB\nnexthops:\n\n # ip nexthop add id 1 via 192.0.2.1 fdb\n # ip nexthop add id 2 group 1\n Error: Non FDB nexthop group cannot have fdb nexthops.\n\nAnd vice versa:\n\n # ip nexthop add id 3 via 192.0.2.2 dev dummy1\n # ip nexthop add id 4 group 3 fdb\n Error: FDB nexthop group can only have fdb nexthops.\n\nHowever, as long as no routes are pointing to a non-FDB nexthop group,\nthe kernel allows changing the type of a nexthop from FDB to non-FDB and\nvice versa:\n\n # ip nexthop add id 5 via 192.0.2.2 dev dummy1\n # ip nexthop add id 6 group 5\n # ip nexthop replace id 5 via 192.0.2.2 fdb\n # echo $?\n 0\n\nThis configuration is invalid and can result in a NPD [1] since FDB\nnexthops are not associated with a nexthop device:\n\n # ip route add 198.51.100.1/32 nhid 6\n # ping 198.51.100.1\n\nFix by preventing nexthop FDB status change while the nexthop is in a\ngroup:\n\n # ip nexthop add id 7 via 192.0.2.2 dev dummy1\n # ip nexthop add id 8 group 7\n # ip nexthop replace id 7 via 192.0.2.2 fdb\n Error: Cannot change nexthop FDB status while in a group.\n\n[1]\nBUG: kernel NULL pointer dereference, address: 00000000000003c0\n[...]\nOops: Oops: 0000 [#1] SMP\nCPU: 6 UID: 0 PID: 367 Comm: ping Not tainted 6.17.0-rc6-virtme-gb65678cacc03 #1 PREEMPT(voluntary)\nHardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.17.0-4.fc41 04/01/2014\nRIP: 0010:fib_lookup_good_nhc+0x1e/0x80\n[...]\nCall Trace:\n \u003cTASK\u003e\n fib_table_lookup+0x541/0x650\n ip_route_output_key_hash_rcu+0x2ea/0x970\n ip_route_output_key_hash+0x55/0x80\n __ip4_datagram_connect+0x250/0x330\n udp_connect+0x2b/0x60\n __sys_connect+0x9c/0xd0\n __x64_sys_connect+0x18/0x20\n do_syscall_64+0xa4/0x2a0\n entry_SYSCALL_64_after_hwframe+0x4b/0x53",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 16.0:cluster-md-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dtb-allwinner-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-altera-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amazon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amlogic-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apple-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-arm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-broadcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-cavium-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-exynos-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-freescale-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-hisilicon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-lg-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-marvell-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-mediatek-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-nvidia-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-qcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-renesas-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-rockchip-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-socionext-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-sprd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-xilinx-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-39980",
"url": "https://www.suse.com/security/cve/CVE-2025-39980"
},
{
"category": "external",
"summary": "SUSE Bug 1252063 for CVE-2025-39980",
"url": "https://bugzilla.suse.com/1252063"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 16.0:cluster-md-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dtb-allwinner-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-altera-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amazon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amlogic-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apple-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-arm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-broadcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-cavium-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-exynos-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-freescale-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-hisilicon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-lg-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-marvell-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-mediatek-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-nvidia-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-qcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-renesas-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-rockchip-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-socionext-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-sprd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-xilinx-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"openSUSE Leap 16.0:cluster-md-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dtb-allwinner-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-altera-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amazon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amlogic-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apple-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-arm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-broadcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-cavium-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-exynos-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-freescale-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-hisilicon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-lg-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-marvell-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-mediatek-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-nvidia-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-qcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-renesas-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-rockchip-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-socionext-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-sprd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-xilinx-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-19T17:38:16Z",
"details": "moderate"
}
],
"title": "CVE-2025-39980"
},
{
"cve": "CVE-2025-39990",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-39990"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nbpf: Check the helper function is valid in get_helper_proto\n\nkernel test robot reported verifier bug [1] where the helper func\npointer could be NULL due to disabled config option.\n\nAs Alexei suggested we could check on that in get_helper_proto\ndirectly. Marking tail_call helper func with BPF_PTR_POISON,\nbecause it is unused by design.\n\n [1] https://lore.kernel.org/oe-lkp/202507160818.68358831-lkp@intel.com",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 16.0:cluster-md-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dtb-allwinner-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-altera-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amazon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amlogic-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apple-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-arm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-broadcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-cavium-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-exynos-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-freescale-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-hisilicon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-lg-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-marvell-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-mediatek-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-nvidia-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-qcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-renesas-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-rockchip-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-socionext-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-sprd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-xilinx-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-39990",
"url": "https://www.suse.com/security/cve/CVE-2025-39990"
},
{
"category": "external",
"summary": "SUSE Bug 1252054 for CVE-2025-39990",
"url": "https://bugzilla.suse.com/1252054"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 16.0:cluster-md-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dtb-allwinner-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-altera-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amazon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amlogic-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apple-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-arm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-broadcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-cavium-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-exynos-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-freescale-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-hisilicon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-lg-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-marvell-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-mediatek-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-nvidia-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-qcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-renesas-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-rockchip-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-socionext-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-sprd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-xilinx-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"openSUSE Leap 16.0:cluster-md-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dtb-allwinner-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-altera-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amazon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amlogic-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apple-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-arm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-broadcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-cavium-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-exynos-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-freescale-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-hisilicon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-lg-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-marvell-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-mediatek-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-nvidia-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-qcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-renesas-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-rockchip-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-socionext-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-sprd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-xilinx-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-19T17:38:16Z",
"details": "moderate"
}
],
"title": "CVE-2025-39990"
},
{
"cve": "CVE-2025-40001",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40001"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nscsi: mvsas: Fix use-after-free bugs in mvs_work_queue\n\nDuring the detaching of Marvell\u0027s SAS/SATA controller, the original code\ncalls cancel_delayed_work() in mvs_free() to cancel the delayed work\nitem mwq-\u003ework_q. However, if mwq-\u003ework_q is already running, the\ncancel_delayed_work() may fail to cancel it. This can lead to\nuse-after-free scenarios where mvs_free() frees the mvs_info while\nmvs_work_queue() is still executing and attempts to access the\nalready-freed mvs_info.\n\nA typical race condition is illustrated below:\n\nCPU 0 (remove) | CPU 1 (delayed work callback)\nmvs_pci_remove() |\n mvs_free() | mvs_work_queue()\n cancel_delayed_work() |\n kfree(mvi) |\n | mvi-\u003e // UAF\n\nReplace cancel_delayed_work() with cancel_delayed_work_sync() to ensure\nthat the delayed work item is properly canceled and any executing\ndelayed work item completes before the mvs_info is deallocated.\n\nThis bug was found by static analysis.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 16.0:cluster-md-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dtb-allwinner-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-altera-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amazon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amlogic-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apple-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-arm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-broadcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-cavium-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-exynos-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-freescale-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-hisilicon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-lg-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-marvell-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-mediatek-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-nvidia-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-qcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-renesas-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-rockchip-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-socionext-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-sprd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-xilinx-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40001",
"url": "https://www.suse.com/security/cve/CVE-2025-40001"
},
{
"category": "external",
"summary": "SUSE Bug 1252303 for CVE-2025-40001",
"url": "https://bugzilla.suse.com/1252303"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 16.0:cluster-md-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dtb-allwinner-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-altera-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amazon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amlogic-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apple-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-arm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-broadcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-cavium-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-exynos-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-freescale-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-hisilicon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-lg-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-marvell-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-mediatek-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-nvidia-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-qcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-renesas-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-rockchip-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-socionext-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-sprd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-xilinx-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.8,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:H",
"version": "3.1"
},
"products": [
"openSUSE Leap 16.0:cluster-md-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dtb-allwinner-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-altera-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amazon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amlogic-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apple-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-arm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-broadcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-cavium-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-exynos-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-freescale-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-hisilicon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-lg-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-marvell-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-mediatek-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-nvidia-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-qcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-renesas-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-rockchip-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-socionext-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-sprd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-xilinx-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-19T17:38:16Z",
"details": "moderate"
}
],
"title": "CVE-2025-40001"
},
{
"cve": "CVE-2025-40003",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40003"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nnet: mscc: ocelot: Fix use-after-free caused by cyclic delayed work\n\nThe origin code calls cancel_delayed_work() in ocelot_stats_deinit()\nto cancel the cyclic delayed work item ocelot-\u003estats_work. However,\ncancel_delayed_work() may fail to cancel the work item if it is already\nexecuting. While destroy_workqueue() does wait for all pending work items\nin the work queue to complete before destroying the work queue, it cannot\nprevent the delayed work item from being rescheduled within the\nocelot_check_stats_work() function. This limitation exists because the\ndelayed work item is only enqueued into the work queue after its timer\nexpires. Before the timer expiration, destroy_workqueue() has no visibility\nof this pending work item. Once the work queue appears empty,\ndestroy_workqueue() proceeds with destruction. When the timer eventually\nexpires, the delayed work item gets queued again, leading to the following\nwarning:\n\nworkqueue: cannot queue ocelot_check_stats_work on wq ocelot-switch-stats\nWARNING: CPU: 2 PID: 0 at kernel/workqueue.c:2255 __queue_work+0x875/0xaf0\n...\nRIP: 0010:__queue_work+0x875/0xaf0\n...\nRSP: 0018:ffff88806d108b10 EFLAGS: 00010086\nRAX: 0000000000000000 RBX: 0000000000000101 RCX: 0000000000000027\nRDX: 0000000000000027 RSI: 0000000000000004 RDI: ffff88806d123e88\nRBP: ffffffff813c3170 R08: 0000000000000000 R09: ffffed100da247d2\nR10: ffffed100da247d1 R11: ffff88806d123e8b R12: ffff88800c00f000\nR13: ffff88800d7285c0 R14: ffff88806d0a5580 R15: ffff88800d7285a0\nFS: 0000000000000000(0000) GS:ffff8880e5725000(0000) knlGS:0000000000000000\nCS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033\nCR2: 00007fe18e45ea10 CR3: 0000000005e6c000 CR4: 00000000000006f0\nCall Trace:\n \u003cIRQ\u003e\n ? kasan_report+0xc6/0xf0\n ? __pfx_delayed_work_timer_fn+0x10/0x10\n ? __pfx_delayed_work_timer_fn+0x10/0x10\n call_timer_fn+0x25/0x1c0\n __run_timer_base.part.0+0x3be/0x8c0\n ? __pfx_delayed_work_timer_fn+0x10/0x10\n ? rcu_sched_clock_irq+0xb06/0x27d0\n ? __pfx___run_timer_base.part.0+0x10/0x10\n ? try_to_wake_up+0xb15/0x1960\n ? _raw_spin_lock_irq+0x80/0xe0\n ? __pfx__raw_spin_lock_irq+0x10/0x10\n tmigr_handle_remote_up+0x603/0x7e0\n ? __pfx_tmigr_handle_remote_up+0x10/0x10\n ? sched_balance_trigger+0x1c0/0x9f0\n ? sched_tick+0x221/0x5a0\n ? _raw_spin_lock_irq+0x80/0xe0\n ? __pfx__raw_spin_lock_irq+0x10/0x10\n ? tick_nohz_handler+0x339/0x440\n ? __pfx_tmigr_handle_remote_up+0x10/0x10\n __walk_groups.isra.0+0x42/0x150\n tmigr_handle_remote+0x1f4/0x2e0\n ? __pfx_tmigr_handle_remote+0x10/0x10\n ? ktime_get+0x60/0x140\n ? lapic_next_event+0x11/0x20\n ? clockevents_program_event+0x1d4/0x2a0\n ? hrtimer_interrupt+0x322/0x780\n handle_softirqs+0x16a/0x550\n irq_exit_rcu+0xaf/0xe0\n sysvec_apic_timer_interrupt+0x70/0x80\n \u003c/IRQ\u003e\n...\n\nThe following diagram reveals the cause of the above warning:\n\nCPU 0 (remove) | CPU 1 (delayed work callback)\nmscc_ocelot_remove() |\n ocelot_deinit() | ocelot_check_stats_work()\n ocelot_stats_deinit() |\n cancel_delayed_work()| ...\n | queue_delayed_work()\n destroy_workqueue() | (wait a time)\n | __queue_work() //UAF\n\nThe above scenario actually constitutes a UAF vulnerability.\n\nThe ocelot_stats_deinit() is only invoked when initialization\nfailure or resource destruction, so we must ensure that any\ndelayed work items cannot be rescheduled.\n\nReplace cancel_delayed_work() with disable_delayed_work_sync()\nto guarantee proper cancellation of the delayed work item and\nensure completion of any currently executing work before the\nworkqueue is deallocated.\n\nA deadlock concern was considered: ocelot_stats_deinit() is called\nin a process context and is not holding any locks that the delayed\nwork item might also need. Therefore, the use of the _sync() variant\nis safe here.\n\nThis bug was identified through static analysis. To reproduce the\nissue and validate the fix, I simulated ocelot-swit\n---truncated---",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 16.0:cluster-md-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dtb-allwinner-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-altera-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amazon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amlogic-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apple-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-arm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-broadcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-cavium-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-exynos-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-freescale-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-hisilicon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-lg-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-marvell-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-mediatek-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-nvidia-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-qcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-renesas-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-rockchip-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-socionext-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-sprd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-xilinx-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40003",
"url": "https://www.suse.com/security/cve/CVE-2025-40003"
},
{
"category": "external",
"summary": "SUSE Bug 1252301 for CVE-2025-40003",
"url": "https://bugzilla.suse.com/1252301"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 16.0:cluster-md-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dtb-allwinner-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-altera-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amazon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amlogic-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apple-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-arm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-broadcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-cavium-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-exynos-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-freescale-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-hisilicon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-lg-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-marvell-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-mediatek-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-nvidia-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-qcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-renesas-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-rockchip-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-socionext-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-sprd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-xilinx-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:H",
"version": "3.1"
},
"products": [
"openSUSE Leap 16.0:cluster-md-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dtb-allwinner-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-altera-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amazon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amlogic-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apple-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-arm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-broadcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-cavium-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-exynos-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-freescale-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-hisilicon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-lg-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-marvell-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-mediatek-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-nvidia-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-qcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-renesas-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-rockchip-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-socionext-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-sprd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-xilinx-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-19T17:38:16Z",
"details": "moderate"
}
],
"title": "CVE-2025-40003"
},
{
"cve": "CVE-2025-40006",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40006"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nmm/hugetlb: fix folio is still mapped when deleted\n\nMigration may be raced with fallocating hole. remove_inode_single_folio\nwill unmap the folio if the folio is still mapped. However, it\u0027s called\nwithout folio lock. If the folio is migrated and the mapped pte has been\nconverted to migration entry, folio_mapped() returns false, and won\u0027t\nunmap it. Due to extra refcount held by remove_inode_single_folio,\nmigration fails, restores migration entry to normal pte, and the folio is\nmapped again. As a result, we triggered BUG in filemap_unaccount_folio.\n\nThe log is as follows:\n BUG: Bad page cache in process hugetlb pfn:156c00\n page: refcount:515 mapcount:0 mapping:0000000099fef6e1 index:0x0 pfn:0x156c00\n head: order:9 mapcount:1 entire_mapcount:1 nr_pages_mapped:0 pincount:0\n aops:hugetlbfs_aops ino:dcc dentry name(?):\"my_hugepage_file\"\n flags: 0x17ffffc00000c1(locked|waiters|head|node=0|zone=2|lastcpupid=0x1fffff)\n page_type: f4(hugetlb)\n page dumped because: still mapped when deleted\n CPU: 1 UID: 0 PID: 395 Comm: hugetlb Not tainted 6.17.0-rc5-00044-g7aac71907bde-dirty #484 NONE\n Hardware name: QEMU Ubuntu 24.04 PC (i440FX + PIIX, 1996), BIOS 0.0.0 02/06/2015\n Call Trace:\n \u003cTASK\u003e\n dump_stack_lvl+0x4f/0x70\n filemap_unaccount_folio+0xc4/0x1c0\n __filemap_remove_folio+0x38/0x1c0\n filemap_remove_folio+0x41/0xd0\n remove_inode_hugepages+0x142/0x250\n hugetlbfs_fallocate+0x471/0x5a0\n vfs_fallocate+0x149/0x380\n\nHold folio lock before checking if the folio is mapped to avold race with\nmigration.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 16.0:cluster-md-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dtb-allwinner-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-altera-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amazon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amlogic-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apple-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-arm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-broadcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-cavium-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-exynos-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-freescale-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-hisilicon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-lg-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-marvell-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-mediatek-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-nvidia-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-qcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-renesas-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-rockchip-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-socionext-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-sprd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-xilinx-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40006",
"url": "https://www.suse.com/security/cve/CVE-2025-40006"
},
{
"category": "external",
"summary": "SUSE Bug 1252342 for CVE-2025-40006",
"url": "https://bugzilla.suse.com/1252342"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 16.0:cluster-md-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dtb-allwinner-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-altera-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amazon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amlogic-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apple-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-arm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-broadcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-cavium-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-exynos-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-freescale-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-hisilicon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-lg-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-marvell-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-mediatek-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-nvidia-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-qcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-renesas-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-rockchip-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-socionext-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-sprd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-xilinx-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.7,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"openSUSE Leap 16.0:cluster-md-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dtb-allwinner-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-altera-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amazon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amlogic-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apple-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-arm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-broadcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-cavium-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-exynos-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-freescale-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-hisilicon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-lg-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-marvell-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-mediatek-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-nvidia-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-qcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-renesas-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-rockchip-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-socionext-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-sprd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-xilinx-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-19T17:38:16Z",
"details": "moderate"
}
],
"title": "CVE-2025-40006"
},
{
"cve": "CVE-2025-40021",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40021"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\ntracing: dynevent: Add a missing lockdown check on dynevent\n\nSince dynamic_events interface on tracefs is compatible with\nkprobe_events and uprobe_events, it should also check the lockdown\nstatus and reject if it is set.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 16.0:cluster-md-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dtb-allwinner-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-altera-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amazon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amlogic-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apple-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-arm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-broadcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-cavium-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-exynos-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-freescale-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-hisilicon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-lg-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-marvell-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-mediatek-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-nvidia-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-qcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-renesas-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-rockchip-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-socionext-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-sprd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-xilinx-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40021",
"url": "https://www.suse.com/security/cve/CVE-2025-40021"
},
{
"category": "external",
"summary": "SUSE Bug 1252681 for CVE-2025-40021",
"url": "https://bugzilla.suse.com/1252681"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 16.0:cluster-md-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dtb-allwinner-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-altera-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amazon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amlogic-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apple-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-arm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-broadcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-cavium-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-exynos-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-freescale-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-hisilicon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-lg-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-marvell-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-mediatek-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-nvidia-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-qcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-renesas-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-rockchip-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-socionext-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-sprd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-xilinx-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N",
"version": "3.1"
},
"products": [
"openSUSE Leap 16.0:cluster-md-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dtb-allwinner-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-altera-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amazon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amlogic-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apple-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-arm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-broadcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-cavium-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-exynos-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-freescale-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-hisilicon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-lg-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-marvell-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-mediatek-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-nvidia-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-qcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-renesas-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-rockchip-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-socionext-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-sprd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-xilinx-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-19T17:38:16Z",
"details": "moderate"
}
],
"title": "CVE-2025-40021"
},
{
"cve": "CVE-2025-40024",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40024"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nvhost: Take a reference on the task in struct vhost_task.\n\nvhost_task_create() creates a task and keeps a reference to its\ntask_struct. That task may exit early via a signal and its task_struct\nwill be released.\nA pending vhost_task_wake() will then attempt to wake the task and\naccess a task_struct which is no longer there.\n\nAcquire a reference on the task_struct while creating the thread and\nrelease the reference while the struct vhost_task itself is removed.\nIf the task exits early due to a signal, then the vhost_task_wake() will\nstill access a valid task_struct. The wake is safe and will be skipped\nin this case.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 16.0:cluster-md-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dtb-allwinner-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-altera-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amazon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amlogic-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apple-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-arm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-broadcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-cavium-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-exynos-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-freescale-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-hisilicon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-lg-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-marvell-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-mediatek-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-nvidia-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-qcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-renesas-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-rockchip-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-socionext-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-sprd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-xilinx-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40024",
"url": "https://www.suse.com/security/cve/CVE-2025-40024"
},
{
"category": "external",
"summary": "SUSE Bug 1252686 for CVE-2025-40024",
"url": "https://bugzilla.suse.com/1252686"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 16.0:cluster-md-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dtb-allwinner-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-altera-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amazon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amlogic-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apple-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-arm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-broadcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-cavium-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-exynos-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-freescale-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-hisilicon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-lg-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-marvell-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-mediatek-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-nvidia-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-qcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-renesas-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-rockchip-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-socionext-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-sprd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-xilinx-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"openSUSE Leap 16.0:cluster-md-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dtb-allwinner-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-altera-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amazon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amlogic-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apple-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-arm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-broadcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-cavium-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-exynos-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-freescale-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-hisilicon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-lg-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-marvell-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-mediatek-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-nvidia-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-qcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-renesas-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-rockchip-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-socionext-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-sprd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-xilinx-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-19T17:38:16Z",
"details": "moderate"
}
],
"title": "CVE-2025-40024"
},
{
"cve": "CVE-2025-40027",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40027"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nnet/9p: fix double req put in p9_fd_cancelled\n\nSyzkaller reports a KASAN issue as below:\n\ngeneral protection fault, probably for non-canonical address 0xfbd59c0000000021: 0000 [#1] PREEMPT SMP KASAN NOPTI\nKASAN: maybe wild-memory-access in range [0xdead000000000108-0xdead00000000010f]\nCPU: 0 PID: 5083 Comm: syz-executor.2 Not tainted 6.1.134-syzkaller-00037-g855bd1d7d838 #0\nHardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014\nRIP: 0010:__list_del include/linux/list.h:114 [inline]\nRIP: 0010:__list_del_entry include/linux/list.h:137 [inline]\nRIP: 0010:list_del include/linux/list.h:148 [inline]\nRIP: 0010:p9_fd_cancelled+0xe9/0x200 net/9p/trans_fd.c:734\n\nCall Trace:\n \u003cTASK\u003e\n p9_client_flush+0x351/0x440 net/9p/client.c:614\n p9_client_rpc+0xb6b/0xc70 net/9p/client.c:734\n p9_client_version net/9p/client.c:920 [inline]\n p9_client_create+0xb51/0x1240 net/9p/client.c:1027\n v9fs_session_init+0x1f0/0x18f0 fs/9p/v9fs.c:408\n v9fs_mount+0xba/0xcb0 fs/9p/vfs_super.c:126\n legacy_get_tree+0x108/0x220 fs/fs_context.c:632\n vfs_get_tree+0x8e/0x300 fs/super.c:1573\n do_new_mount fs/namespace.c:3056 [inline]\n path_mount+0x6a6/0x1e90 fs/namespace.c:3386\n do_mount fs/namespace.c:3399 [inline]\n __do_sys_mount fs/namespace.c:3607 [inline]\n __se_sys_mount fs/namespace.c:3584 [inline]\n __x64_sys_mount+0x283/0x300 fs/namespace.c:3584\n do_syscall_x64 arch/x86/entry/common.c:51 [inline]\n do_syscall_64+0x35/0x80 arch/x86/entry/common.c:81\n entry_SYSCALL_64_after_hwframe+0x6e/0xd8\n\nThis happens because of a race condition between:\n\n- The 9p client sending an invalid flush request and later cleaning it up;\n- The 9p client in p9_read_work() canceled all pending requests.\n\n Thread 1 Thread 2\n ...\n p9_client_create()\n ...\n p9_fd_create()\n ...\n p9_conn_create()\n ...\n // start Thread 2\n INIT_WORK(\u0026m-\u003erq, p9_read_work);\n p9_read_work()\n ...\n p9_client_rpc()\n ...\n ...\n p9_conn_cancel()\n ...\n spin_lock(\u0026m-\u003ereq_lock);\n ...\n p9_fd_cancelled()\n ...\n ...\n spin_unlock(\u0026m-\u003ereq_lock);\n // status rewrite\n p9_client_cb(m-\u003eclient, req, REQ_STATUS_ERROR)\n // first remove\n list_del(\u0026req-\u003ereq_list);\n ...\n\n spin_lock(\u0026m-\u003ereq_lock)\n ...\n // second remove\n list_del(\u0026req-\u003ereq_list);\n spin_unlock(\u0026m-\u003ereq_lock)\n ...\n\nCommit 74d6a5d56629 (\"9p/trans_fd: Fix concurrency del of req_list in\np9_fd_cancelled/p9_read_work\") fixes a concurrency issue in the 9p filesystem\nclient where the req_list could be deleted simultaneously by both\np9_read_work and p9_fd_cancelled functions, but for the case where req-\u003estatus\nequals REQ_STATUS_RCVD.\n\nUpdate the check for req-\u003estatus in p9_fd_cancelled to skip processing not\njust received requests, but anything that is not SENT, as whatever\nchanged the state from SENT also removed the request from its list.\n\nFound by Linux Verification Center (linuxtesting.org) with Syzkaller.\n\n[updated the check from status == RECV || status == ERROR to status != SENT]",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 16.0:cluster-md-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dtb-allwinner-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-altera-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amazon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amlogic-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apple-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-arm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-broadcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-cavium-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-exynos-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-freescale-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-hisilicon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-lg-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-marvell-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-mediatek-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-nvidia-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-qcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-renesas-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-rockchip-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-socionext-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-sprd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-xilinx-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40027",
"url": "https://www.suse.com/security/cve/CVE-2025-40027"
},
{
"category": "external",
"summary": "SUSE Bug 1252763 for CVE-2025-40027",
"url": "https://bugzilla.suse.com/1252763"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 16.0:cluster-md-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dtb-allwinner-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-altera-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amazon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amlogic-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apple-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-arm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-broadcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-cavium-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-exynos-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-freescale-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-hisilicon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-lg-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-marvell-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-mediatek-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-nvidia-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-qcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-renesas-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-rockchip-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-socionext-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-sprd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-xilinx-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:H",
"version": "3.1"
},
"products": [
"openSUSE Leap 16.0:cluster-md-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dtb-allwinner-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-altera-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amazon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amlogic-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apple-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-arm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-broadcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-cavium-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-exynos-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-freescale-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-hisilicon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-lg-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-marvell-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-mediatek-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-nvidia-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-qcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-renesas-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-rockchip-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-socionext-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-sprd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-xilinx-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-19T17:38:16Z",
"details": "moderate"
}
],
"title": "CVE-2025-40027"
},
{
"cve": "CVE-2025-40031",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40031"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\ntee: fix register_shm_helper()\n\nIn register_shm_helper(), fix incorrect error handling for a call to\niov_iter_extract_pages(). A case is missing for when\niov_iter_extract_pages() only got some pages and return a number larger\nthan 0, but not the requested amount.\n\nThis fixes a possible NULL pointer dereference following a bad input from\nioctl(TEE_IOC_SHM_REGISTER) where parts of the buffer isn\u0027t mapped.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 16.0:cluster-md-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dtb-allwinner-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-altera-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amazon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amlogic-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apple-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-arm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-broadcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-cavium-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-exynos-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-freescale-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-hisilicon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-lg-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-marvell-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-mediatek-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-nvidia-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-qcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-renesas-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-rockchip-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-socionext-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-sprd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-xilinx-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40031",
"url": "https://www.suse.com/security/cve/CVE-2025-40031"
},
{
"category": "external",
"summary": "SUSE Bug 1252779 for CVE-2025-40031",
"url": "https://bugzilla.suse.com/1252779"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 16.0:cluster-md-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dtb-allwinner-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-altera-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amazon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amlogic-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apple-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-arm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-broadcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-cavium-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-exynos-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-freescale-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-hisilicon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-lg-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-marvell-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-mediatek-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-nvidia-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-qcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-renesas-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-rockchip-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-socionext-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-sprd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-xilinx-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"openSUSE Leap 16.0:cluster-md-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dtb-allwinner-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-altera-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amazon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amlogic-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apple-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-arm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-broadcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-cavium-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-exynos-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-freescale-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-hisilicon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-lg-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-marvell-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-mediatek-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-nvidia-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-qcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-renesas-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-rockchip-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-socionext-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-sprd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-xilinx-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-19T17:38:16Z",
"details": "moderate"
}
],
"title": "CVE-2025-40031"
},
{
"cve": "CVE-2025-40033",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40033"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nremoteproc: pru: Fix potential NULL pointer dereference in pru_rproc_set_ctable()\n\npru_rproc_set_ctable() accessed rproc-\u003epriv before the IS_ERR_OR_NULL\ncheck, which could lead to a null pointer dereference. Move the pru\nassignment, ensuring we never dereference a NULL rproc pointer.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 16.0:cluster-md-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dtb-allwinner-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-altera-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amazon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amlogic-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apple-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-arm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-broadcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-cavium-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-exynos-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-freescale-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-hisilicon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-lg-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-marvell-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-mediatek-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-nvidia-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-qcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-renesas-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-rockchip-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-socionext-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-sprd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-xilinx-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40033",
"url": "https://www.suse.com/security/cve/CVE-2025-40033"
},
{
"category": "external",
"summary": "SUSE Bug 1252824 for CVE-2025-40033",
"url": "https://bugzilla.suse.com/1252824"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 16.0:cluster-md-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dtb-allwinner-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-altera-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amazon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amlogic-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apple-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-arm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-broadcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-cavium-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-exynos-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-freescale-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-hisilicon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-lg-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-marvell-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-mediatek-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-nvidia-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-qcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-renesas-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-rockchip-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-socionext-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-sprd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-xilinx-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"openSUSE Leap 16.0:cluster-md-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dtb-allwinner-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-altera-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amazon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amlogic-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apple-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-arm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-broadcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-cavium-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-exynos-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-freescale-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-hisilicon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-lg-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-marvell-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-mediatek-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-nvidia-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-qcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-renesas-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-rockchip-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-socionext-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-sprd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-xilinx-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-19T17:38:16Z",
"details": "moderate"
}
],
"title": "CVE-2025-40033"
},
{
"cve": "CVE-2025-40038",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40038"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nKVM: SVM: Skip fastpath emulation on VM-Exit if next RIP isn\u0027t valid\n\nSkip the WRMSR and HLT fastpaths in SVM\u0027s VM-Exit handler if the next RIP\nisn\u0027t valid, e.g. because KVM is running with nrips=false. SVM must\ndecode and emulate to skip the instruction if the CPU doesn\u0027t provide the\nnext RIP, and getting the instruction bytes to decode requires reading\nguest memory. Reading guest memory through the emulator can fault, i.e.\ncan sleep, which is disallowed since the fastpath handlers run with IRQs\ndisabled.\n\n BUG: sleeping function called from invalid context at ./include/linux/uaccess.h:106\n in_atomic(): 1, irqs_disabled(): 1, non_block: 0, pid: 32611, name: qemu\n preempt_count: 1, expected: 0\n INFO: lockdep is turned off.\n irq event stamp: 30580\n hardirqs last enabled at (30579): [\u003cffffffffc08b2527\u003e] vcpu_run+0x1787/0x1db0 [kvm]\n hardirqs last disabled at (30580): [\u003cffffffffb4f62e32\u003e] __schedule+0x1e2/0xed0\n softirqs last enabled at (30570): [\u003cffffffffb4247a64\u003e] fpu_swap_kvm_fpstate+0x44/0x210\n softirqs last disabled at (30568): [\u003cffffffffb4247a64\u003e] fpu_swap_kvm_fpstate+0x44/0x210\n CPU: 298 UID: 0 PID: 32611 Comm: qemu Tainted: G U 6.16.0-smp--e6c618b51cfe-sleep #782 NONE\n Tainted: [U]=USER\n Hardware name: Google Astoria-Turin/astoria, BIOS 0.20241223.2-0 01/17/2025\n Call Trace:\n \u003cTASK\u003e\n dump_stack_lvl+0x7d/0xb0\n __might_resched+0x271/0x290\n __might_fault+0x28/0x80\n kvm_vcpu_read_guest_page+0x8d/0xc0 [kvm]\n kvm_fetch_guest_virt+0x92/0xc0 [kvm]\n __do_insn_fetch_bytes+0xf3/0x1e0 [kvm]\n x86_decode_insn+0xd1/0x1010 [kvm]\n x86_emulate_instruction+0x105/0x810 [kvm]\n __svm_skip_emulated_instruction+0xc4/0x140 [kvm_amd]\n handle_fastpath_invd+0xc4/0x1a0 [kvm]\n vcpu_run+0x11a1/0x1db0 [kvm]\n kvm_arch_vcpu_ioctl_run+0x5cc/0x730 [kvm]\n kvm_vcpu_ioctl+0x578/0x6a0 [kvm]\n __se_sys_ioctl+0x6d/0xb0\n do_syscall_64+0x8a/0x2c0\n entry_SYSCALL_64_after_hwframe+0x4b/0x53\n RIP: 0033:0x7f479d57a94b\n \u003c/TASK\u003e\n\nNote, this is essentially a reapply of commit 5c30e8101e8d (\"KVM: SVM:\nSkip WRMSR fastpath on VM-Exit if next RIP isn\u0027t valid\"), but with\ndifferent justification (KVM now grabs SRCU when skipping the instruction\nfor other reasons).",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 16.0:cluster-md-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dtb-allwinner-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-altera-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amazon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amlogic-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apple-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-arm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-broadcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-cavium-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-exynos-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-freescale-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-hisilicon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-lg-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-marvell-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-mediatek-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-nvidia-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-qcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-renesas-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-rockchip-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-socionext-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-sprd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-xilinx-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40038",
"url": "https://www.suse.com/security/cve/CVE-2025-40038"
},
{
"category": "external",
"summary": "SUSE Bug 1252817 for CVE-2025-40038",
"url": "https://bugzilla.suse.com/1252817"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 16.0:cluster-md-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dtb-allwinner-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-altera-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amazon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amlogic-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apple-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-arm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-broadcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-cavium-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-exynos-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-freescale-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-hisilicon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-lg-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-marvell-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-mediatek-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-nvidia-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-qcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-renesas-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-rockchip-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-socionext-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-sprd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-xilinx-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"openSUSE Leap 16.0:cluster-md-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dtb-allwinner-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-altera-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amazon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amlogic-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apple-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-arm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-broadcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-cavium-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-exynos-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-freescale-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-hisilicon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-lg-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-marvell-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-mediatek-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-nvidia-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-qcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-renesas-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-rockchip-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-socionext-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-sprd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-xilinx-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-19T17:38:16Z",
"details": "moderate"
}
],
"title": "CVE-2025-40038"
},
{
"cve": "CVE-2025-40047",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40047"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nio_uring/waitid: always prune wait queue entry in io_waitid_wait()\n\nFor a successful return, always remove our entry from the wait queue\nentry list. Previously this was skipped if a cancelation was in\nprogress, but this can race with another invocation of the wait queue\nentry callback.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 16.0:cluster-md-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dtb-allwinner-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-altera-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amazon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amlogic-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apple-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-arm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-broadcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-cavium-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-exynos-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-freescale-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-hisilicon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-lg-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-marvell-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-mediatek-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-nvidia-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-qcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-renesas-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-rockchip-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-socionext-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-sprd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-xilinx-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40047",
"url": "https://www.suse.com/security/cve/CVE-2025-40047"
},
{
"category": "external",
"summary": "SUSE Bug 1252790 for CVE-2025-40047",
"url": "https://bugzilla.suse.com/1252790"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 16.0:cluster-md-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dtb-allwinner-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-altera-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amazon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amlogic-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apple-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-arm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-broadcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-cavium-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-exynos-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-freescale-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-hisilicon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-lg-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-marvell-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-mediatek-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-nvidia-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-qcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-renesas-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-rockchip-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-socionext-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-sprd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-xilinx-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.7,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"openSUSE Leap 16.0:cluster-md-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dtb-allwinner-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-altera-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amazon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amlogic-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apple-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-arm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-broadcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-cavium-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-exynos-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-freescale-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-hisilicon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-lg-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-marvell-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-mediatek-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-nvidia-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-qcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-renesas-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-rockchip-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-socionext-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-sprd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-xilinx-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-19T17:38:16Z",
"details": "moderate"
}
],
"title": "CVE-2025-40047"
},
{
"cve": "CVE-2025-40053",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40053"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nnet: dlink: handle copy_thresh allocation failure\n\nThe driver did not handle failure of `netdev_alloc_skb_ip_align()`.\nIf the allocation failed, dereferencing `skb-\u003eprotocol` could lead to\na NULL pointer dereference.\n\nThis patch tries to allocate `skb`. If the allocation fails, it falls\nback to the normal path.\n\nTested-on: D-Link DGE-550T Rev-A3",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 16.0:cluster-md-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dtb-allwinner-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-altera-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amazon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amlogic-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apple-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-arm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-broadcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-cavium-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-exynos-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-freescale-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-hisilicon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-lg-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-marvell-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-mediatek-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-nvidia-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-qcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-renesas-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-rockchip-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-socionext-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-sprd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-xilinx-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40053",
"url": "https://www.suse.com/security/cve/CVE-2025-40053"
},
{
"category": "external",
"summary": "SUSE Bug 1252808 for CVE-2025-40053",
"url": "https://bugzilla.suse.com/1252808"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 16.0:cluster-md-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dtb-allwinner-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-altera-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amazon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amlogic-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apple-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-arm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-broadcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-cavium-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-exynos-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-freescale-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-hisilicon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-lg-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-marvell-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-mediatek-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-nvidia-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-qcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-renesas-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-rockchip-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-socionext-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-sprd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-xilinx-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"openSUSE Leap 16.0:cluster-md-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dtb-allwinner-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-altera-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amazon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amlogic-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apple-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-arm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-broadcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-cavium-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-exynos-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-freescale-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-hisilicon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-lg-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-marvell-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-mediatek-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-nvidia-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-qcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-renesas-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-rockchip-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-socionext-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-sprd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-xilinx-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-19T17:38:16Z",
"details": "moderate"
}
],
"title": "CVE-2025-40053"
},
{
"cve": "CVE-2025-40055",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40055"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nocfs2: fix double free in user_cluster_connect()\n\nuser_cluster_disconnect() frees \"conn-\u003ecc_private\" which is \"lc\" but then\nthe error handling frees \"lc\" a second time. Set \"lc\" to NULL on this\npath to avoid a double free.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 16.0:cluster-md-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dtb-allwinner-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-altera-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amazon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amlogic-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apple-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-arm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-broadcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-cavium-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-exynos-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-freescale-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-hisilicon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-lg-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-marvell-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-mediatek-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-nvidia-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-qcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-renesas-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-rockchip-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-socionext-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-sprd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-xilinx-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40055",
"url": "https://www.suse.com/security/cve/CVE-2025-40055"
},
{
"category": "external",
"summary": "SUSE Bug 1252821 for CVE-2025-40055",
"url": "https://bugzilla.suse.com/1252821"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 16.0:cluster-md-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dtb-allwinner-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-altera-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amazon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amlogic-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apple-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-arm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-broadcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-cavium-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-exynos-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-freescale-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-hisilicon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-lg-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-marvell-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-mediatek-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-nvidia-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-qcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-renesas-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-rockchip-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-socionext-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-sprd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-xilinx-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"openSUSE Leap 16.0:cluster-md-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dtb-allwinner-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-altera-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amazon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amlogic-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apple-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-arm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-broadcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-cavium-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-exynos-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-freescale-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-hisilicon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-lg-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-marvell-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-mediatek-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-nvidia-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-qcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-renesas-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-rockchip-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-socionext-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-sprd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-xilinx-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-19T17:38:16Z",
"details": "moderate"
}
],
"title": "CVE-2025-40055"
},
{
"cve": "CVE-2025-40059",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40059"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\ncoresight: Fix incorrect handling for return value of devm_kzalloc\n\nThe return value of devm_kzalloc could be an null pointer,\nuse \"!desc.pdata\" to fix incorrect handling return value\nof devm_kzalloc.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 16.0:cluster-md-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dtb-allwinner-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-altera-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amazon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amlogic-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apple-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-arm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-broadcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-cavium-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-exynos-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-freescale-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-hisilicon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-lg-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-marvell-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-mediatek-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-nvidia-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-qcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-renesas-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-rockchip-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-socionext-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-sprd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-xilinx-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40059",
"url": "https://www.suse.com/security/cve/CVE-2025-40059"
},
{
"category": "external",
"summary": "SUSE Bug 1252809 for CVE-2025-40059",
"url": "https://bugzilla.suse.com/1252809"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 16.0:cluster-md-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dtb-allwinner-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-altera-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amazon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amlogic-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apple-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-arm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-broadcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-cavium-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-exynos-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-freescale-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-hisilicon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-lg-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-marvell-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-mediatek-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-nvidia-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-qcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-renesas-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-rockchip-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-socionext-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-sprd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-xilinx-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"openSUSE Leap 16.0:cluster-md-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dtb-allwinner-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-altera-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amazon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amlogic-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apple-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-arm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-broadcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-cavium-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-exynos-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-freescale-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-hisilicon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-lg-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-marvell-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-mediatek-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-nvidia-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-qcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-renesas-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-rockchip-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-socionext-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-sprd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-xilinx-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-19T17:38:16Z",
"details": "moderate"
}
],
"title": "CVE-2025-40059"
},
{
"cve": "CVE-2025-40064",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40064"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nsmc: Fix use-after-free in __pnet_find_base_ndev().\n\nsyzbot reported use-after-free of net_device in __pnet_find_base_ndev(),\nwhich was called during connect(). [0]\n\nsmc_pnet_find_ism_resource() fetches sk_dst_get(sk)-\u003edev and passes\ndown to pnet_find_base_ndev(), where RTNL is held. Then, UAF happened\nat __pnet_find_base_ndev() when the dev is first used.\n\nThis means dev had already been freed before acquiring RTNL in\npnet_find_base_ndev().\n\nWhile dev is going away, dst-\u003edev could be swapped with blackhole_netdev,\nand the dev\u0027s refcnt by dst will be released.\n\nWe must hold dev\u0027s refcnt before calling smc_pnet_find_ism_resource().\n\nAlso, smc_pnet_find_roce_resource() has the same problem.\n\nLet\u0027s use __sk_dst_get() and dst_dev_rcu() in the two functions.\n\n[0]:\nBUG: KASAN: use-after-free in __pnet_find_base_ndev+0x1b1/0x1c0 net/smc/smc_pnet.c:926\nRead of size 1 at addr ffff888036bac33a by task syz.0.3632/18609\n\nCPU: 1 UID: 0 PID: 18609 Comm: syz.0.3632 Not tainted syzkaller #0 PREEMPT(full)\nHardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/18/2025\nCall Trace:\n \u003cTASK\u003e\n dump_stack_lvl+0x189/0x250 lib/dump_stack.c:120\n print_address_description mm/kasan/report.c:378 [inline]\n print_report+0xca/0x240 mm/kasan/report.c:482\n kasan_report+0x118/0x150 mm/kasan/report.c:595\n __pnet_find_base_ndev+0x1b1/0x1c0 net/smc/smc_pnet.c:926\n pnet_find_base_ndev net/smc/smc_pnet.c:946 [inline]\n smc_pnet_find_ism_by_pnetid net/smc/smc_pnet.c:1103 [inline]\n smc_pnet_find_ism_resource+0xef/0x390 net/smc/smc_pnet.c:1154\n smc_find_ism_device net/smc/af_smc.c:1030 [inline]\n smc_find_proposal_devices net/smc/af_smc.c:1115 [inline]\n __smc_connect+0x372/0x1890 net/smc/af_smc.c:1545\n smc_connect+0x877/0xd90 net/smc/af_smc.c:1715\n __sys_connect_file net/socket.c:2086 [inline]\n __sys_connect+0x313/0x440 net/socket.c:2105\n __do_sys_connect net/socket.c:2111 [inline]\n __se_sys_connect net/socket.c:2108 [inline]\n __x64_sys_connect+0x7a/0x90 net/socket.c:2108\n do_syscall_x64 arch/x86/entry/syscall_64.c:63 [inline]\n do_syscall_64+0xfa/0x3b0 arch/x86/entry/syscall_64.c:94\n entry_SYSCALL_64_after_hwframe+0x77/0x7f\nRIP: 0033:0x7f47cbf8eba9\nCode: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 \u003c48\u003e 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48\nRSP: 002b:00007f47ccdb1038 EFLAGS: 00000246 ORIG_RAX: 000000000000002a\nRAX: ffffffffffffffda RBX: 00007f47cc1d5fa0 RCX: 00007f47cbf8eba9\nRDX: 0000000000000010 RSI: 0000200000000280 RDI: 000000000000000b\nRBP: 00007f47cc011e19 R08: 0000000000000000 R09: 0000000000000000\nR10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000\nR13: 00007f47cc1d6038 R14: 00007f47cc1d5fa0 R15: 00007ffc512f8aa8\n \u003c/TASK\u003e\n\nThe buggy address belongs to the physical page:\npage: refcount:0 mapcount:0 mapping:0000000000000000 index:0xffff888036bacd00 pfn:0x36bac\nflags: 0xfff00000000000(node=0|zone=1|lastcpupid=0x7ff)\nraw: 00fff00000000000 ffffea0001243d08 ffff8880b863fdc0 0000000000000000\nraw: ffff888036bacd00 0000000000000000 00000000ffffffff 0000000000000000\npage dumped because: kasan: bad access detected\npage_owner tracks the page as freed\npage last allocated via order 2, migratetype Unmovable, gfp_mask 0x446dc0(GFP_KERNEL_ACCOUNT|__GFP_ZERO|__GFP_NOWARN|__GFP_RETRY_MAYFAIL|__GFP_COMP), pid 16741, tgid 16741 (syz-executor), ts 343313197788, free_ts 380670750466\n set_page_owner include/linux/page_owner.h:32 [inline]\n post_alloc_hook+0x240/0x2a0 mm/page_alloc.c:1851\n prep_new_page mm/page_alloc.c:1859 [inline]\n get_page_from_freelist+0x21e4/0x22c0 mm/page_alloc.c:3858\n __alloc_frozen_pages_noprof+0x181/0x370 mm/page_alloc.c:5148\n alloc_pages_mpol+0x232/0x4a0 mm/mempolicy.c:2416\n ___kmalloc_large_node+0x5f/0x1b0 mm/slub.c:4317\n __kmalloc_large_node_noprof+0x18/0x90 mm/slub.c:4348\n __do_kmalloc_node mm/slub.c:4364 [inline]\n __kvmalloc_node\n---truncated---",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 16.0:cluster-md-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dtb-allwinner-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-altera-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amazon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amlogic-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apple-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-arm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-broadcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-cavium-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-exynos-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-freescale-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-hisilicon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-lg-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-marvell-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-mediatek-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-nvidia-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-qcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-renesas-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-rockchip-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-socionext-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-sprd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-xilinx-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40064",
"url": "https://www.suse.com/security/cve/CVE-2025-40064"
},
{
"category": "external",
"summary": "SUSE Bug 1252845 for CVE-2025-40064",
"url": "https://bugzilla.suse.com/1252845"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 16.0:cluster-md-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dtb-allwinner-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-altera-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amazon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amlogic-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apple-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-arm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-broadcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-cavium-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-exynos-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-freescale-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-hisilicon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-lg-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-marvell-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-mediatek-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-nvidia-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-qcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-renesas-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-rockchip-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-socionext-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-sprd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-xilinx-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"openSUSE Leap 16.0:cluster-md-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dtb-allwinner-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-altera-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amazon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amlogic-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apple-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-arm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-broadcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-cavium-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-exynos-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-freescale-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-hisilicon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-lg-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-marvell-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-mediatek-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-nvidia-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-qcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-renesas-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-rockchip-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-socionext-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-sprd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-xilinx-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-19T17:38:16Z",
"details": "moderate"
}
],
"title": "CVE-2025-40064"
},
{
"cve": "CVE-2025-40070",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40070"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\npps: fix warning in pps_register_cdev when register device fail\n\nSimilar to previous commit 2a934fdb01db (\"media: v4l2-dev: fix error\nhandling in __video_register_device()\"), the release hook should be set\nbefore device_register(). Otherwise, when device_register() return error\nand put_device() try to callback the release function, the below warning\nmay happen.\n\n ------------[ cut here ]------------\n WARNING: CPU: 1 PID: 4760 at drivers/base/core.c:2567 device_release+0x1bd/0x240 drivers/base/core.c:2567\n Modules linked in:\n CPU: 1 UID: 0 PID: 4760 Comm: syz.4.914 Not tainted 6.17.0-rc3+ #1 NONE\n RIP: 0010:device_release+0x1bd/0x240 drivers/base/core.c:2567\n Call Trace:\n \u003cTASK\u003e\n kobject_cleanup+0x136/0x410 lib/kobject.c:689\n kobject_release lib/kobject.c:720 [inline]\n kref_put include/linux/kref.h:65 [inline]\n kobject_put+0xe9/0x130 lib/kobject.c:737\n put_device+0x24/0x30 drivers/base/core.c:3797\n pps_register_cdev+0x2da/0x370 drivers/pps/pps.c:402\n pps_register_source+0x2f6/0x480 drivers/pps/kapi.c:108\n pps_tty_open+0x190/0x310 drivers/pps/clients/pps-ldisc.c:57\n tty_ldisc_open+0xa7/0x120 drivers/tty/tty_ldisc.c:432\n tty_set_ldisc+0x333/0x780 drivers/tty/tty_ldisc.c:563\n tiocsetd drivers/tty/tty_io.c:2429 [inline]\n tty_ioctl+0x5d1/0x1700 drivers/tty/tty_io.c:2728\n vfs_ioctl fs/ioctl.c:51 [inline]\n __do_sys_ioctl fs/ioctl.c:598 [inline]\n __se_sys_ioctl fs/ioctl.c:584 [inline]\n __x64_sys_ioctl+0x194/0x210 fs/ioctl.c:584\n do_syscall_x64 arch/x86/entry/syscall_64.c:63 [inline]\n do_syscall_64+0x5f/0x2a0 arch/x86/entry/syscall_64.c:94\n entry_SYSCALL_64_after_hwframe+0x76/0x7e\n \u003c/TASK\u003e\n\nBefore commit c79a39dc8d06 (\"pps: Fix a use-after-free\"),\npps_register_cdev() call device_create() to create pps-\u003edev, which will\ninit dev-\u003erelease to device_create_release(). Now the comment is outdated,\njust remove it.\n\nThanks for the reminder from Calvin Owens, \u0027kfree_pps\u0027 should be removed\nin pps_register_source() to avoid a double free in the failure case.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 16.0:cluster-md-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dtb-allwinner-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-altera-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amazon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amlogic-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apple-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-arm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-broadcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-cavium-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-exynos-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-freescale-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-hisilicon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-lg-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-marvell-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-mediatek-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-nvidia-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-qcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-renesas-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-rockchip-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-socionext-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-sprd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-xilinx-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40070",
"url": "https://www.suse.com/security/cve/CVE-2025-40070"
},
{
"category": "external",
"summary": "SUSE Bug 1252836 for CVE-2025-40070",
"url": "https://bugzilla.suse.com/1252836"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 16.0:cluster-md-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dtb-allwinner-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-altera-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amazon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amlogic-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apple-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-arm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-broadcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-cavium-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-exynos-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-freescale-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-hisilicon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-lg-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-marvell-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-mediatek-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-nvidia-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-qcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-renesas-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-rockchip-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-socionext-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-sprd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-xilinx-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"openSUSE Leap 16.0:cluster-md-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dtb-allwinner-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-altera-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amazon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amlogic-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apple-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-arm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-broadcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-cavium-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-exynos-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-freescale-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-hisilicon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-lg-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-marvell-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-mediatek-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-nvidia-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-qcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-renesas-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-rockchip-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-socionext-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-sprd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-xilinx-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-19T17:38:16Z",
"details": "moderate"
}
],
"title": "CVE-2025-40070"
},
{
"cve": "CVE-2025-40074",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40074"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nipv4: start using dst_dev_rcu()\n\nChange icmpv4_xrlim_allow(), ip_defrag() to prevent possible UAF.\n\nChange ipmr_prepare_xmit(), ipmr_queue_fwd_xmit(), ip_mr_output(),\nipv4_neigh_lookup() to use lockdep enabled dst_dev_rcu().",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 16.0:cluster-md-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dtb-allwinner-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-altera-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amazon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amlogic-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apple-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-arm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-broadcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-cavium-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-exynos-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-freescale-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-hisilicon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-lg-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-marvell-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-mediatek-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-nvidia-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-qcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-renesas-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-rockchip-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-socionext-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-sprd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-xilinx-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40074",
"url": "https://www.suse.com/security/cve/CVE-2025-40074"
},
{
"category": "external",
"summary": "SUSE Bug 1252794 for CVE-2025-40074",
"url": "https://bugzilla.suse.com/1252794"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 16.0:cluster-md-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dtb-allwinner-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-altera-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amazon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amlogic-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apple-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-arm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-broadcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-cavium-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-exynos-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-freescale-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-hisilicon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-lg-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-marvell-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-mediatek-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-nvidia-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-qcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-renesas-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-rockchip-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-socionext-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-sprd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-xilinx-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"openSUSE Leap 16.0:cluster-md-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dtb-allwinner-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-altera-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amazon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amlogic-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apple-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-arm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-broadcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-cavium-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-exynos-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-freescale-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-hisilicon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-lg-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-marvell-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-mediatek-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-nvidia-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-qcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-renesas-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-rockchip-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-socionext-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-sprd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-xilinx-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-19T17:38:16Z",
"details": "moderate"
}
],
"title": "CVE-2025-40074"
},
{
"cve": "CVE-2025-40075",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40075"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\ntcp_metrics: use dst_dev_net_rcu()\n\nReplace three dst_dev() with a lockdep enabled helper.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 16.0:cluster-md-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dtb-allwinner-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-altera-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amazon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amlogic-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apple-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-arm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-broadcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-cavium-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-exynos-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-freescale-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-hisilicon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-lg-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-marvell-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-mediatek-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-nvidia-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-qcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-renesas-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-rockchip-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-socionext-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-sprd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-xilinx-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40075",
"url": "https://www.suse.com/security/cve/CVE-2025-40075"
},
{
"category": "external",
"summary": "SUSE Bug 1252795 for CVE-2025-40075",
"url": "https://bugzilla.suse.com/1252795"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 16.0:cluster-md-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dtb-allwinner-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-altera-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amazon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amlogic-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apple-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-arm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-broadcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-cavium-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-exynos-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-freescale-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-hisilicon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-lg-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-marvell-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-mediatek-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-nvidia-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-qcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-renesas-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-rockchip-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-socionext-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-sprd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-xilinx-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"openSUSE Leap 16.0:cluster-md-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dtb-allwinner-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-altera-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amazon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amlogic-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apple-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-arm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-broadcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-cavium-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-exynos-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-freescale-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-hisilicon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-lg-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-marvell-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-mediatek-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-nvidia-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-qcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-renesas-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-rockchip-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-socionext-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-sprd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-xilinx-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-19T17:38:16Z",
"details": "moderate"
}
],
"title": "CVE-2025-40075"
},
{
"cve": "CVE-2025-40081",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40081"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nperf: arm_spe: Prevent overflow in PERF_IDX2OFF()\n\nCast nr_pages to unsigned long to avoid overflow when handling large\nAUX buffer sizes (\u003e= 2 GiB).",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 16.0:cluster-md-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dtb-allwinner-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-altera-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amazon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amlogic-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apple-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-arm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-broadcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-cavium-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-exynos-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-freescale-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-hisilicon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-lg-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-marvell-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-mediatek-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-nvidia-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-qcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-renesas-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-rockchip-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-socionext-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-sprd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-xilinx-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40081",
"url": "https://www.suse.com/security/cve/CVE-2025-40081"
},
{
"category": "external",
"summary": "SUSE Bug 1252776 for CVE-2025-40081",
"url": "https://bugzilla.suse.com/1252776"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 16.0:cluster-md-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dtb-allwinner-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-altera-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amazon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amlogic-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apple-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-arm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-broadcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-cavium-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-exynos-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-freescale-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-hisilicon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-lg-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-marvell-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-mediatek-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-nvidia-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-qcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-renesas-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-rockchip-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-socionext-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-sprd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-xilinx-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"openSUSE Leap 16.0:cluster-md-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dtb-allwinner-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-altera-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amazon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amlogic-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apple-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-arm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-broadcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-cavium-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-exynos-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-freescale-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-hisilicon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-lg-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-marvell-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-mediatek-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-nvidia-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-qcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-renesas-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-rockchip-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-socionext-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-sprd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-xilinx-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-19T17:38:16Z",
"details": "moderate"
}
],
"title": "CVE-2025-40081"
},
{
"cve": "CVE-2025-40083",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40083"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nnet/sched: sch_qfq: Fix null-deref in agg_dequeue\n\nTo prevent a potential crash in agg_dequeue (net/sched/sch_qfq.c)\nwhen cl-\u003eqdisc-\u003eops-\u003epeek(cl-\u003eqdisc) returns NULL, we check the return\nvalue before using it, similar to the existing approach in sch_hfsc.c.\n\nTo avoid code duplication, the following changes are made:\n\n1. Changed qdisc_warn_nonwc(include/net/pkt_sched.h) into a static\ninline function.\n\n2. Moved qdisc_peek_len from net/sched/sch_hfsc.c to\ninclude/net/pkt_sched.h so that sch_qfq can reuse it.\n\n3. Applied qdisc_peek_len in agg_dequeue to avoid crashing.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 16.0:cluster-md-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dtb-allwinner-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-altera-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amazon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amlogic-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apple-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-arm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-broadcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-cavium-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-exynos-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-freescale-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-hisilicon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-lg-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-marvell-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-mediatek-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-nvidia-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-qcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-renesas-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-rockchip-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-socionext-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-sprd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-xilinx-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40083",
"url": "https://www.suse.com/security/cve/CVE-2025-40083"
},
{
"category": "external",
"summary": "SUSE Bug 1252912 for CVE-2025-40083",
"url": "https://bugzilla.suse.com/1252912"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 16.0:cluster-md-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dtb-allwinner-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-altera-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amazon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amlogic-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apple-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-arm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-broadcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-cavium-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-exynos-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-freescale-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-hisilicon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-lg-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-marvell-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-mediatek-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-nvidia-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-qcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-renesas-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-rockchip-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-socionext-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-sprd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-xilinx-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"openSUSE Leap 16.0:cluster-md-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dtb-allwinner-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-altera-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amazon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amlogic-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apple-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-arm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-broadcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-cavium-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-exynos-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-freescale-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-hisilicon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-lg-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-marvell-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-mediatek-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-nvidia-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-qcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-renesas-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-rockchip-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-socionext-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-sprd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-xilinx-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-19T17:38:16Z",
"details": "moderate"
}
],
"title": "CVE-2025-40083"
},
{
"cve": "CVE-2025-40086",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40086"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\ndrm/xe: Don\u0027t allow evicting of BOs in same VM in array of VM binds\n\nAn array of VM binds can potentially evict other buffer objects (BOs)\nwithin the same VM under certain conditions, which may lead to NULL\npointer dereferences later in the bind pipeline. To prevent this, clear\nthe allow_res_evict flag in the xe_bo_validate call.\n\nv2:\n - Invert polarity of no_res_evict (Thomas)\n - Add comment in code explaining issue (Thomas)\n\n(cherry picked from commit 8b9ba8d6d95fe75fed6b0480bb03da4b321bea08)",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 16.0:cluster-md-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dtb-allwinner-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-altera-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amazon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amlogic-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apple-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-arm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-broadcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-cavium-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-exynos-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-freescale-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-hisilicon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-lg-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-marvell-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-mediatek-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-nvidia-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-qcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-renesas-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-rockchip-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-socionext-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-sprd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-xilinx-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40086",
"url": "https://www.suse.com/security/cve/CVE-2025-40086"
},
{
"category": "external",
"summary": "SUSE Bug 1252923 for CVE-2025-40086",
"url": "https://bugzilla.suse.com/1252923"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 16.0:cluster-md-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dtb-allwinner-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-altera-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amazon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amlogic-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apple-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-arm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-broadcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-cavium-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-exynos-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-freescale-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-hisilicon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-lg-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-marvell-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-mediatek-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-nvidia-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-qcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-renesas-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-rockchip-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-socionext-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-sprd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-xilinx-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.1,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H",
"version": "3.1"
},
"products": [
"openSUSE Leap 16.0:cluster-md-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dtb-allwinner-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-altera-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amazon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amlogic-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apple-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-arm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-broadcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-cavium-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-exynos-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-freescale-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-hisilicon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-lg-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-marvell-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-mediatek-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-nvidia-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-qcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-renesas-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-rockchip-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-socionext-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-sprd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-xilinx-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-19T17:38:16Z",
"details": "moderate"
}
],
"title": "CVE-2025-40086"
},
{
"cve": "CVE-2025-40098",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40098"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nALSA: hda: cs35l41: Fix NULL pointer dereference in cs35l41_get_acpi_mute_state()\n\nReturn value of a function acpi_evaluate_dsm() is dereferenced without\nchecking for NULL, but it is usually checked for this function.\n\nacpi_evaluate_dsm() may return NULL, when acpi_evaluate_object() returns\nacpi_status other than ACPI_SUCCESS, so add a check to prevent the crach.\n\nFound by Linux Verification Center (linuxtesting.org) with SVACE.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 16.0:cluster-md-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dtb-allwinner-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-altera-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amazon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amlogic-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apple-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-arm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-broadcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-cavium-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-exynos-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-freescale-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-hisilicon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-lg-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-marvell-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-mediatek-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-nvidia-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-qcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-renesas-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-rockchip-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-socionext-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-sprd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-xilinx-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40098",
"url": "https://www.suse.com/security/cve/CVE-2025-40098"
},
{
"category": "external",
"summary": "SUSE Bug 1252917 for CVE-2025-40098",
"url": "https://bugzilla.suse.com/1252917"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 16.0:cluster-md-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dtb-allwinner-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-altera-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amazon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amlogic-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apple-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-arm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-broadcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-cavium-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-exynos-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-freescale-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-hisilicon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-lg-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-marvell-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-mediatek-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-nvidia-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-qcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-renesas-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-rockchip-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-socionext-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-sprd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-xilinx-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"openSUSE Leap 16.0:cluster-md-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dtb-allwinner-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-altera-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amazon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amlogic-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apple-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-arm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-broadcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-cavium-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-exynos-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-freescale-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-hisilicon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-lg-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-marvell-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-mediatek-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-nvidia-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-qcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-renesas-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-rockchip-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-socionext-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-sprd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-xilinx-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-19T17:38:16Z",
"details": "moderate"
}
],
"title": "CVE-2025-40098"
},
{
"cve": "CVE-2025-40101",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40101"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nbtrfs: fix memory leaks when rejecting a non SINGLE data profile without an RST\n\nAt the end of btrfs_load_block_group_zone_info() the first thing we do\nis to ensure that if the mapping type is not a SINGLE one and there is\nno RAID stripe tree, then we return early with an error.\n\nDoing that, though, prevents the code from running the last calls from\nthis function which are about freeing memory allocated during its\nrun. Hence, in this case, instead of returning early, we set the ret\nvalue and fall through the rest of the cleanup code.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 16.0:cluster-md-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dtb-allwinner-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-altera-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amazon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amlogic-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apple-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-arm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-broadcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-cavium-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-exynos-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-freescale-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-hisilicon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-lg-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-marvell-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-mediatek-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-nvidia-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-qcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-renesas-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-rockchip-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-socionext-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-sprd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-xilinx-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40101",
"url": "https://www.suse.com/security/cve/CVE-2025-40101"
},
{
"category": "external",
"summary": "SUSE Bug 1252901 for CVE-2025-40101",
"url": "https://bugzilla.suse.com/1252901"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 16.0:cluster-md-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dtb-allwinner-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-altera-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amazon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amlogic-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apple-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-arm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-broadcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-cavium-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-exynos-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-freescale-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-hisilicon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-lg-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-marvell-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-mediatek-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-nvidia-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-qcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-renesas-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-rockchip-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-socionext-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-sprd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-xilinx-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 3.3,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L",
"version": "3.1"
},
"products": [
"openSUSE Leap 16.0:cluster-md-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dtb-allwinner-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-altera-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amazon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amlogic-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apple-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-arm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-broadcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-cavium-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-exynos-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-freescale-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-hisilicon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-lg-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-marvell-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-mediatek-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-nvidia-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-qcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-renesas-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-rockchip-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-socionext-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-sprd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-xilinx-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-19T17:38:16Z",
"details": "low"
}
],
"title": "CVE-2025-40101"
},
{
"cve": "CVE-2025-40102",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40102"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nKVM: arm64: Prevent access to vCPU events before init\n\nAnother day, another syzkaller bug. KVM erroneously allows userspace to\npend vCPU events for a vCPU that hasn\u0027t been initialized yet, leading to\nKVM interpreting a bunch of uninitialized garbage for routing /\ninjecting the exception.\n\nIn one case the injection code and the hyp disagree on whether the vCPU\nhas a 32bit EL1 and put the vCPU into an illegal mode for AArch64,\ntripping the BUG() in exception_target_el() during the next injection:\n\n kernel BUG at arch/arm64/kvm/inject_fault.c:40!\n Internal error: Oops - BUG: 00000000f2000800 [#1] SMP\n CPU: 3 UID: 0 PID: 318 Comm: repro Not tainted 6.17.0-rc4-00104-g10fd0285305d #6 PREEMPT\n Hardware name: linux,dummy-virt (DT)\n pstate: 21402009 (nzCv daif +PAN -UAO -TCO +DIT -SSBS BTYPE=--)\n pc : exception_target_el+0x88/0x8c\n lr : pend_serror_exception+0x18/0x13c\n sp : ffff800082f03a10\n x29: ffff800082f03a10 x28: ffff0000cb132280 x27: 0000000000000000\n x26: 0000000000000000 x25: ffff0000c2a99c20 x24: 0000000000000000\n x23: 0000000000008000 x22: 0000000000000002 x21: 0000000000000004\n x20: 0000000000008000 x19: ffff0000c2a99c20 x18: 0000000000000000\n x17: 0000000000000000 x16: 0000000000000000 x15: 00000000200000c0\n x14: 0000000000000000 x13: 0000000000000000 x12: 0000000000000000\n x11: 0000000000000000 x10: 0000000000000000 x9 : 0000000000000000\n x8 : ffff800082f03af8 x7 : 0000000000000000 x6 : 0000000000000000\n x5 : ffff800080f621f0 x4 : 0000000000000000 x3 : 0000000000000000\n x2 : 000000000040009b x1 : 0000000000000003 x0 : ffff0000c2a99c20\n Call trace:\n exception_target_el+0x88/0x8c (P)\n kvm_inject_serror_esr+0x40/0x3b4\n __kvm_arm_vcpu_set_events+0xf0/0x100\n kvm_arch_vcpu_ioctl+0x180/0x9d4\n kvm_vcpu_ioctl+0x60c/0x9f4\n __arm64_sys_ioctl+0xac/0x104\n invoke_syscall+0x48/0x110\n el0_svc_common.constprop.0+0x40/0xe0\n do_el0_svc+0x1c/0x28\n el0_svc+0x34/0xf0\n el0t_64_sync_handler+0xa0/0xe4\n el0t_64_sync+0x198/0x19c\n Code: f946bc01 b4fffe61 9101e020 17fffff2 (d4210000)\n\nReject the ioctls outright as no sane VMM would call these before\nKVM_ARM_VCPU_INIT anyway. Even if it did the exception would\u0027ve been\nthrown away by the eventual reset of the vCPU\u0027s state.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 16.0:cluster-md-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dtb-allwinner-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-altera-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amazon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amlogic-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apple-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-arm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-broadcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-cavium-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-exynos-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-freescale-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-hisilicon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-lg-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-marvell-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-mediatek-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-nvidia-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-qcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-renesas-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-rockchip-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-socionext-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-sprd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-xilinx-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40102",
"url": "https://www.suse.com/security/cve/CVE-2025-40102"
},
{
"category": "external",
"summary": "SUSE Bug 1252919 for CVE-2025-40102",
"url": "https://bugzilla.suse.com/1252919"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 16.0:cluster-md-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dtb-allwinner-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-altera-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amazon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amlogic-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apple-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-arm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-broadcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-cavium-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-exynos-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-freescale-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-hisilicon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-lg-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-marvell-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-mediatek-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-nvidia-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-qcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-renesas-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-rockchip-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-socionext-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-sprd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-xilinx-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 0,
"baseSeverity": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:N",
"version": "3.1"
},
"products": [
"openSUSE Leap 16.0:cluster-md-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dtb-allwinner-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-altera-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amazon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amlogic-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apple-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-arm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-broadcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-cavium-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-exynos-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-freescale-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-hisilicon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-lg-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-marvell-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-mediatek-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-nvidia-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-qcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-renesas-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-rockchip-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-socionext-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-sprd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-xilinx-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-19T17:38:16Z",
"details": "moderate"
}
],
"title": "CVE-2025-40102"
},
{
"cve": "CVE-2025-40105",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40105"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nvfs: Don\u0027t leak disconnected dentries on umount\n\nWhen user calls open_by_handle_at() on some inode that is not cached, we\nwill create disconnected dentry for it. If such dentry is a directory,\nexportfs_decode_fh_raw() will then try to connect this dentry to the\ndentry tree through reconnect_path(). It may happen for various reasons\n(such as corrupted fs or race with rename) that the call to\nlookup_one_unlocked() in reconnect_one() will fail to find the dentry we\nare trying to reconnect and instead create a new dentry under the\nparent. Now this dentry will not be marked as disconnected although the\nparent still may well be disconnected (at least in case this\ninconsistency happened because the fs is corrupted and .. doesn\u0027t point\nto the real parent directory). This creates inconsistency in\ndisconnected flags but AFAICS it was mostly harmless. At least until\ncommit f1ee616214cb (\"VFS: don\u0027t keep disconnected dentries on d_anon\")\nwhich removed adding of most disconnected dentries to sb-\u003es_anon list.\nThus after this commit cleanup of disconnected dentries implicitely\nrelies on the fact that dput() will immediately reclaim such dentries.\nHowever when some leaf dentry isn\u0027t marked as disconnected, as in the\nscenario described above, the reclaim doesn\u0027t happen and the dentries\nare \"leaked\". Memory reclaim can eventually reclaim them but otherwise\nthey stay in memory and if umount comes first, we hit infamous \"Busy\ninodes after unmount\" bug. Make sure all dentries created under a\ndisconnected parent are marked as disconnected as well.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 16.0:cluster-md-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dtb-allwinner-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-altera-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amazon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amlogic-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apple-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-arm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-broadcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-cavium-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-exynos-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-freescale-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-hisilicon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-lg-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-marvell-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-mediatek-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-nvidia-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-qcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-renesas-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-rockchip-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-socionext-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-sprd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-xilinx-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40105",
"url": "https://www.suse.com/security/cve/CVE-2025-40105"
},
{
"category": "external",
"summary": "SUSE Bug 1252928 for CVE-2025-40105",
"url": "https://bugzilla.suse.com/1252928"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 16.0:cluster-md-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dtb-allwinner-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-altera-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amazon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amlogic-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apple-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-arm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-broadcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-cavium-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-exynos-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-freescale-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-hisilicon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-lg-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-marvell-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-mediatek-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-nvidia-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-qcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-renesas-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-rockchip-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-socionext-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-sprd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-xilinx-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 3.3,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L",
"version": "3.1"
},
"products": [
"openSUSE Leap 16.0:cluster-md-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dtb-allwinner-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-altera-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amazon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amlogic-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apple-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-arm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-broadcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-cavium-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-exynos-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-freescale-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-hisilicon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-lg-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-marvell-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-mediatek-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-nvidia-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-qcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-renesas-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-rockchip-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-socionext-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-sprd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-xilinx-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-19T17:38:16Z",
"details": "low"
}
],
"title": "CVE-2025-40105"
},
{
"cve": "CVE-2025-40107",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40107"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\ncan: hi311x: fix null pointer dereference when resuming from sleep before interface was enabled\n\nThis issue is similar to the vulnerability in the `mcp251x` driver,\nwhich was fixed in commit 03c427147b2d (\"can: mcp251x: fix resume from\nsleep before interface was brought up\").\n\nIn the `hi311x` driver, when the device resumes from sleep, the driver\nschedules `priv-\u003erestart_work`. However, if the network interface was\nnot previously enabled, the `priv-\u003ewq` (workqueue) is not allocated and\ninitialized, leading to a null pointer dereference.\n\nTo fix this, we move the allocation and initialization of the workqueue\nfrom the `hi3110_open` function to the `hi3110_can_probe` function.\nThis ensures that the workqueue is properly initialized before it is\nused during device resume. And added logic to destroy the workqueue\nin the error handling paths of `hi3110_can_probe` and in the\n`hi3110_can_remove` function to prevent resource leaks.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 16.0:cluster-md-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dtb-allwinner-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-altera-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amazon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amlogic-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apple-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-arm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-broadcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-cavium-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-exynos-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-freescale-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-hisilicon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-lg-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-marvell-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-mediatek-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-nvidia-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-qcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-renesas-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-rockchip-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-socionext-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-sprd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-xilinx-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40107",
"url": "https://www.suse.com/security/cve/CVE-2025-40107"
},
{
"category": "external",
"summary": "SUSE Bug 1253018 for CVE-2025-40107",
"url": "https://bugzilla.suse.com/1253018"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 16.0:cluster-md-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dtb-allwinner-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-altera-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amazon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amlogic-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apple-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-arm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-broadcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-cavium-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-exynos-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-freescale-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-hisilicon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-lg-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-marvell-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-mediatek-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-nvidia-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-qcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-renesas-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-rockchip-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-socionext-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-sprd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-xilinx-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"openSUSE Leap 16.0:cluster-md-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dtb-allwinner-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-altera-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amazon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amlogic-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apple-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-arm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-broadcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-cavium-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-exynos-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-freescale-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-hisilicon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-lg-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-marvell-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-mediatek-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-nvidia-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-qcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-renesas-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-rockchip-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-socionext-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-sprd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-xilinx-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-19T17:38:16Z",
"details": "moderate"
}
],
"title": "CVE-2025-40107"
},
{
"cve": "CVE-2025-40109",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40109"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\ncrypto: rng - Ensure set_ent is always present\n\nEnsure that set_ent is always set since only drbg provides it.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 16.0:cluster-md-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dtb-allwinner-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-altera-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amazon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amlogic-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apple-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-arm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-broadcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-cavium-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-exynos-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-freescale-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-hisilicon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-lg-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-marvell-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-mediatek-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-nvidia-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-qcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-renesas-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-rockchip-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-socionext-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-sprd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-xilinx-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40109",
"url": "https://www.suse.com/security/cve/CVE-2025-40109"
},
{
"category": "external",
"summary": "SUSE Bug 1253176 for CVE-2025-40109",
"url": "https://bugzilla.suse.com/1253176"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 16.0:cluster-md-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dtb-allwinner-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-altera-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amazon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amlogic-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apple-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-arm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-broadcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-cavium-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-exynos-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-freescale-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-hisilicon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-lg-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-marvell-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-mediatek-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-nvidia-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-qcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-renesas-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-rockchip-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-socionext-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-sprd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-xilinx-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"openSUSE Leap 16.0:cluster-md-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dtb-allwinner-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-altera-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amazon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amlogic-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apple-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-arm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-broadcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-cavium-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-exynos-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-freescale-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-hisilicon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-lg-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-marvell-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-mediatek-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-nvidia-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-qcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-renesas-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-rockchip-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-socionext-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-sprd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-xilinx-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-19T17:38:16Z",
"details": "moderate"
}
],
"title": "CVE-2025-40109"
},
{
"cve": "CVE-2025-40110",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40110"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\ndrm/vmwgfx: Fix a null-ptr access in the cursor snooper\n\nCheck that the resource which is converted to a surface exists before\ntrying to use the cursor snooper on it.\n\nvmw_cmd_res_check allows explicit invalid (SVGA3D_INVALID_ID) identifiers\nbecause some svga commands accept SVGA3D_INVALID_ID to mean \"no surface\",\nunfortunately functions that accept the actual surfaces as objects might\n(and in case of the cursor snooper, do not) be able to handle null\nobjects. Make sure that we validate not only the identifier (via the\nvmw_cmd_res_check) but also check that the actual resource exists before\ntrying to do something with it.\n\nFixes unchecked null-ptr reference in the snooping code.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 16.0:cluster-md-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dtb-allwinner-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-altera-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amazon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amlogic-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apple-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-arm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-broadcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-cavium-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-exynos-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-freescale-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-hisilicon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-lg-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-marvell-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-mediatek-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-nvidia-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-qcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-renesas-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-rockchip-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-socionext-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-sprd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-xilinx-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40110",
"url": "https://www.suse.com/security/cve/CVE-2025-40110"
},
{
"category": "external",
"summary": "SUSE Bug 1253275 for CVE-2025-40110",
"url": "https://bugzilla.suse.com/1253275"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 16.0:cluster-md-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dtb-allwinner-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-altera-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amazon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amlogic-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apple-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-arm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-broadcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-cavium-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-exynos-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-freescale-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-hisilicon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-lg-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-marvell-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-mediatek-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-nvidia-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-qcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-renesas-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-rockchip-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-socionext-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-sprd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-xilinx-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.1,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"openSUSE Leap 16.0:cluster-md-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dtb-allwinner-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-altera-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amazon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amlogic-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apple-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-arm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-broadcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-cavium-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-exynos-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-freescale-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-hisilicon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-lg-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-marvell-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-mediatek-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-nvidia-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-qcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-renesas-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-rockchip-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-socionext-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-sprd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-xilinx-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-19T17:38:16Z",
"details": "moderate"
}
],
"title": "CVE-2025-40110"
},
{
"cve": "CVE-2025-40111",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40111"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\ndrm/vmwgfx: Fix Use-after-free in validation\n\nNodes stored in the validation duplicates hashtable come from an arena\nallocator that is cleared at the end of vmw_execbuf_process. All nodes\nare expected to be cleared in vmw_validation_drop_ht but this node escaped\nbecause its resource was destroyed prematurely.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 16.0:cluster-md-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dtb-allwinner-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-altera-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amazon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amlogic-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apple-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-arm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-broadcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-cavium-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-exynos-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-freescale-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-hisilicon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-lg-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-marvell-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-mediatek-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-nvidia-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-qcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-renesas-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-rockchip-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-socionext-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-sprd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-xilinx-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40111",
"url": "https://www.suse.com/security/cve/CVE-2025-40111"
},
{
"category": "external",
"summary": "SUSE Bug 1253362 for CVE-2025-40111",
"url": "https://bugzilla.suse.com/1253362"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 16.0:cluster-md-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dtb-allwinner-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-altera-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amazon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amlogic-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apple-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-arm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-broadcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-cavium-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-exynos-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-freescale-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-hisilicon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-lg-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-marvell-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-mediatek-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-nvidia-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-qcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-renesas-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-rockchip-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-socionext-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-sprd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-xilinx-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.7,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:L/A:H",
"version": "3.1"
},
"products": [
"openSUSE Leap 16.0:cluster-md-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dtb-allwinner-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-altera-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amazon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amlogic-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apple-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-arm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-broadcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-cavium-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-exynos-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-freescale-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-hisilicon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-lg-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-marvell-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-mediatek-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-nvidia-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-qcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-renesas-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-rockchip-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-socionext-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-sprd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-xilinx-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-19T17:38:16Z",
"details": "moderate"
}
],
"title": "CVE-2025-40111"
},
{
"cve": "CVE-2025-40115",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40115"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nscsi: mpt3sas: Fix crash in transport port remove by using ioc_info()\n\nDuring mpt3sas_transport_port_remove(), messages were logged with\ndev_printk() against \u0026mpt3sas_port-\u003eport-\u003edev. At this point the SAS\ntransport device may already be partially unregistered or freed, leading\nto a crash when accessing its struct device.\n\nUsing ioc_info(), which logs via the PCI device (ioc-\u003epdev-\u003edev),\nguaranteed to remain valid until driver removal.\n\n[83428.295776] Oops: general protection fault, probably for non-canonical address 0x6f702f323a33312d: 0000 [#1] SMP NOPTI\n[83428.295785] CPU: 145 UID: 0 PID: 113296 Comm: rmmod Kdump: loaded Tainted: G OE 6.16.0-rc1+ #1 PREEMPT(voluntary)\n[83428.295792] Tainted: [O]=OOT_MODULE, [E]=UNSIGNED_MODULE\n[83428.295795] Hardware name: Dell Inc. Precision 7875 Tower/, BIOS 89.1.67 02/23/2024\n[83428.295799] RIP: 0010:__dev_printk+0x1f/0x70\n[83428.295805] Code: 90 90 90 90 90 90 90 90 90 90 90 0f 1f 44 00 00 49 89 d1 48 85 f6 74 52 4c 8b 46 50 4d 85 c0 74 1f 48 8b 46 68 48 85 c0 74 22 \u003c48\u003e 8b 08 0f b6 7f 01 48 c7 c2 db e8 42 ad 83 ef 30 e9 7b f8 ff ff\n[83428.295813] RSP: 0018:ff85aeafc3137bb0 EFLAGS: 00010206\n[83428.295817] RAX: 6f702f323a33312d RBX: ff4290ee81292860 RCX: 5000cca25103be32\n[83428.295820] RDX: ff85aeafc3137bb8 RSI: ff4290eeb1966c00 RDI: ffffffffc1560845\n[83428.295823] RBP: ff85aeafc3137c18 R08: 74726f702f303a33 R09: ff85aeafc3137bb8\n[83428.295826] R10: ff85aeafc3137b18 R11: ff4290f5bd60fe68 R12: ff4290ee81290000\n[83428.295830] R13: ff4290ee6e345de0 R14: ff4290ee81290000 R15: ff4290ee6e345e30\n[83428.295833] FS: 00007fd9472a6740(0000) GS:ff4290f5ce96b000(0000) knlGS:0000000000000000\n[83428.295837] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033\n[83428.295840] CR2: 00007f242b4db238 CR3: 00000002372b8006 CR4: 0000000000771ef0\n[83428.295844] PKRU: 55555554\n[83428.295846] Call Trace:\n[83428.295848] \u003cTASK\u003e\n[83428.295850] _dev_printk+0x5c/0x80\n[83428.295857] ? srso_alias_return_thunk+0x5/0xfbef5\n[83428.295863] mpt3sas_transport_port_remove+0x1c7/0x420 [mpt3sas]\n[83428.295882] _scsih_remove_device+0x21b/0x280 [mpt3sas]\n[83428.295894] ? _scsih_expander_node_remove+0x108/0x140 [mpt3sas]\n[83428.295906] ? srso_alias_return_thunk+0x5/0xfbef5\n[83428.295910] mpt3sas_device_remove_by_sas_address.part.0+0x8f/0x110 [mpt3sas]\n[83428.295921] _scsih_expander_node_remove+0x129/0x140 [mpt3sas]\n[83428.295933] _scsih_expander_node_remove+0x6a/0x140 [mpt3sas]\n[83428.295944] scsih_remove+0x3f0/0x4a0 [mpt3sas]\n[83428.295957] pci_device_remove+0x3b/0xb0\n[83428.295962] device_release_driver_internal+0x193/0x200\n[83428.295968] driver_detach+0x44/0x90\n[83428.295971] bus_remove_driver+0x69/0xf0\n[83428.295975] pci_unregister_driver+0x2a/0xb0\n[83428.295979] _mpt3sas_exit+0x1f/0x300 [mpt3sas]\n[83428.295991] __do_sys_delete_module.constprop.0+0x174/0x310\n[83428.295997] ? srso_alias_return_thunk+0x5/0xfbef5\n[83428.296000] ? __x64_sys_getdents64+0x9a/0x110\n[83428.296005] ? srso_alias_return_thunk+0x5/0xfbef5\n[83428.296009] ? syscall_trace_enter+0xf6/0x1b0\n[83428.296014] do_syscall_64+0x7b/0x2c0\n[83428.296019] ? srso_alias_return_thunk+0x5/0xfbef5\n[83428.296023] entry_SYSCALL_64_after_hwframe+0x76/0x7e",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 16.0:cluster-md-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dtb-allwinner-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-altera-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amazon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amlogic-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apple-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-arm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-broadcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-cavium-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-exynos-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-freescale-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-hisilicon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-lg-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-marvell-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-mediatek-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-nvidia-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-qcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-renesas-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-rockchip-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-socionext-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-sprd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-xilinx-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40115",
"url": "https://www.suse.com/security/cve/CVE-2025-40115"
},
{
"category": "external",
"summary": "SUSE Bug 1253318 for CVE-2025-40115",
"url": "https://bugzilla.suse.com/1253318"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 16.0:cluster-md-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dtb-allwinner-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-altera-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amazon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amlogic-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apple-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-arm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-broadcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-cavium-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-exynos-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-freescale-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-hisilicon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-lg-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-marvell-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-mediatek-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-nvidia-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-qcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-renesas-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-rockchip-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-socionext-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-sprd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-xilinx-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"openSUSE Leap 16.0:cluster-md-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dtb-allwinner-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-altera-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amazon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amlogic-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apple-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-arm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-broadcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-cavium-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-exynos-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-freescale-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-hisilicon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-lg-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-marvell-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-mediatek-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-nvidia-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-qcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-renesas-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-rockchip-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-socionext-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-sprd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-xilinx-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-19T17:38:16Z",
"details": "moderate"
}
],
"title": "CVE-2025-40115"
},
{
"cve": "CVE-2025-40116",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40116"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nusb: host: max3421-hcd: Fix error pointer dereference in probe cleanup\n\nThe kthread_run() function returns error pointers so the\nmax3421_hcd-\u003espi_thread pointer can be either error pointers or NULL.\nCheck for both before dereferencing it.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 16.0:cluster-md-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dtb-allwinner-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-altera-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amazon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amlogic-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apple-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-arm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-broadcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-cavium-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-exynos-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-freescale-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-hisilicon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-lg-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-marvell-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-mediatek-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-nvidia-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-qcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-renesas-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-rockchip-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-socionext-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-sprd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-xilinx-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40116",
"url": "https://www.suse.com/security/cve/CVE-2025-40116"
},
{
"category": "external",
"summary": "SUSE Bug 1253324 for CVE-2025-40116",
"url": "https://bugzilla.suse.com/1253324"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 16.0:cluster-md-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dtb-allwinner-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-altera-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amazon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amlogic-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apple-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-arm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-broadcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-cavium-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-exynos-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-freescale-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-hisilicon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-lg-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-marvell-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-mediatek-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-nvidia-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-qcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-renesas-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-rockchip-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-socionext-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-sprd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-xilinx-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"openSUSE Leap 16.0:cluster-md-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dtb-allwinner-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-altera-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amazon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amlogic-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apple-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-arm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-broadcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-cavium-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-exynos-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-freescale-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-hisilicon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-lg-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-marvell-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-mediatek-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-nvidia-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-qcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-renesas-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-rockchip-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-socionext-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-sprd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-xilinx-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-19T17:38:16Z",
"details": "moderate"
}
],
"title": "CVE-2025-40116"
},
{
"cve": "CVE-2025-40118",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40118"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nscsi: pm80xx: Fix array-index-out-of-of-bounds on rmmod\n\nSince commit f7b705c238d1 (\"scsi: pm80xx: Set phy_attached to zero when\ndevice is gone\") UBSAN reports:\n\n UBSAN: array-index-out-of-bounds in drivers/scsi/pm8001/pm8001_sas.c:786:17\n index 28 is out of range for type \u0027pm8001_phy [16]\u0027\n\non rmmod when using an expander.\n\nFor a direct attached device, attached_phy contains the local phy id.\nFor a device behind an expander, attached_phy contains the remote phy\nid, not the local phy id.\n\nI.e. while pm8001_ha will have pm8001_ha-\u003echip-\u003en_phy local phys, for a\ndevice behind an expander, attached_phy can be much larger than\npm8001_ha-\u003echip-\u003en_phy (depending on the amount of phys of the\nexpander).\n\nE.g. on my system pm8001_ha has 8 phys with phy ids 0-7. One of the\nports has an expander connected. The expander has 31 phys with phy ids\n0-30.\n\nThe pm8001_ha-\u003ephy array only contains the phys of the HBA. It does not\ncontain the phys of the expander. Thus, it is wrong to use attached_phy\nto index the pm8001_ha-\u003ephy array for a device behind an expander.\n\nThus, we can only clear phy_attached for devices that are directly\nattached.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 16.0:cluster-md-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dtb-allwinner-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-altera-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amazon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amlogic-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apple-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-arm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-broadcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-cavium-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-exynos-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-freescale-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-hisilicon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-lg-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-marvell-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-mediatek-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-nvidia-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-qcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-renesas-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-rockchip-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-socionext-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-sprd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-xilinx-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40118",
"url": "https://www.suse.com/security/cve/CVE-2025-40118"
},
{
"category": "external",
"summary": "SUSE Bug 1253363 for CVE-2025-40118",
"url": "https://bugzilla.suse.com/1253363"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 16.0:cluster-md-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dtb-allwinner-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-altera-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amazon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amlogic-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apple-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-arm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-broadcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-cavium-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-exynos-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-freescale-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-hisilicon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-lg-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-marvell-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-mediatek-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-nvidia-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-qcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-renesas-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-rockchip-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-socionext-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-sprd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-xilinx-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.1,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H",
"version": "3.1"
},
"products": [
"openSUSE Leap 16.0:cluster-md-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dtb-allwinner-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-altera-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amazon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amlogic-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apple-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-arm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-broadcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-cavium-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-exynos-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-freescale-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-hisilicon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-lg-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-marvell-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-mediatek-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-nvidia-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-qcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-renesas-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-rockchip-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-socionext-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-sprd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-xilinx-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-19T17:38:16Z",
"details": "moderate"
}
],
"title": "CVE-2025-40118"
},
{
"cve": "CVE-2025-40120",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40120"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nnet: usb: asix: hold PM usage ref to avoid PM/MDIO + RTNL deadlock\n\nPrevent USB runtime PM (autosuspend) for AX88772* in bind.\n\nusbnet enables runtime PM (autosuspend) by default, so disabling it via\nthe usb_driver flag is ineffective. On AX88772B, autosuspend shows no\nmeasurable power saving with current driver (no link partner, admin\nup/down). The ~0.453 W -\u003e ~0.248 W drop on v6.1 comes from phylib powering\nthe PHY off on admin-down, not from USB autosuspend.\n\nThe real hazard is that with runtime PM enabled, ndo_open() (under RTNL)\nmay synchronously trigger autoresume (usb_autopm_get_interface()) into\nasix_resume() while the USB PM lock is held. Resume paths then invoke\nphylink/phylib and MDIO, which also expect RTNL, leading to possible\ndeadlocks or PM lock vs MDIO wake issues.\n\nTo avoid this, keep the device runtime-PM active by taking a usage\nreference in ax88772_bind() and dropping it in unbind(). A non-zero PM\nusage count blocks runtime suspend regardless of userspace policy\n(.../power/control - pm_runtime_allow/forbid), making this approach\nrobust against sysfs overrides.\n\nHolding a runtime-PM usage ref does not affect system-wide suspend;\nsystem sleep/resume callbacks continue to run as before.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 16.0:cluster-md-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dtb-allwinner-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-altera-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amazon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amlogic-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apple-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-arm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-broadcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-cavium-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-exynos-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-freescale-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-hisilicon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-lg-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-marvell-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-mediatek-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-nvidia-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-qcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-renesas-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-rockchip-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-socionext-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-sprd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-xilinx-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40120",
"url": "https://www.suse.com/security/cve/CVE-2025-40120"
},
{
"category": "external",
"summary": "SUSE Bug 1253360 for CVE-2025-40120",
"url": "https://bugzilla.suse.com/1253360"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 16.0:cluster-md-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dtb-allwinner-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-altera-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amazon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amlogic-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apple-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-arm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-broadcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-cavium-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-exynos-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-freescale-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-hisilicon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-lg-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-marvell-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-mediatek-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-nvidia-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-qcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-renesas-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-rockchip-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-socionext-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-sprd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-xilinx-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"openSUSE Leap 16.0:cluster-md-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dtb-allwinner-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-altera-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amazon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amlogic-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apple-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-arm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-broadcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-cavium-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-exynos-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-freescale-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-hisilicon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-lg-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-marvell-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-mediatek-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-nvidia-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-qcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-renesas-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-rockchip-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-socionext-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-sprd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-xilinx-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-19T17:38:16Z",
"details": "moderate"
}
],
"title": "CVE-2025-40120"
},
{
"cve": "CVE-2025-40121",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40121"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nASoC: Intel: bytcr_rt5651: Fix invalid quirk input mapping\n\nWhen an invalid value is passed via quirk option, currently\nbytcr_rt5640 driver just ignores and leaves as is, which may lead to\nunepxected results like OOB access.\n\nThis patch adds the sanity check and corrects the input mapping to the\ncertain default value if an invalid value is passed.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 16.0:cluster-md-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dtb-allwinner-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-altera-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amazon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amlogic-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apple-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-arm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-broadcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-cavium-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-exynos-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-freescale-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-hisilicon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-lg-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-marvell-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-mediatek-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-nvidia-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-qcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-renesas-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-rockchip-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-socionext-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-sprd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-xilinx-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40121",
"url": "https://www.suse.com/security/cve/CVE-2025-40121"
},
{
"category": "external",
"summary": "SUSE Bug 1253367 for CVE-2025-40121",
"url": "https://bugzilla.suse.com/1253367"
},
{
"category": "external",
"summary": "SUSE Bug 1253430 for CVE-2025-40121",
"url": "https://bugzilla.suse.com/1253430"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 16.0:cluster-md-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dtb-allwinner-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-altera-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amazon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amlogic-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apple-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-arm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-broadcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-cavium-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-exynos-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-freescale-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-hisilicon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-lg-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-marvell-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-mediatek-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-nvidia-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-qcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-renesas-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-rockchip-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-socionext-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-sprd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-xilinx-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"openSUSE Leap 16.0:cluster-md-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dtb-allwinner-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-altera-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amazon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amlogic-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apple-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-arm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-broadcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-cavium-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-exynos-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-freescale-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-hisilicon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-lg-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-marvell-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-mediatek-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-nvidia-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-qcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-renesas-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-rockchip-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-socionext-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-sprd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-xilinx-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-19T17:38:16Z",
"details": "moderate"
}
],
"title": "CVE-2025-40121"
},
{
"cve": "CVE-2025-40127",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40127"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nhwrng: ks-sa - fix division by zero in ks_sa_rng_init\n\nFix division by zero in ks_sa_rng_init caused by missing clock\npointer initialization. The clk_get_rate() call is performed on\nan uninitialized clk pointer, resulting in division by zero when\ncalculating delay values.\n\nAdd clock initialization code before using the clock.\n\n\n drivers/char/hw_random/ks-sa-rng.c | 7 +++++++\n 1 file changed, 7 insertions(+)",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 16.0:cluster-md-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dtb-allwinner-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-altera-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amazon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amlogic-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apple-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-arm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-broadcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-cavium-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-exynos-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-freescale-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-hisilicon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-lg-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-marvell-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-mediatek-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-nvidia-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-qcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-renesas-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-rockchip-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-socionext-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-sprd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-xilinx-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40127",
"url": "https://www.suse.com/security/cve/CVE-2025-40127"
},
{
"category": "external",
"summary": "SUSE Bug 1253369 for CVE-2025-40127",
"url": "https://bugzilla.suse.com/1253369"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 16.0:cluster-md-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dtb-allwinner-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-altera-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amazon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amlogic-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apple-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-arm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-broadcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-cavium-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-exynos-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-freescale-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-hisilicon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-lg-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-marvell-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-mediatek-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-nvidia-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-qcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-renesas-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-rockchip-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-socionext-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-sprd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-xilinx-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"openSUSE Leap 16.0:cluster-md-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dtb-allwinner-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-altera-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amazon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amlogic-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apple-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-arm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-broadcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-cavium-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-exynos-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-freescale-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-hisilicon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-lg-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-marvell-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-mediatek-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-nvidia-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-qcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-renesas-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-rockchip-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-socionext-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-sprd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-xilinx-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-19T17:38:16Z",
"details": "moderate"
}
],
"title": "CVE-2025-40127"
},
{
"cve": "CVE-2025-40129",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40129"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nsunrpc: fix null pointer dereference on zero-length checksum\n\nIn xdr_stream_decode_opaque_auth(), zero-length checksum.len causes\nchecksum.data to be set to NULL. This triggers a NPD when accessing\nchecksum.data in gss_krb5_verify_mic_v2(). This patch ensures that\nthe value of checksum.len is not less than XDR_UNIT.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 16.0:cluster-md-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dtb-allwinner-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-altera-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amazon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amlogic-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apple-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-arm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-broadcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-cavium-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-exynos-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-freescale-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-hisilicon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-lg-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-marvell-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-mediatek-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-nvidia-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-qcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-renesas-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-rockchip-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-socionext-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-sprd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-xilinx-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40129",
"url": "https://www.suse.com/security/cve/CVE-2025-40129"
},
{
"category": "external",
"summary": "SUSE Bug 1253472 for CVE-2025-40129",
"url": "https://bugzilla.suse.com/1253472"
},
{
"category": "external",
"summary": "SUSE Bug 1253473 for CVE-2025-40129",
"url": "https://bugzilla.suse.com/1253473"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 16.0:cluster-md-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dtb-allwinner-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-altera-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amazon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amlogic-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apple-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-arm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-broadcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-cavium-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-exynos-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-freescale-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-hisilicon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-lg-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-marvell-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-mediatek-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-nvidia-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-qcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-renesas-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-rockchip-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-socionext-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-sprd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-xilinx-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"openSUSE Leap 16.0:cluster-md-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dtb-allwinner-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-altera-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amazon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amlogic-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apple-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-arm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-broadcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-cavium-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-exynos-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-freescale-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-hisilicon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-lg-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-marvell-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-mediatek-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-nvidia-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-qcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-renesas-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-rockchip-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-socionext-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-sprd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-xilinx-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-19T17:38:16Z",
"details": "important"
}
],
"title": "CVE-2025-40129"
},
{
"cve": "CVE-2025-40132",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40132"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nASoC: Intel: sof_sdw: Prevent jump to NULL add_sidecar callback\n\nIn create_sdw_dailink() check that sof_end-\u003ecodec_info-\u003eadd_sidecar\nis not NULL before calling it.\n\nThe original code assumed that if include_sidecar is true, the codec\non that link has an add_sidecar callback. But there could be other\ncodecs on the same link that do not have an add_sidecar callback.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 16.0:cluster-md-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dtb-allwinner-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-altera-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amazon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amlogic-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apple-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-arm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-broadcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-cavium-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-exynos-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-freescale-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-hisilicon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-lg-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-marvell-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-mediatek-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-nvidia-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-qcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-renesas-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-rockchip-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-socionext-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-sprd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-xilinx-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40132",
"url": "https://www.suse.com/security/cve/CVE-2025-40132"
},
{
"category": "external",
"summary": "SUSE Bug 1253330 for CVE-2025-40132",
"url": "https://bugzilla.suse.com/1253330"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 16.0:cluster-md-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dtb-allwinner-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-altera-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amazon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amlogic-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apple-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-arm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-broadcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-cavium-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-exynos-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-freescale-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-hisilicon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-lg-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-marvell-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-mediatek-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-nvidia-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-qcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-renesas-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-rockchip-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-socionext-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-sprd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-xilinx-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"openSUSE Leap 16.0:cluster-md-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dtb-allwinner-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-altera-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amazon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amlogic-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apple-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-arm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-broadcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-cavium-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-exynos-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-freescale-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-hisilicon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-lg-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-marvell-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-mediatek-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-nvidia-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-qcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-renesas-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-rockchip-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-socionext-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-sprd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-xilinx-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-19T17:38:16Z",
"details": "moderate"
}
],
"title": "CVE-2025-40132"
},
{
"cve": "CVE-2025-40133",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40133"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nmptcp: Use __sk_dst_get() and dst_dev_rcu() in mptcp_active_enable().\n\nmptcp_active_enable() is called from subflow_finish_connect(),\nwhich is icsk-\u003eicsk_af_ops-\u003esk_rx_dst_set() and it\u0027s not always\nunder RCU.\n\nUsing sk_dst_get(sk)-\u003edev could trigger UAF.\n\nLet\u0027s use __sk_dst_get() and dst_dev_rcu().",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 16.0:cluster-md-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dtb-allwinner-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-altera-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amazon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amlogic-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apple-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-arm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-broadcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-cavium-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-exynos-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-freescale-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-hisilicon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-lg-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-marvell-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-mediatek-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-nvidia-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-qcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-renesas-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-rockchip-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-socionext-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-sprd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-xilinx-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40133",
"url": "https://www.suse.com/security/cve/CVE-2025-40133"
},
{
"category": "external",
"summary": "SUSE Bug 1253328 for CVE-2025-40133",
"url": "https://bugzilla.suse.com/1253328"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 16.0:cluster-md-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dtb-allwinner-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-altera-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amazon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amlogic-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apple-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-arm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-broadcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-cavium-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-exynos-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-freescale-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-hisilicon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-lg-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-marvell-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-mediatek-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-nvidia-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-qcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-renesas-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-rockchip-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-socionext-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-sprd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-xilinx-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:H/A:H",
"version": "3.1"
},
"products": [
"openSUSE Leap 16.0:cluster-md-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dtb-allwinner-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-altera-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amazon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amlogic-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apple-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-arm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-broadcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-cavium-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-exynos-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-freescale-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-hisilicon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-lg-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-marvell-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-mediatek-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-nvidia-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-qcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-renesas-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-rockchip-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-socionext-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-sprd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-xilinx-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-19T17:38:16Z",
"details": "moderate"
}
],
"title": "CVE-2025-40133"
},
{
"cve": "CVE-2025-40134",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40134"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\ndm: fix NULL pointer dereference in __dm_suspend()\n\nThere is a race condition between dm device suspend and table load that\ncan lead to null pointer dereference. The issue occurs when suspend is\ninvoked before table load completes:\n\nBUG: kernel NULL pointer dereference, address: 0000000000000054\nOops: 0000 [#1] PREEMPT SMP PTI\nCPU: 6 PID: 6798 Comm: dmsetup Not tainted 6.6.0-g7e52f5f0ca9b #62\nHardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.16.1-2.fc37 04/01/2014\nRIP: 0010:blk_mq_wait_quiesce_done+0x0/0x50\nCall Trace:\n \u003cTASK\u003e\n blk_mq_quiesce_queue+0x2c/0x50\n dm_stop_queue+0xd/0x20\n __dm_suspend+0x130/0x330\n dm_suspend+0x11a/0x180\n dev_suspend+0x27e/0x560\n ctl_ioctl+0x4cf/0x850\n dm_ctl_ioctl+0xd/0x20\n vfs_ioctl+0x1d/0x50\n __se_sys_ioctl+0x9b/0xc0\n __x64_sys_ioctl+0x19/0x30\n x64_sys_call+0x2c4a/0x4620\n do_syscall_64+0x9e/0x1b0\n\nThe issue can be triggered as below:\n\nT1 \t\t\t\t\t\tT2\ndm_suspend\t\t\t\t\ttable_load\n__dm_suspend\t\t\t\t\tdm_setup_md_queue\n\t\t\t\t\t\tdm_mq_init_request_queue\n\t\t\t\t\t\tblk_mq_init_allocated_queue\n\t\t\t\t\t\t=\u003e q-\u003emq_ops = set-\u003eops; (1)\ndm_stop_queue / dm_wait_for_completion\n=\u003e q-\u003etag_set NULL pointer!\t(2)\n\t\t\t\t\t\t=\u003e q-\u003etag_set = set; (3)\n\nFix this by checking if a valid table (map) exists before performing\nrequest-based suspend and waiting for target I/O. When map is NULL,\nskip these table-dependent suspend steps.\n\nEven when map is NULL, no I/O can reach any target because there is\nno table loaded; I/O submitted in this state will fail early in the\nDM layer. Skipping the table-dependent suspend logic in this case\nis safe and avoids NULL pointer dereferences.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 16.0:cluster-md-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dtb-allwinner-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-altera-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amazon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amlogic-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apple-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-arm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-broadcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-cavium-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-exynos-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-freescale-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-hisilicon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-lg-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-marvell-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-mediatek-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-nvidia-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-qcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-renesas-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-rockchip-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-socionext-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-sprd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-xilinx-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40134",
"url": "https://www.suse.com/security/cve/CVE-2025-40134"
},
{
"category": "external",
"summary": "SUSE Bug 1253386 for CVE-2025-40134",
"url": "https://bugzilla.suse.com/1253386"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 16.0:cluster-md-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dtb-allwinner-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-altera-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amazon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amlogic-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apple-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-arm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-broadcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-cavium-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-exynos-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-freescale-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-hisilicon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-lg-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-marvell-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-mediatek-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-nvidia-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-qcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-renesas-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-rockchip-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-socionext-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-sprd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-xilinx-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.7,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"openSUSE Leap 16.0:cluster-md-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dtb-allwinner-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-altera-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amazon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amlogic-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apple-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-arm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-broadcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-cavium-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-exynos-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-freescale-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-hisilicon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-lg-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-marvell-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-mediatek-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-nvidia-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-qcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-renesas-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-rockchip-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-socionext-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-sprd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-xilinx-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-19T17:38:16Z",
"details": "moderate"
}
],
"title": "CVE-2025-40134"
},
{
"cve": "CVE-2025-40135",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40135"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nipv6: use RCU in ip6_xmit()\n\nUse RCU in ip6_xmit() in order to use dst_dev_rcu() to prevent\npossible UAF.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 16.0:cluster-md-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dtb-allwinner-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-altera-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amazon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amlogic-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apple-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-arm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-broadcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-cavium-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-exynos-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-freescale-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-hisilicon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-lg-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-marvell-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-mediatek-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-nvidia-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-qcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-renesas-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-rockchip-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-socionext-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-sprd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-xilinx-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40135",
"url": "https://www.suse.com/security/cve/CVE-2025-40135"
},
{
"category": "external",
"summary": "SUSE Bug 1253342 for CVE-2025-40135",
"url": "https://bugzilla.suse.com/1253342"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 16.0:cluster-md-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dtb-allwinner-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-altera-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amazon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amlogic-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apple-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-arm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-broadcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-cavium-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-exynos-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-freescale-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-hisilicon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-lg-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-marvell-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-mediatek-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-nvidia-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-qcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-renesas-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-rockchip-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-socionext-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-sprd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-xilinx-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.1,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H",
"version": "3.1"
},
"products": [
"openSUSE Leap 16.0:cluster-md-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dtb-allwinner-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-altera-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amazon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amlogic-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apple-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-arm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-broadcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-cavium-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-exynos-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-freescale-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-hisilicon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-lg-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-marvell-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-mediatek-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-nvidia-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-qcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-renesas-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-rockchip-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-socionext-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-sprd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-xilinx-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-19T17:38:16Z",
"details": "moderate"
}
],
"title": "CVE-2025-40135"
},
{
"cve": "CVE-2025-40139",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40139"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nsmc: Use __sk_dst_get() and dst_dev_rcu() in in smc_clc_prfx_set().\n\nsmc_clc_prfx_set() is called during connect() and not under RCU\nnor RTNL.\n\nUsing sk_dst_get(sk)-\u003edev could trigger UAF.\n\nLet\u0027s use __sk_dst_get() and dev_dst_rcu() under rcu_read_lock()\nafter kernel_getsockname().\n\nNote that the returned value of smc_clc_prfx_set() is not used\nin the caller.\n\nWhile at it, we change the 1st arg of smc_clc_prfx_set[46]_rcu()\nnot to touch dst there.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 16.0:cluster-md-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dtb-allwinner-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-altera-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amazon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amlogic-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apple-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-arm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-broadcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-cavium-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-exynos-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-freescale-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-hisilicon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-lg-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-marvell-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-mediatek-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-nvidia-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-qcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-renesas-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-rockchip-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-socionext-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-sprd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-xilinx-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40139",
"url": "https://www.suse.com/security/cve/CVE-2025-40139"
},
{
"category": "external",
"summary": "SUSE Bug 1253409 for CVE-2025-40139",
"url": "https://bugzilla.suse.com/1253409"
},
{
"category": "external",
"summary": "SUSE Bug 1253411 for CVE-2025-40139",
"url": "https://bugzilla.suse.com/1253411"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 16.0:cluster-md-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dtb-allwinner-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-altera-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amazon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amlogic-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apple-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-arm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-broadcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-cavium-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-exynos-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-freescale-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-hisilicon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-lg-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-marvell-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-mediatek-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-nvidia-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-qcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-renesas-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-rockchip-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-socionext-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-sprd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-xilinx-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"openSUSE Leap 16.0:cluster-md-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dtb-allwinner-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-altera-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amazon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amlogic-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apple-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-arm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-broadcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-cavium-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-exynos-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-freescale-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-hisilicon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-lg-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-marvell-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-mediatek-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-nvidia-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-qcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-renesas-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-rockchip-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-socionext-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-sprd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-xilinx-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-19T17:38:16Z",
"details": "important"
}
],
"title": "CVE-2025-40139"
},
{
"cve": "CVE-2025-40140",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40140"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nnet: usb: Remove disruptive netif_wake_queue in rtl8150_set_multicast\n\nsyzbot reported WARNING in rtl8150_start_xmit/usb_submit_urb.\nThis is the sequence of events that leads to the warning:\n\nrtl8150_start_xmit() {\n\tnetif_stop_queue();\n\tusb_submit_urb(dev-\u003etx_urb);\n}\n\nrtl8150_set_multicast() {\n\tnetif_stop_queue();\n\tnetif_wake_queue();\t\t\u003c-- wakes up TX queue before URB is done\n}\n\nrtl8150_start_xmit() {\n\tnetif_stop_queue();\n\tusb_submit_urb(dev-\u003etx_urb);\t\u003c-- double submission\n}\n\nrtl8150_set_multicast being the ndo_set_rx_mode callback should not be\ncalling netif_stop_queue and notif_start_queue as these handle\nTX queue synchronization.\n\nThe net core function dev_set_rx_mode handles the synchronization\nfor rtl8150_set_multicast making it safe to remove these locks.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 16.0:cluster-md-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dtb-allwinner-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-altera-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amazon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amlogic-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apple-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-arm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-broadcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-cavium-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-exynos-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-freescale-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-hisilicon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-lg-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-marvell-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-mediatek-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-nvidia-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-qcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-renesas-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-rockchip-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-socionext-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-sprd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-xilinx-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40140",
"url": "https://www.suse.com/security/cve/CVE-2025-40140"
},
{
"category": "external",
"summary": "SUSE Bug 1253349 for CVE-2025-40140",
"url": "https://bugzilla.suse.com/1253349"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 16.0:cluster-md-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dtb-allwinner-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-altera-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amazon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amlogic-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apple-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-arm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-broadcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-cavium-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-exynos-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-freescale-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-hisilicon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-lg-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-marvell-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-mediatek-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-nvidia-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-qcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-renesas-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-rockchip-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-socionext-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-sprd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-xilinx-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 3.3,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L",
"version": "3.1"
},
"products": [
"openSUSE Leap 16.0:cluster-md-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dtb-allwinner-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-altera-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amazon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amlogic-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apple-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-arm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-broadcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-cavium-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-exynos-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-freescale-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-hisilicon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-lg-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-marvell-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-mediatek-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-nvidia-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-qcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-renesas-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-rockchip-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-socionext-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-sprd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-xilinx-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-19T17:38:16Z",
"details": "low"
}
],
"title": "CVE-2025-40140"
},
{
"cve": "CVE-2025-40141",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40141"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nBluetooth: ISO: Fix possible UAF on iso_conn_free\n\nThis attempt to fix similar issue to sco_conn_free where if the\nconn-\u003esk is not set to NULL may lead to UAF on iso_conn_free.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 16.0:cluster-md-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dtb-allwinner-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-altera-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amazon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amlogic-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apple-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-arm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-broadcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-cavium-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-exynos-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-freescale-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-hisilicon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-lg-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-marvell-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-mediatek-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-nvidia-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-qcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-renesas-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-rockchip-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-socionext-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-sprd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-xilinx-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40141",
"url": "https://www.suse.com/security/cve/CVE-2025-40141"
},
{
"category": "external",
"summary": "SUSE Bug 1253352 for CVE-2025-40141",
"url": "https://bugzilla.suse.com/1253352"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 16.0:cluster-md-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dtb-allwinner-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-altera-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amazon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amlogic-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apple-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-arm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-broadcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-cavium-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-exynos-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-freescale-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-hisilicon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-lg-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-marvell-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-mediatek-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-nvidia-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-qcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-renesas-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-rockchip-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-socionext-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-sprd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-xilinx-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:H",
"version": "3.1"
},
"products": [
"openSUSE Leap 16.0:cluster-md-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dtb-allwinner-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-altera-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amazon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amlogic-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apple-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-arm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-broadcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-cavium-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-exynos-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-freescale-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-hisilicon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-lg-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-marvell-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-mediatek-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-nvidia-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-qcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-renesas-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-rockchip-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-socionext-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-sprd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-xilinx-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-19T17:38:16Z",
"details": "moderate"
}
],
"title": "CVE-2025-40141"
},
{
"cve": "CVE-2025-40142",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40142"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nALSA: pcm: Disable bottom softirqs as part of spin_lock_irq() on PREEMPT_RT\n\nsnd_pcm_group_lock_irq() acquires a spinlock_t and disables interrupts\nvia spin_lock_irq(). This also implicitly disables the handling of\nsoftirqs such as TIMER_SOFTIRQ.\nOn PREEMPT_RT softirqs are preemptible and spin_lock_irq() does not\ndisable them. That means a timer can be invoked during spin_lock_irq()\non the same CPU. Due to synchronisations reasons local_bh_disable() has\na per-CPU lock named softirq_ctrl.lock which synchronizes individual\nsoftirq against each other.\nsyz-bot managed to trigger a lockdep report where softirq_ctrl.lock is\nacquired in hrtimer_cancel() in addition to hrtimer_run_softirq(). This\nis a possible deadlock.\n\nThe softirq_ctrl.lock can not be made part of spin_lock_irq() as this\nwould lead to too much synchronisation against individual threads on the\nsystem. To avoid the possible deadlock, softirqs must be manually\ndisabled before the lock is acquired.\n\nDisable softirqs before the lock is acquired on PREEMPT_RT.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 16.0:cluster-md-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dtb-allwinner-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-altera-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amazon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amlogic-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apple-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-arm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-broadcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-cavium-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-exynos-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-freescale-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-hisilicon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-lg-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-marvell-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-mediatek-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-nvidia-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-qcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-renesas-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-rockchip-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-socionext-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-sprd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-xilinx-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40142",
"url": "https://www.suse.com/security/cve/CVE-2025-40142"
},
{
"category": "external",
"summary": "SUSE Bug 1253348 for CVE-2025-40142",
"url": "https://bugzilla.suse.com/1253348"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 16.0:cluster-md-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dtb-allwinner-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-altera-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amazon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amlogic-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apple-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-arm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-broadcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-cavium-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-exynos-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-freescale-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-hisilicon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-lg-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-marvell-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-mediatek-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-nvidia-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-qcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-renesas-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-rockchip-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-socionext-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-sprd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-xilinx-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.7,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"openSUSE Leap 16.0:cluster-md-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dtb-allwinner-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-altera-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amazon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amlogic-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apple-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-arm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-broadcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-cavium-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-exynos-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-freescale-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-hisilicon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-lg-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-marvell-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-mediatek-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-nvidia-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-qcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-renesas-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-rockchip-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-socionext-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-sprd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-xilinx-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-19T17:38:16Z",
"details": "moderate"
}
],
"title": "CVE-2025-40142"
},
{
"cve": "CVE-2025-40149",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40149"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\ntls: Use __sk_dst_get() and dst_dev_rcu() in get_netdev_for_sock().\n\nget_netdev_for_sock() is called during setsockopt(),\nso not under RCU.\n\nUsing sk_dst_get(sk)-\u003edev could trigger UAF.\n\nLet\u0027s use __sk_dst_get() and dst_dev_rcu().\n\nNote that the only -\u003endo_sk_get_lower_dev() user is\nbond_sk_get_lower_dev(), which uses RCU.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 16.0:cluster-md-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dtb-allwinner-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-altera-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amazon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amlogic-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apple-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-arm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-broadcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-cavium-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-exynos-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-freescale-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-hisilicon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-lg-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-marvell-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-mediatek-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-nvidia-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-qcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-renesas-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-rockchip-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-socionext-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-sprd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-xilinx-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40149",
"url": "https://www.suse.com/security/cve/CVE-2025-40149"
},
{
"category": "external",
"summary": "SUSE Bug 1253355 for CVE-2025-40149",
"url": "https://bugzilla.suse.com/1253355"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 16.0:cluster-md-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dtb-allwinner-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-altera-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amazon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amlogic-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apple-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-arm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-broadcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-cavium-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-exynos-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-freescale-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-hisilicon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-lg-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-marvell-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-mediatek-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-nvidia-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-qcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-renesas-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-rockchip-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-socionext-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-sprd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-xilinx-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:H",
"version": "3.1"
},
"products": [
"openSUSE Leap 16.0:cluster-md-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dtb-allwinner-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-altera-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amazon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amlogic-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apple-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-arm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-broadcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-cavium-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-exynos-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-freescale-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-hisilicon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-lg-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-marvell-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-mediatek-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-nvidia-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-qcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-renesas-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-rockchip-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-socionext-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-sprd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-xilinx-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-19T17:38:16Z",
"details": "moderate"
}
],
"title": "CVE-2025-40149"
},
{
"cve": "CVE-2025-40153",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40153"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nmm: hugetlb: avoid soft lockup when mprotect to large memory area\n\nWhen calling mprotect() to a large hugetlb memory area in our customer\u0027s\nworkload (~300GB hugetlb memory), soft lockup was observed:\n\nwatchdog: BUG: soft lockup - CPU#98 stuck for 23s! [t2_new_sysv:126916]\n\nCPU: 98 PID: 126916 Comm: t2_new_sysv Kdump: loaded Not tainted 6.17-rc7\nHardware name: GIGACOMPUTING R2A3-T40-AAV1/Jefferson CIO, BIOS 5.4.4.1 07/15/2025\npstate: 20400009 (nzCv daif +PAN -UAO -TCO -DIT -SSBS BTYPE=--)\npc : mte_clear_page_tags+0x14/0x24\nlr : mte_sync_tags+0x1c0/0x240\nsp : ffff80003150bb80\nx29: ffff80003150bb80 x28: ffff00739e9705a8 x27: 0000ffd2d6a00000\nx26: 0000ff8e4bc00000 x25: 00e80046cde00f45 x24: 0000000000022458\nx23: 0000000000000000 x22: 0000000000000004 x21: 000000011b380000\nx20: ffff000000000000 x19: 000000011b379f40 x18: 0000000000000000\nx17: 0000000000000000 x16: 0000000000000000 x15: 0000000000000000\nx14: 0000000000000000 x13: 0000000000000000 x12: 0000000000000000\nx11: 0000000000000000 x10: 0000000000000000 x9 : ffffc875e0aa5e2c\nx8 : 0000000000000000 x7 : 0000000000000000 x6 : 0000000000000000\nx5 : fffffc01ce7a5c00 x4 : 00000000046cde00 x3 : fffffc0000000000\nx2 : 0000000000000004 x1 : 0000000000000040 x0 : ffff0046cde7c000\n\nCall trace:\n mte_clear_page_tags+0x14/0x24\n set_huge_pte_at+0x25c/0x280\n hugetlb_change_protection+0x220/0x430\n change_protection+0x5c/0x8c\n mprotect_fixup+0x10c/0x294\n do_mprotect_pkey.constprop.0+0x2e0/0x3d4\n __arm64_sys_mprotect+0x24/0x44\n invoke_syscall+0x50/0x160\n el0_svc_common+0x48/0x144\n do_el0_svc+0x30/0xe0\n el0_svc+0x30/0xf0\n el0t_64_sync_handler+0xc4/0x148\n el0t_64_sync+0x1a4/0x1a8\n\nSoft lockup is not triggered with THP or base page because there is\ncond_resched() called for each PMD size.\n\nAlthough the soft lockup was triggered by MTE, it should be not MTE\nspecific. The other processing which takes long time in the loop may\ntrigger soft lockup too.\n\nSo add cond_resched() for hugetlb to avoid soft lockup.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 16.0:cluster-md-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dtb-allwinner-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-altera-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amazon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amlogic-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apple-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-arm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-broadcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-cavium-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-exynos-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-freescale-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-hisilicon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-lg-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-marvell-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-mediatek-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-nvidia-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-qcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-renesas-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-rockchip-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-socionext-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-sprd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-xilinx-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40153",
"url": "https://www.suse.com/security/cve/CVE-2025-40153"
},
{
"category": "external",
"summary": "SUSE Bug 1253408 for CVE-2025-40153",
"url": "https://bugzilla.suse.com/1253408"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 16.0:cluster-md-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dtb-allwinner-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-altera-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amazon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amlogic-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apple-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-arm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-broadcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-cavium-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-exynos-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-freescale-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-hisilicon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-lg-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-marvell-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-mediatek-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-nvidia-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-qcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-renesas-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-rockchip-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-socionext-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-sprd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-xilinx-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 3.3,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L",
"version": "3.1"
},
"products": [
"openSUSE Leap 16.0:cluster-md-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dtb-allwinner-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-altera-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amazon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amlogic-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apple-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-arm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-broadcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-cavium-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-exynos-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-freescale-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-hisilicon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-lg-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-marvell-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-mediatek-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-nvidia-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-qcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-renesas-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-rockchip-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-socionext-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-sprd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-xilinx-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-19T17:38:16Z",
"details": "low"
}
],
"title": "CVE-2025-40153"
},
{
"cve": "CVE-2025-40154",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40154"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nASoC: Intel: bytcr_rt5640: Fix invalid quirk input mapping\n\nWhen an invalid value is passed via quirk option, currently\nbytcr_rt5640 driver only shows an error message but leaves as is.\nThis may lead to unepxected results like OOB access.\n\nThis patch corrects the input mapping to the certain default value if\nan invalid value is passed.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 16.0:cluster-md-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dtb-allwinner-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-altera-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amazon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amlogic-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apple-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-arm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-broadcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-cavium-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-exynos-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-freescale-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-hisilicon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-lg-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-marvell-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-mediatek-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-nvidia-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-qcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-renesas-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-rockchip-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-socionext-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-sprd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-xilinx-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40154",
"url": "https://www.suse.com/security/cve/CVE-2025-40154"
},
{
"category": "external",
"summary": "SUSE Bug 1253431 for CVE-2025-40154",
"url": "https://bugzilla.suse.com/1253431"
},
{
"category": "external",
"summary": "SUSE Bug 1253432 for CVE-2025-40154",
"url": "https://bugzilla.suse.com/1253432"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 16.0:cluster-md-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dtb-allwinner-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-altera-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amazon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amlogic-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apple-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-arm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-broadcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-cavium-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-exynos-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-freescale-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-hisilicon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-lg-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-marvell-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-mediatek-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-nvidia-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-qcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-renesas-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-rockchip-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-socionext-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-sprd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-xilinx-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"openSUSE Leap 16.0:cluster-md-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dtb-allwinner-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-altera-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amazon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amlogic-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apple-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-arm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-broadcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-cavium-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-exynos-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-freescale-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-hisilicon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-lg-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-marvell-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-mediatek-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-nvidia-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-qcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-renesas-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-rockchip-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-socionext-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-sprd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-xilinx-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-19T17:38:16Z",
"details": "moderate"
}
],
"title": "CVE-2025-40154"
},
{
"cve": "CVE-2025-40156",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40156"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nPM / devfreq: mtk-cci: Fix potential error pointer dereference in probe()\n\nThe drv-\u003esram_reg pointer could be set to ERR_PTR(-EPROBE_DEFER) which\nwould lead to a error pointer dereference. Use IS_ERR_OR_NULL() to check\nthat the pointer is valid.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 16.0:cluster-md-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dtb-allwinner-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-altera-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amazon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amlogic-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apple-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-arm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-broadcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-cavium-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-exynos-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-freescale-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-hisilicon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-lg-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-marvell-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-mediatek-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-nvidia-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-qcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-renesas-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-rockchip-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-socionext-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-sprd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-xilinx-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40156",
"url": "https://www.suse.com/security/cve/CVE-2025-40156"
},
{
"category": "external",
"summary": "SUSE Bug 1253428 for CVE-2025-40156",
"url": "https://bugzilla.suse.com/1253428"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 16.0:cluster-md-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dtb-allwinner-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-altera-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amazon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amlogic-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apple-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-arm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-broadcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-cavium-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-exynos-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-freescale-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-hisilicon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-lg-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-marvell-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-mediatek-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-nvidia-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-qcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-renesas-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-rockchip-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-socionext-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-sprd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-xilinx-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"openSUSE Leap 16.0:cluster-md-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dtb-allwinner-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-altera-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amazon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amlogic-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apple-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-arm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-broadcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-cavium-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-exynos-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-freescale-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-hisilicon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-lg-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-marvell-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-mediatek-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-nvidia-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-qcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-renesas-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-rockchip-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-socionext-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-sprd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-xilinx-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-19T17:38:16Z",
"details": "moderate"
}
],
"title": "CVE-2025-40156"
},
{
"cve": "CVE-2025-40157",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40157"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nEDAC/i10nm: Skip DIMM enumeration on a disabled memory controller\n\nWhen loading the i10nm_edac driver on some Intel Granite Rapids servers,\na call trace may appear as follows:\n\n UBSAN: shift-out-of-bounds in drivers/edac/skx_common.c:453:16\n shift exponent -66 is negative\n ...\n __ubsan_handle_shift_out_of_bounds+0x1e3/0x390\n skx_get_dimm_info.cold+0x47/0xd40 [skx_edac_common]\n i10nm_get_dimm_config+0x23e/0x390 [i10nm_edac]\n skx_register_mci+0x159/0x220 [skx_edac_common]\n i10nm_init+0xcb0/0x1ff0 [i10nm_edac]\n ...\n\nThis occurs because some BIOS may disable a memory controller if there\naren\u0027t any memory DIMMs populated on this memory controller. The DIMMMTR\nregister of this disabled memory controller contains the invalid value\n~0, resulting in the call trace above.\n\nFix this call trace by skipping DIMM enumeration on a disabled memory\ncontroller.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 16.0:cluster-md-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dtb-allwinner-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-altera-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amazon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amlogic-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apple-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-arm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-broadcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-cavium-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-exynos-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-freescale-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-hisilicon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-lg-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-marvell-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-mediatek-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-nvidia-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-qcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-renesas-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-rockchip-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-socionext-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-sprd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-xilinx-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40157",
"url": "https://www.suse.com/security/cve/CVE-2025-40157"
},
{
"category": "external",
"summary": "SUSE Bug 1253423 for CVE-2025-40157",
"url": "https://bugzilla.suse.com/1253423"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 16.0:cluster-md-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dtb-allwinner-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-altera-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amazon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amlogic-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apple-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-arm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-broadcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-cavium-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-exynos-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-freescale-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-hisilicon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-lg-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-marvell-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-mediatek-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-nvidia-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-qcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-renesas-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-rockchip-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-socionext-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-sprd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-xilinx-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.2,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:L/I:L/A:H",
"version": "3.1"
},
"products": [
"openSUSE Leap 16.0:cluster-md-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dtb-allwinner-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-altera-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amazon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amlogic-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apple-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-arm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-broadcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-cavium-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-exynos-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-freescale-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-hisilicon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-lg-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-marvell-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-mediatek-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-nvidia-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-qcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-renesas-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-rockchip-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-socionext-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-sprd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-xilinx-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-19T17:38:16Z",
"details": "moderate"
}
],
"title": "CVE-2025-40157"
},
{
"cve": "CVE-2025-40158",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40158"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nipv6: use RCU in ip6_output()\n\nUse RCU in ip6_output() in order to use dst_dev_rcu() to prevent\npossible UAF.\n\nWe can remove rcu_read_lock()/rcu_read_unlock() pairs\nfrom ip6_finish_output2().",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 16.0:cluster-md-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dtb-allwinner-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-altera-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amazon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amlogic-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apple-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-arm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-broadcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-cavium-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-exynos-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-freescale-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-hisilicon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-lg-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-marvell-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-mediatek-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-nvidia-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-qcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-renesas-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-rockchip-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-socionext-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-sprd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-xilinx-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40158",
"url": "https://www.suse.com/security/cve/CVE-2025-40158"
},
{
"category": "external",
"summary": "SUSE Bug 1253402 for CVE-2025-40158",
"url": "https://bugzilla.suse.com/1253402"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 16.0:cluster-md-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dtb-allwinner-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-altera-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amazon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amlogic-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apple-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-arm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-broadcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-cavium-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-exynos-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-freescale-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-hisilicon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-lg-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-marvell-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-mediatek-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-nvidia-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-qcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-renesas-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-rockchip-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-socionext-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-sprd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-xilinx-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:H",
"version": "3.1"
},
"products": [
"openSUSE Leap 16.0:cluster-md-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dtb-allwinner-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-altera-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amazon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amlogic-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apple-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-arm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-broadcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-cavium-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-exynos-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-freescale-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-hisilicon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-lg-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-marvell-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-mediatek-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-nvidia-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-qcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-renesas-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-rockchip-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-socionext-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-sprd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-xilinx-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-19T17:38:16Z",
"details": "moderate"
}
],
"title": "CVE-2025-40158"
},
{
"cve": "CVE-2025-40159",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40159"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nxsk: Harden userspace-supplied xdp_desc validation\n\nTurned out certain clearly invalid values passed in xdp_desc from\nuserspace can pass xp_{,un}aligned_validate_desc() and then lead\nto UBs or just invalid frames to be queued for xmit.\n\ndesc-\u003elen close to ``U32_MAX`` with a non-zero pool-\u003etx_metadata_len\ncan cause positive integer overflow and wraparound, the same way low\nenough desc-\u003eaddr with a non-zero pool-\u003etx_metadata_len can cause\nnegative integer overflow. Both scenarios can then pass the\nvalidation successfully.\nThis doesn\u0027t happen with valid XSk applications, but can be used\nto perform attacks.\n\nAlways promote desc-\u003elen to ``u64`` first to exclude positive\noverflows of it. Use explicit check_{add,sub}_overflow() when\nvalidating desc-\u003eaddr (which is ``u64`` already).\n\nbloat-o-meter reports a little growth of the code size:\n\nadd/remove: 0/0 grow/shrink: 2/1 up/down: 60/-16 (44)\nFunction old new delta\nxskq_cons_peek_desc 299 330 +31\nxsk_tx_peek_release_desc_batch 973 1002 +29\nxsk_generic_xmit 3148 3132 -16\n\nbut hopefully this doesn\u0027t hurt the performance much.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 16.0:cluster-md-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dtb-allwinner-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-altera-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amazon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amlogic-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apple-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-arm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-broadcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-cavium-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-exynos-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-freescale-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-hisilicon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-lg-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-marvell-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-mediatek-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-nvidia-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-qcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-renesas-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-rockchip-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-socionext-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-sprd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-xilinx-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40159",
"url": "https://www.suse.com/security/cve/CVE-2025-40159"
},
{
"category": "external",
"summary": "SUSE Bug 1253403 for CVE-2025-40159",
"url": "https://bugzilla.suse.com/1253403"
},
{
"category": "external",
"summary": "SUSE Bug 1253404 for CVE-2025-40159",
"url": "https://bugzilla.suse.com/1253404"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 16.0:cluster-md-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dtb-allwinner-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-altera-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amazon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amlogic-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apple-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-arm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-broadcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-cavium-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-exynos-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-freescale-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-hisilicon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-lg-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-marvell-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-mediatek-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-nvidia-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-qcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-renesas-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-rockchip-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-socionext-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-sprd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-xilinx-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"openSUSE Leap 16.0:cluster-md-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dtb-allwinner-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-altera-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amazon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amlogic-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apple-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-arm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-broadcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-cavium-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-exynos-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-freescale-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-hisilicon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-lg-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-marvell-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-mediatek-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-nvidia-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-qcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-renesas-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-rockchip-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-socionext-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-sprd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-xilinx-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-19T17:38:16Z",
"details": "important"
}
],
"title": "CVE-2025-40159"
},
{
"cve": "CVE-2025-40161",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40161"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nmailbox: zynqmp-ipi: Fix SGI cleanup on unbind\n\nThe driver incorrectly determines SGI vs SPI interrupts by checking IRQ\nnumber \u003c 16, which fails with dynamic IRQ allocation. During unbind,\nthis causes improper SGI cleanup leading to kernel crash.\n\nAdd explicit irq_type field to pdata for reliable identification of SGI\ninterrupts (type-2) and only clean up SGI resources when appropriate.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 16.0:cluster-md-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dtb-allwinner-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-altera-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amazon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amlogic-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apple-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-arm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-broadcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-cavium-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-exynos-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-freescale-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-hisilicon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-lg-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-marvell-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-mediatek-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-nvidia-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-qcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-renesas-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-rockchip-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-socionext-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-sprd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-xilinx-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40161",
"url": "https://www.suse.com/security/cve/CVE-2025-40161"
},
{
"category": "external",
"summary": "SUSE Bug 1253410 for CVE-2025-40161",
"url": "https://bugzilla.suse.com/1253410"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 16.0:cluster-md-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dtb-allwinner-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-altera-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amazon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amlogic-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apple-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-arm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-broadcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-cavium-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-exynos-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-freescale-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-hisilicon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-lg-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-marvell-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-mediatek-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-nvidia-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-qcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-renesas-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-rockchip-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-socionext-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-sprd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-xilinx-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.1,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H",
"version": "3.1"
},
"products": [
"openSUSE Leap 16.0:cluster-md-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dtb-allwinner-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-altera-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amazon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amlogic-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apple-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-arm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-broadcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-cavium-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-exynos-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-freescale-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-hisilicon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-lg-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-marvell-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-mediatek-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-nvidia-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-qcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-renesas-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-rockchip-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-socionext-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-sprd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-xilinx-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-19T17:38:16Z",
"details": "moderate"
}
],
"title": "CVE-2025-40161"
},
{
"cve": "CVE-2025-40162",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40162"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nASoC: amd/sdw_utils: avoid NULL deref when devm_kasprintf() fails\n\ndevm_kasprintf() may return NULL on memory allocation failure,\nbut the debug message prints cpus-\u003edai_name before checking it.\nMove the dev_dbg() call after the NULL check to prevent potential\nNULL pointer dereference.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 16.0:cluster-md-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dtb-allwinner-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-altera-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amazon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amlogic-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apple-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-arm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-broadcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-cavium-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-exynos-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-freescale-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-hisilicon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-lg-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-marvell-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-mediatek-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-nvidia-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-qcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-renesas-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-rockchip-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-socionext-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-sprd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-xilinx-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40162",
"url": "https://www.suse.com/security/cve/CVE-2025-40162"
},
{
"category": "external",
"summary": "SUSE Bug 1253422 for CVE-2025-40162",
"url": "https://bugzilla.suse.com/1253422"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 16.0:cluster-md-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dtb-allwinner-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-altera-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amazon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amlogic-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apple-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-arm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-broadcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-cavium-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-exynos-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-freescale-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-hisilicon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-lg-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-marvell-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-mediatek-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-nvidia-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-qcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-renesas-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-rockchip-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-socionext-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-sprd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-xilinx-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"openSUSE Leap 16.0:cluster-md-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dtb-allwinner-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-altera-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amazon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amlogic-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apple-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-arm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-broadcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-cavium-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-exynos-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-freescale-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-hisilicon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-lg-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-marvell-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-mediatek-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-nvidia-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-qcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-renesas-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-rockchip-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-socionext-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-sprd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-xilinx-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-19T17:38:16Z",
"details": "moderate"
}
],
"title": "CVE-2025-40162"
},
{
"cve": "CVE-2025-40164",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40164"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nusbnet: Fix using smp_processor_id() in preemptible code warnings\n\nSyzbot reported the following warning:\n\nBUG: using smp_processor_id() in preemptible [00000000] code: dhcpcd/2879\ncaller is usbnet_skb_return+0x74/0x490 drivers/net/usb/usbnet.c:331\nCPU: 1 UID: 0 PID: 2879 Comm: dhcpcd Not tainted 6.15.0-rc4-syzkaller-00098-g615dca38c2ea #0 PREEMPT(voluntary)\nCall Trace:\n \u003cTASK\u003e\n __dump_stack lib/dump_stack.c:94 [inline]\n dump_stack_lvl+0x16c/0x1f0 lib/dump_stack.c:120\n check_preemption_disabled+0xd0/0xe0 lib/smp_processor_id.c:49\n usbnet_skb_return+0x74/0x490 drivers/net/usb/usbnet.c:331\n usbnet_resume_rx+0x4b/0x170 drivers/net/usb/usbnet.c:708\n usbnet_change_mtu+0x1be/0x220 drivers/net/usb/usbnet.c:417\n __dev_set_mtu net/core/dev.c:9443 [inline]\n netif_set_mtu_ext+0x369/0x5c0 net/core/dev.c:9496\n netif_set_mtu+0xb0/0x160 net/core/dev.c:9520\n dev_set_mtu+0xae/0x170 net/core/dev_api.c:247\n dev_ifsioc+0xa31/0x18d0 net/core/dev_ioctl.c:572\n dev_ioctl+0x223/0x10e0 net/core/dev_ioctl.c:821\n sock_do_ioctl+0x19d/0x280 net/socket.c:1204\n sock_ioctl+0x42f/0x6a0 net/socket.c:1311\n vfs_ioctl fs/ioctl.c:51 [inline]\n __do_sys_ioctl fs/ioctl.c:906 [inline]\n __se_sys_ioctl fs/ioctl.c:892 [inline]\n __x64_sys_ioctl+0x190/0x200 fs/ioctl.c:892\n do_syscall_x64 arch/x86/entry/syscall_64.c:63 [inline]\n do_syscall_64+0xcd/0x260 arch/x86/entry/syscall_64.c:94\n entry_SYSCALL_64_after_hwframe+0x77/0x7f\n\nFor historical and portability reasons, the netif_rx() is usually\nrun in the softirq or interrupt context, this commit therefore add\nlocal_bh_disable/enable() protection in the usbnet_resume_rx().",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 16.0:cluster-md-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dtb-allwinner-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-altera-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amazon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amlogic-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apple-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-arm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-broadcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-cavium-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-exynos-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-freescale-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-hisilicon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-lg-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-marvell-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-mediatek-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-nvidia-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-qcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-renesas-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-rockchip-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-socionext-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-sprd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-xilinx-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40164",
"url": "https://www.suse.com/security/cve/CVE-2025-40164"
},
{
"category": "external",
"summary": "SUSE Bug 1253407 for CVE-2025-40164",
"url": "https://bugzilla.suse.com/1253407"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 16.0:cluster-md-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dtb-allwinner-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-altera-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amazon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amlogic-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apple-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-arm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-broadcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-cavium-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-exynos-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-freescale-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-hisilicon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-lg-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-marvell-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-mediatek-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-nvidia-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-qcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-renesas-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-rockchip-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-socionext-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-sprd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-xilinx-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.7,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"openSUSE Leap 16.0:cluster-md-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dtb-allwinner-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-altera-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amazon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amlogic-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apple-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-arm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-broadcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-cavium-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-exynos-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-freescale-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-hisilicon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-lg-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-marvell-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-mediatek-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-nvidia-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-qcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-renesas-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-rockchip-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-socionext-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-sprd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-xilinx-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-19T17:38:16Z",
"details": "moderate"
}
],
"title": "CVE-2025-40164"
},
{
"cve": "CVE-2025-40165",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40165"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nmedia: nxp: imx8-isi: m2m: Fix streaming cleanup on release\n\nIf streamon/streamoff calls are imbalanced, such as when exiting an\napplication with Ctrl+C when streaming, the m2m usage_count will never\nreach zero and the ISI channel won\u0027t be freed. Besides from that, if the\ninput line width is more than 2K, it will trigger a WARN_ON():\n\n[ 59.222120] ------------[ cut here ]------------\n[ 59.226758] WARNING: drivers/media/platform/nxp/imx8-isi/imx8-isi-hw.c:631 at mxc_isi_channel_chain+0xa4/0x120, CPU#4: v4l2-ctl/654\n[ 59.238569] Modules linked in: ap1302\n[ 59.242231] CPU: 4 UID: 0 PID: 654 Comm: v4l2-ctl Not tainted 6.16.0-rc4-next-20250704-06511-gff0e002d480a-dirty #258 PREEMPT\n[ 59.253597] Hardware name: NXP i.MX95 15X15 board (DT)\n[ 59.258720] pstate: 80400009 (Nzcv daif +PAN -UAO -TCO -DIT -SSBS BTYPE=--)\n[ 59.265669] pc : mxc_isi_channel_chain+0xa4/0x120\n[ 59.270358] lr : mxc_isi_channel_chain+0x44/0x120\n[ 59.275047] sp : ffff8000848c3b40\n[ 59.278348] x29: ffff8000848c3b40 x28: ffff0000859b4c98 x27: ffff800081939f00\n[ 59.285472] x26: 000000000000000a x25: ffff0000859b4cb8 x24: 0000000000000001\n[ 59.292597] x23: ffff0000816f4760 x22: ffff0000816f4258 x21: ffff000084ceb780\n[ 59.299720] x20: ffff000084342ff8 x19: ffff000084340000 x18: 0000000000000000\n[ 59.306845] x17: 0000000000000000 x16: 0000000000000000 x15: 0000ffffdb369e1c\n[ 59.313969] x14: 0000000000000000 x13: 0000000000000000 x12: 0000000000000000\n[ 59.321093] x11: 0000000000000000 x10: 0000000000000000 x9 : 0000000000000000\n[ 59.328217] x8 : ffff8000848c3d48 x7 : ffff800081930b30 x6 : ffff800081930b30\n[ 59.335340] x5 : ffff0000859b6000 x4 : ffff80008193ae80 x3 : ffff800081022420\n[ 59.342464] x2 : ffff0000852f6900 x1 : 0000000000000001 x0 : ffff000084341000\n[ 59.349590] Call trace:\n[ 59.352025] mxc_isi_channel_chain+0xa4/0x120 (P)\n[ 59.356722] mxc_isi_m2m_streamon+0x160/0x20c\n[ 59.361072] v4l_streamon+0x24/0x30\n[ 59.364556] __video_do_ioctl+0x40c/0x4a0\n[ 59.368560] video_usercopy+0x2bc/0x690\n[ 59.372382] video_ioctl2+0x18/0x24\n[ 59.375857] v4l2_ioctl+0x40/0x60\n[ 59.379168] __arm64_sys_ioctl+0xac/0x104\n[ 59.383172] invoke_syscall+0x48/0x104\n[ 59.386916] el0_svc_common.constprop.0+0xc0/0xe0\n[ 59.391613] do_el0_svc+0x1c/0x28\n[ 59.394915] el0_svc+0x34/0xf4\n[ 59.397966] el0t_64_sync_handler+0xa0/0xe4\n[ 59.402143] el0t_64_sync+0x198/0x19c\n[ 59.405801] ---[ end trace 0000000000000000 ]---\n\nAddress this issue by moving the streaming preparation and cleanup to\nthe vb2 .prepare_streaming() and .unprepare_streaming() operations. This\nalso simplifies the driver by allowing direct usage of the\nv4l2_m2m_ioctl_streamon() and v4l2_m2m_ioctl_streamoff() helpers.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 16.0:cluster-md-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dtb-allwinner-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-altera-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amazon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amlogic-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apple-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-arm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-broadcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-cavium-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-exynos-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-freescale-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-hisilicon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-lg-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-marvell-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-mediatek-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-nvidia-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-qcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-renesas-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-rockchip-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-socionext-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-sprd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-xilinx-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40165",
"url": "https://www.suse.com/security/cve/CVE-2025-40165"
},
{
"category": "external",
"summary": "SUSE Bug 1253405 for CVE-2025-40165",
"url": "https://bugzilla.suse.com/1253405"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 16.0:cluster-md-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dtb-allwinner-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-altera-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amazon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amlogic-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apple-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-arm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-broadcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-cavium-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-exynos-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-freescale-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-hisilicon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-lg-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-marvell-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-mediatek-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-nvidia-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-qcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-renesas-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-rockchip-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-socionext-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-sprd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-xilinx-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.7,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"openSUSE Leap 16.0:cluster-md-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dtb-allwinner-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-altera-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amazon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amlogic-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apple-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-arm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-broadcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-cavium-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-exynos-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-freescale-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-hisilicon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-lg-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-marvell-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-mediatek-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-nvidia-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-qcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-renesas-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-rockchip-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-socionext-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-sprd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-xilinx-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-19T17:38:16Z",
"details": "moderate"
}
],
"title": "CVE-2025-40165"
},
{
"cve": "CVE-2025-40166",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40166"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\ndrm/xe/guc: Check GuC running state before deregistering exec queue\n\nIn normal operation, a registered exec queue is disabled and\nderegistered through the GuC, and freed only after the GuC confirms\ncompletion. However, if the driver is forced to unbind while the exec\nqueue is still running, the user may call exec_destroy() after the GuC\nhas already been stopped and CT communication disabled.\n\nIn this case, the driver cannot receive a response from the GuC,\npreventing proper cleanup of exec queue resources. Fix this by directly\nreleasing the resources when GuC is not running.\n\nHere is the failure dmesg log:\n\"\n[ 468.089581] ---[ end trace 0000000000000000 ]---\n[ 468.089608] pci 0000:03:00.0: [drm] *ERROR* GT0: GUC ID manager unclean (1/65535)\n[ 468.090558] pci 0000:03:00.0: [drm] GT0: total 65535\n[ 468.090562] pci 0000:03:00.0: [drm] GT0: used 1\n[ 468.090564] pci 0000:03:00.0: [drm] GT0: range 1..1 (1)\n[ 468.092716] ------------[ cut here ]------------\n[ 468.092719] WARNING: CPU: 14 PID: 4775 at drivers/gpu/drm/xe/xe_ttm_vram_mgr.c:298 ttm_vram_mgr_fini+0xf8/0x130 [xe]\n\"\n\nv2: use xe_uc_fw_is_running() instead of xe_guc_ct_enabled().\n As CT may go down and come back during VF migration.\n\n(cherry picked from commit 9b42321a02c50a12b2beb6ae9469606257fbecea)",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 16.0:cluster-md-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dtb-allwinner-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-altera-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amazon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amlogic-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apple-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-arm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-broadcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-cavium-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-exynos-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-freescale-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-hisilicon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-lg-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-marvell-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-mediatek-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-nvidia-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-qcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-renesas-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-rockchip-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-socionext-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-sprd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-xilinx-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40166",
"url": "https://www.suse.com/security/cve/CVE-2025-40166"
},
{
"category": "external",
"summary": "SUSE Bug 1253433 for CVE-2025-40166",
"url": "https://bugzilla.suse.com/1253433"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 16.0:cluster-md-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dtb-allwinner-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-altera-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amazon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amlogic-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apple-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-arm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-broadcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-cavium-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-exynos-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-freescale-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-hisilicon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-lg-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-marvell-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-mediatek-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-nvidia-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-qcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-renesas-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-rockchip-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-socionext-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-sprd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-xilinx-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"openSUSE Leap 16.0:cluster-md-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dtb-allwinner-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-altera-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amazon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amlogic-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apple-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-arm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-broadcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-cavium-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-exynos-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-freescale-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-hisilicon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-lg-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-marvell-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-mediatek-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-nvidia-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-qcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-renesas-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-rockchip-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-socionext-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-sprd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-xilinx-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-19T17:38:16Z",
"details": "moderate"
}
],
"title": "CVE-2025-40166"
},
{
"cve": "CVE-2025-40168",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40168"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nsmc: Use __sk_dst_get() and dst_dev_rcu() in smc_clc_prfx_match().\n\nsmc_clc_prfx_match() is called from smc_listen_work() and\nnot under RCU nor RTNL.\n\nUsing sk_dst_get(sk)-\u003edev could trigger UAF.\n\nLet\u0027s use __sk_dst_get() and dst_dev_rcu().\n\nNote that the returned value of smc_clc_prfx_match() is not\nused in the caller.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 16.0:cluster-md-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dtb-allwinner-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-altera-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amazon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amlogic-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apple-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-arm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-broadcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-cavium-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-exynos-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-freescale-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-hisilicon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-lg-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-marvell-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-mediatek-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-nvidia-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-qcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-renesas-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-rockchip-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-socionext-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-sprd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-xilinx-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40168",
"url": "https://www.suse.com/security/cve/CVE-2025-40168"
},
{
"category": "external",
"summary": "SUSE Bug 1253427 for CVE-2025-40168",
"url": "https://bugzilla.suse.com/1253427"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 16.0:cluster-md-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dtb-allwinner-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-altera-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amazon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amlogic-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apple-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-arm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-broadcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-cavium-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-exynos-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-freescale-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-hisilicon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-lg-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-marvell-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-mediatek-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-nvidia-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-qcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-renesas-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-rockchip-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-socionext-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-sprd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-xilinx-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:H",
"version": "3.1"
},
"products": [
"openSUSE Leap 16.0:cluster-md-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dtb-allwinner-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-altera-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amazon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amlogic-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apple-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-arm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-broadcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-cavium-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-exynos-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-freescale-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-hisilicon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-lg-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-marvell-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-mediatek-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-nvidia-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-qcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-renesas-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-rockchip-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-socionext-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-sprd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-xilinx-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-19T17:38:16Z",
"details": "moderate"
}
],
"title": "CVE-2025-40168"
},
{
"cve": "CVE-2025-40169",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40169"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nbpf: Reject negative offsets for ALU ops\n\nWhen verifying BPF programs, the check_alu_op() function validates\ninstructions with ALU operations. The \u0027offset\u0027 field in these\ninstructions is a signed 16-bit integer.\n\nThe existing check \u0027insn-\u003eoff \u003e 1\u0027 was intended to ensure the offset is\neither 0, or 1 for BPF_MOD/BPF_DIV. However, because \u0027insn-\u003eoff\u0027 is\nsigned, this check incorrectly accepts all negative values (e.g., -1).\n\nThis commit tightens the validation by changing the condition to\n\u0027(insn-\u003eoff != 0 \u0026\u0026 insn-\u003eoff != 1)\u0027. This ensures that any value\nother than the explicitly permitted 0 and 1 is rejected, hardening the\nverifier against malformed BPF programs.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 16.0:cluster-md-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dtb-allwinner-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-altera-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amazon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amlogic-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apple-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-arm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-broadcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-cavium-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-exynos-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-freescale-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-hisilicon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-lg-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-marvell-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-mediatek-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-nvidia-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-qcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-renesas-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-rockchip-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-socionext-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-sprd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-xilinx-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40169",
"url": "https://www.suse.com/security/cve/CVE-2025-40169"
},
{
"category": "external",
"summary": "SUSE Bug 1253416 for CVE-2025-40169",
"url": "https://bugzilla.suse.com/1253416"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 16.0:cluster-md-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dtb-allwinner-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-altera-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amazon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amlogic-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apple-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-arm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-broadcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-cavium-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-exynos-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-freescale-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-hisilicon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-lg-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-marvell-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-mediatek-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-nvidia-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-qcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-renesas-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-rockchip-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-socionext-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-sprd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-xilinx-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.8,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:H",
"version": "3.1"
},
"products": [
"openSUSE Leap 16.0:cluster-md-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dtb-allwinner-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-altera-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amazon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amlogic-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apple-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-arm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-broadcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-cavium-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-exynos-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-freescale-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-hisilicon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-lg-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-marvell-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-mediatek-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-nvidia-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-qcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-renesas-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-rockchip-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-socionext-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-sprd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-xilinx-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-19T17:38:16Z",
"details": "moderate"
}
],
"title": "CVE-2025-40169"
},
{
"cve": "CVE-2025-40171",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40171"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nnvmet-fc: move lsop put work to nvmet_fc_ls_req_op\n\nIt\u0027s possible for more than one async command to be in flight from\n__nvmet_fc_send_ls_req. For each command, a tgtport reference is taken.\n\nIn the current code, only one put work item is queued at a time, which\nresults in a leaked reference.\n\nTo fix this, move the work item to the nvmet_fc_ls_req_op struct, which\nalready tracks all resources related to the command.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 16.0:cluster-md-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dtb-allwinner-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-altera-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amazon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amlogic-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apple-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-arm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-broadcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-cavium-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-exynos-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-freescale-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-hisilicon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-lg-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-marvell-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-mediatek-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-nvidia-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-qcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-renesas-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-rockchip-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-socionext-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-sprd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-xilinx-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40171",
"url": "https://www.suse.com/security/cve/CVE-2025-40171"
},
{
"category": "external",
"summary": "SUSE Bug 1253412 for CVE-2025-40171",
"url": "https://bugzilla.suse.com/1253412"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 16.0:cluster-md-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dtb-allwinner-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-altera-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amazon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amlogic-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apple-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-arm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-broadcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-cavium-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-exynos-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-freescale-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-hisilicon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-lg-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-marvell-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-mediatek-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-nvidia-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-qcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-renesas-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-rockchip-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-socionext-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-sprd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-xilinx-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:H",
"version": "3.1"
},
"products": [
"openSUSE Leap 16.0:cluster-md-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dtb-allwinner-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-altera-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amazon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amlogic-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apple-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-arm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-broadcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-cavium-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-exynos-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-freescale-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-hisilicon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-lg-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-marvell-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-mediatek-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-nvidia-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-qcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-renesas-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-rockchip-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-socionext-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-sprd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-xilinx-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-19T17:38:16Z",
"details": "moderate"
}
],
"title": "CVE-2025-40171"
},
{
"cve": "CVE-2025-40172",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40172"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\naccel/qaic: Treat remaining == 0 as error in find_and_map_user_pages()\n\nCurrently, if find_and_map_user_pages() takes a DMA xfer request from the\nuser with a length field set to 0, or in a rare case, the host receives\nQAIC_TRANS_DMA_XFER_CONT from the device where resources-\u003exferred_dma_size\nis equal to the requested transaction size, the function will return 0\nbefore allocating an sgt or setting the fields of the dma_xfer struct.\nIn that case, encode_addr_size_pairs() will try to access the sgt which\nwill lead to a general protection fault.\n\nReturn an EINVAL in case the user provides a zero-sized ALP, or the device\nrequests continuation after all of the bytes have been transferred.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 16.0:cluster-md-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dtb-allwinner-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-altera-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amazon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amlogic-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apple-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-arm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-broadcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-cavium-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-exynos-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-freescale-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-hisilicon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-lg-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-marvell-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-mediatek-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-nvidia-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-qcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-renesas-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-rockchip-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-socionext-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-sprd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-xilinx-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40172",
"url": "https://www.suse.com/security/cve/CVE-2025-40172"
},
{
"category": "external",
"summary": "SUSE Bug 1253424 for CVE-2025-40172",
"url": "https://bugzilla.suse.com/1253424"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 16.0:cluster-md-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dtb-allwinner-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-altera-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amazon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amlogic-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apple-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-arm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-broadcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-cavium-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-exynos-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-freescale-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-hisilicon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-lg-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-marvell-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-mediatek-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-nvidia-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-qcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-renesas-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-rockchip-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-socionext-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-sprd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-xilinx-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"openSUSE Leap 16.0:cluster-md-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dtb-allwinner-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-altera-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amazon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amlogic-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apple-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-arm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-broadcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-cavium-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-exynos-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-freescale-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-hisilicon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-lg-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-marvell-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-mediatek-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-nvidia-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-qcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-renesas-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-rockchip-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-socionext-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-sprd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-xilinx-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-19T17:38:16Z",
"details": "moderate"
}
],
"title": "CVE-2025-40172"
},
{
"cve": "CVE-2025-40173",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40173"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nnet/ip6_tunnel: Prevent perpetual tunnel growth\n\nSimilarly to ipv4 tunnel, ipv6 version updates dev-\u003eneeded_headroom, too.\nWhile ipv4 tunnel headroom adjustment growth was limited in\ncommit 5ae1e9922bbd (\"net: ip_tunnel: prevent perpetual headroom growth\"),\nipv6 tunnel yet increases the headroom without any ceiling.\n\nReflect ipv4 tunnel headroom adjustment limit on ipv6 version.\n\nCredits to Francesco Ruggeri, who was originally debugging this issue\nand wrote local Arista-specific patch and a reproducer.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 16.0:cluster-md-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dtb-allwinner-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-altera-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amazon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amlogic-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apple-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-arm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-broadcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-cavium-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-exynos-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-freescale-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-hisilicon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-lg-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-marvell-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-mediatek-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-nvidia-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-qcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-renesas-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-rockchip-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-socionext-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-sprd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-xilinx-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40173",
"url": "https://www.suse.com/security/cve/CVE-2025-40173"
},
{
"category": "external",
"summary": "SUSE Bug 1253421 for CVE-2025-40173",
"url": "https://bugzilla.suse.com/1253421"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 16.0:cluster-md-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dtb-allwinner-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-altera-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amazon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amlogic-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apple-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-arm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-broadcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-cavium-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-exynos-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-freescale-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-hisilicon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-lg-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-marvell-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-mediatek-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-nvidia-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-qcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-renesas-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-rockchip-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-socionext-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-sprd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-xilinx-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.7,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"openSUSE Leap 16.0:cluster-md-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dtb-allwinner-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-altera-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amazon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amlogic-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apple-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-arm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-broadcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-cavium-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-exynos-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-freescale-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-hisilicon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-lg-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-marvell-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-mediatek-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-nvidia-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-qcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-renesas-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-rockchip-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-socionext-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-sprd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-xilinx-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-19T17:38:16Z",
"details": "moderate"
}
],
"title": "CVE-2025-40173"
},
{
"cve": "CVE-2025-40175",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40175"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nidpf: cleanup remaining SKBs in PTP flows\n\nWhen the driver requests Tx timestamp value, one of the first steps is\nto clone SKB using skb_get. It increases the reference counter for that\nSKB to prevent unexpected freeing by another component.\nHowever, there may be a case where the index is requested, SKB is\nassigned and never consumed by PTP flows - for example due to reset during\nrunning PTP apps.\n\nAdd a check in release timestamping function to verify if the SKB\nassigned to Tx timestamp latch was freed, and release remaining SKBs.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 16.0:cluster-md-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dtb-allwinner-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-altera-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amazon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amlogic-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apple-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-arm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-broadcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-cavium-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-exynos-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-freescale-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-hisilicon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-lg-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-marvell-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-mediatek-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-nvidia-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-qcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-renesas-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-rockchip-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-socionext-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-sprd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-xilinx-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40175",
"url": "https://www.suse.com/security/cve/CVE-2025-40175"
},
{
"category": "external",
"summary": "SUSE Bug 1253426 for CVE-2025-40175",
"url": "https://bugzilla.suse.com/1253426"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 16.0:cluster-md-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dtb-allwinner-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-altera-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amazon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amlogic-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apple-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-arm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-broadcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-cavium-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-exynos-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-freescale-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-hisilicon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-lg-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-marvell-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-mediatek-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-nvidia-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-qcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-renesas-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-rockchip-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-socionext-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-sprd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-xilinx-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.7,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"openSUSE Leap 16.0:cluster-md-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dtb-allwinner-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-altera-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amazon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amlogic-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apple-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-arm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-broadcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-cavium-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-exynos-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-freescale-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-hisilicon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-lg-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-marvell-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-mediatek-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-nvidia-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-qcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-renesas-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-rockchip-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-socionext-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-sprd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-xilinx-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-19T17:38:16Z",
"details": "moderate"
}
],
"title": "CVE-2025-40175"
},
{
"cve": "CVE-2025-40176",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40176"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\ntls: wait for pending async decryptions if tls_strp_msg_hold fails\n\nAsync decryption calls tls_strp_msg_hold to create a clone of the\ninput skb to hold references to the memory it uses. If we fail to\nallocate that clone, proceeding with async decryption can lead to\nvarious issues (UAF on the skb, writing into userspace memory after\nthe recv() call has returned).\n\nIn this case, wait for all pending decryption requests.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 16.0:cluster-md-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dtb-allwinner-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-altera-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amazon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amlogic-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apple-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-arm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-broadcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-cavium-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-exynos-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-freescale-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-hisilicon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-lg-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-marvell-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-mediatek-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-nvidia-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-qcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-renesas-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-rockchip-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-socionext-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-sprd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-xilinx-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40176",
"url": "https://www.suse.com/security/cve/CVE-2025-40176"
},
{
"category": "external",
"summary": "SUSE Bug 1253425 for CVE-2025-40176",
"url": "https://bugzilla.suse.com/1253425"
},
{
"category": "external",
"summary": "SUSE Bug 1254100 for CVE-2025-40176",
"url": "https://bugzilla.suse.com/1254100"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 16.0:cluster-md-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dtb-allwinner-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-altera-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amazon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amlogic-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apple-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-arm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-broadcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-cavium-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-exynos-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-freescale-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-hisilicon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-lg-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-marvell-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-mediatek-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-nvidia-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-qcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-renesas-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-rockchip-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-socionext-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-sprd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-xilinx-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"openSUSE Leap 16.0:cluster-md-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dtb-allwinner-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-altera-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amazon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amlogic-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apple-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-arm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-broadcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-cavium-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-exynos-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-freescale-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-hisilicon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-lg-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-marvell-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-mediatek-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-nvidia-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-qcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-renesas-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-rockchip-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-socionext-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-sprd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-xilinx-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-19T17:38:16Z",
"details": "important"
}
],
"title": "CVE-2025-40176"
},
{
"cve": "CVE-2025-40177",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40177"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\naccel/qaic: Fix bootlog initialization ordering\n\nAs soon as we queue MHI buffers to receive the bootlog from the device,\nwe could be receiving data. Therefore all the resources needed to\nprocess that data need to be setup prior to queuing the buffers.\n\nWe currently initialize some of the resources after queuing the buffers\nwhich creates a race between the probe() and any data that comes back\nfrom the device. If the uninitialized resources are accessed, we could\nsee page faults.\n\nFix the init ordering to close the race.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 16.0:cluster-md-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dtb-allwinner-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-altera-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amazon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amlogic-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apple-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-arm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-broadcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-cavium-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-exynos-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-freescale-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-hisilicon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-lg-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-marvell-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-mediatek-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-nvidia-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-qcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-renesas-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-rockchip-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-socionext-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-sprd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-xilinx-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40177",
"url": "https://www.suse.com/security/cve/CVE-2025-40177"
},
{
"category": "external",
"summary": "SUSE Bug 1253443 for CVE-2025-40177",
"url": "https://bugzilla.suse.com/1253443"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 16.0:cluster-md-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dtb-allwinner-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-altera-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amazon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amlogic-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apple-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-arm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-broadcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-cavium-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-exynos-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-freescale-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-hisilicon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-lg-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-marvell-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-mediatek-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-nvidia-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-qcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-renesas-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-rockchip-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-socionext-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-sprd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-xilinx-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:H",
"version": "3.1"
},
"products": [
"openSUSE Leap 16.0:cluster-md-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dtb-allwinner-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-altera-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amazon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amlogic-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apple-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-arm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-broadcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-cavium-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-exynos-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-freescale-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-hisilicon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-lg-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-marvell-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-mediatek-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-nvidia-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-qcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-renesas-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-rockchip-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-socionext-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-sprd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-xilinx-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-19T17:38:16Z",
"details": "moderate"
}
],
"title": "CVE-2025-40177"
},
{
"cve": "CVE-2025-40178",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40178"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\npid: Add a judgment for ns null in pid_nr_ns\n\n__task_pid_nr_ns\n ns = task_active_pid_ns(current);\n pid_nr_ns(rcu_dereference(*task_pid_ptr(task, type)), ns);\n if (pid \u0026\u0026 ns-\u003elevel \u003c= pid-\u003elevel) {\n\nSometimes null is returned for task_active_pid_ns. Then it will trigger kernel panic in pid_nr_ns.\n\nFor example:\n\tUnable to handle kernel NULL pointer dereference at virtual address 0000000000000058\n\tMem abort info:\n\tESR = 0x0000000096000007\n\tEC = 0x25: DABT (current EL), IL = 32 bits\n\tSET = 0, FnV = 0\n\tEA = 0, S1PTW = 0\n\tFSC = 0x07: level 3 translation fault\n\tData abort info:\n\tISV = 0, ISS = 0x00000007, ISS2 = 0x00000000\n\tCM = 0, WnR = 0, TnD = 0, TagAccess = 0\n\tGCS = 0, Overlay = 0, DirtyBit = 0, Xs = 0\n\tuser pgtable: 4k pages, 39-bit VAs, pgdp=00000002175aa000\n\t[0000000000000058] pgd=08000002175ab003, p4d=08000002175ab003, pud=08000002175ab003, pmd=08000002175be003, pte=0000000000000000\n\tpstate: 834000c5 (Nzcv daIF +PAN -UAO +TCO +DIT -SSBS BTYPE=--)\n\tpc : __task_pid_nr_ns+0x74/0xd0\n\tlr : __task_pid_nr_ns+0x24/0xd0\n\tsp : ffffffc08001bd10\n\tx29: ffffffc08001bd10 x28: ffffffd4422b2000 x27: 0000000000000001\n\tx26: ffffffd442821168 x25: ffffffd442821000 x24: 00000f89492eab31\n\tx23: 00000000000000c0 x22: ffffff806f5693c0 x21: ffffff806f5693c0\n\tx20: 0000000000000001 x19: 0000000000000000 x18: 0000000000000000\n\tx17: 00000000529c6ef0 x16: 00000000529c6ef0 x15: 00000000023a1adc\n\tx14: 0000000000000003 x13: 00000000007ef6d8 x12: 001167c391c78800\n\tx11: 00ffffffffffffff x10: 0000000000000000 x9 : 0000000000000001\n\tx8 : ffffff80816fa3c0 x7 : 0000000000000000 x6 : 49534d702d535449\n\tx5 : ffffffc080c4c2c0 x4 : ffffffd43ee128c8 x3 : ffffffd43ee124dc\n\tx2 : 0000000000000000 x1 : 0000000000000001 x0 : ffffff806f5693c0\n\tCall trace:\n\t__task_pid_nr_ns+0x74/0xd0\n\t...\n\t__handle_irq_event_percpu+0xd4/0x284\n\thandle_irq_event+0x48/0xb0\n\thandle_fasteoi_irq+0x160/0x2d8\n\tgeneric_handle_domain_irq+0x44/0x60\n\tgic_handle_irq+0x4c/0x114\n\tcall_on_irq_stack+0x3c/0x74\n\tdo_interrupt_handler+0x4c/0x84\n\tel1_interrupt+0x34/0x58\n\tel1h_64_irq_handler+0x18/0x24\n\tel1h_64_irq+0x68/0x6c\n\taccount_kernel_stack+0x60/0x144\n\texit_task_stack_account+0x1c/0x80\n\tdo_exit+0x7e4/0xaf8\n\t...\n\tget_signal+0x7bc/0x8d8\n\tdo_notify_resume+0x128/0x828\n\tel0_svc+0x6c/0x70\n\tel0t_64_sync_handler+0x68/0xbc\n\tel0t_64_sync+0x1a8/0x1ac\n\tCode: 35fffe54 911a02a8 f9400108 b4000128 (b9405a69)\n\t---[ end trace 0000000000000000 ]---\n\tKernel panic - not syncing: Oops: Fatal exception in interrupt",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 16.0:cluster-md-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dtb-allwinner-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-altera-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amazon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amlogic-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apple-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-arm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-broadcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-cavium-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-exynos-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-freescale-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-hisilicon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-lg-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-marvell-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-mediatek-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-nvidia-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-qcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-renesas-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-rockchip-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-socionext-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-sprd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-xilinx-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40178",
"url": "https://www.suse.com/security/cve/CVE-2025-40178"
},
{
"category": "external",
"summary": "SUSE Bug 1253463 for CVE-2025-40178",
"url": "https://bugzilla.suse.com/1253463"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 16.0:cluster-md-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dtb-allwinner-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-altera-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amazon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amlogic-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apple-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-arm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-broadcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-cavium-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-exynos-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-freescale-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-hisilicon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-lg-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-marvell-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-mediatek-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-nvidia-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-qcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-renesas-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-rockchip-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-socionext-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-sprd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-xilinx-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"openSUSE Leap 16.0:cluster-md-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dtb-allwinner-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-altera-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amazon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amlogic-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apple-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-arm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-broadcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-cavium-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-exynos-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-freescale-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-hisilicon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-lg-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-marvell-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-mediatek-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-nvidia-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-qcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-renesas-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-rockchip-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-socionext-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-sprd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-xilinx-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-19T17:38:16Z",
"details": "moderate"
}
],
"title": "CVE-2025-40178"
},
{
"cve": "CVE-2025-40180",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40180"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nmailbox: zynqmp-ipi: Fix out-of-bounds access in mailbox cleanup loop\n\nThe cleanup loop was starting at the wrong array index, causing\nout-of-bounds access.\nStart the loop at the correct index for zero-indexed arrays to prevent\naccessing memory beyond the allocated array bounds.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 16.0:cluster-md-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dtb-allwinner-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-altera-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amazon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amlogic-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apple-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-arm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-broadcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-cavium-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-exynos-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-freescale-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-hisilicon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-lg-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-marvell-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-mediatek-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-nvidia-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-qcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-renesas-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-rockchip-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-socionext-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-sprd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-xilinx-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40180",
"url": "https://www.suse.com/security/cve/CVE-2025-40180"
},
{
"category": "external",
"summary": "SUSE Bug 1253440 for CVE-2025-40180",
"url": "https://bugzilla.suse.com/1253440"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 16.0:cluster-md-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dtb-allwinner-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-altera-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amazon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amlogic-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apple-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-arm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-broadcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-cavium-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-exynos-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-freescale-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-hisilicon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-lg-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-marvell-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-mediatek-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-nvidia-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-qcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-renesas-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-rockchip-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-socionext-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-sprd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-xilinx-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:H",
"version": "3.1"
},
"products": [
"openSUSE Leap 16.0:cluster-md-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dtb-allwinner-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-altera-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amazon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amlogic-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apple-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-arm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-broadcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-cavium-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-exynos-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-freescale-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-hisilicon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-lg-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-marvell-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-mediatek-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-nvidia-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-qcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-renesas-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-rockchip-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-socionext-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-sprd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-xilinx-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-19T17:38:16Z",
"details": "moderate"
}
],
"title": "CVE-2025-40180"
},
{
"cve": "CVE-2025-40183",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40183"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nbpf: Fix metadata_dst leak __bpf_redirect_neigh_v{4,6}\n\nCilium has a BPF egress gateway feature which forces outgoing K8s Pod\ntraffic to pass through dedicated egress gateways which then SNAT the\ntraffic in order to interact with stable IPs outside the cluster.\n\nThe traffic is directed to the gateway via vxlan tunnel in collect md\nmode. A recent BPF change utilized the bpf_redirect_neigh() helper to\nforward packets after the arrival and decap on vxlan, which turned out\nover time that the kmalloc-256 slab usage in kernel was ever-increasing.\n\nThe issue was that vxlan allocates the metadata_dst object and attaches\nit through a fake dst entry to the skb. The latter was never released\nthough given bpf_redirect_neigh() was merely setting the new dst entry\nvia skb_dst_set() without dropping an existing one first.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 16.0:cluster-md-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dtb-allwinner-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-altera-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amazon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amlogic-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apple-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-arm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-broadcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-cavium-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-exynos-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-freescale-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-hisilicon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-lg-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-marvell-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-mediatek-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-nvidia-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-qcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-renesas-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-rockchip-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-socionext-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-sprd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-xilinx-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40183",
"url": "https://www.suse.com/security/cve/CVE-2025-40183"
},
{
"category": "external",
"summary": "SUSE Bug 1253441 for CVE-2025-40183",
"url": "https://bugzilla.suse.com/1253441"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 16.0:cluster-md-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dtb-allwinner-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-altera-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amazon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amlogic-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apple-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-arm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-broadcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-cavium-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-exynos-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-freescale-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-hisilicon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-lg-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-marvell-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-mediatek-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-nvidia-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-qcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-renesas-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-rockchip-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-socionext-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-sprd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-xilinx-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
"version": "3.1"
},
"products": [
"openSUSE Leap 16.0:cluster-md-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dtb-allwinner-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-altera-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amazon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amlogic-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apple-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-arm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-broadcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-cavium-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-exynos-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-freescale-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-hisilicon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-lg-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-marvell-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-mediatek-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-nvidia-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-qcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-renesas-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-rockchip-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-socionext-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-sprd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-xilinx-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-19T17:38:16Z",
"details": "moderate"
}
],
"title": "CVE-2025-40183"
},
{
"cve": "CVE-2025-40185",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40185"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nice: ice_adapter: release xa entry on adapter allocation failure\n\nWhen ice_adapter_new() fails, the reserved XArray entry created by\nxa_insert() is not released. This causes subsequent insertions at\nthe same index to return -EBUSY, potentially leading to\nNULL pointer dereferences.\n\nReorder the operations as suggested by Przemek Kitszel:\n1. Check if adapter already exists (xa_load)\n2. Reserve the XArray slot (xa_reserve)\n3. Allocate the adapter (ice_adapter_new)\n4. Store the adapter (xa_store)",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 16.0:cluster-md-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dtb-allwinner-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-altera-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amazon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amlogic-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apple-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-arm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-broadcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-cavium-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-exynos-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-freescale-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-hisilicon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-lg-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-marvell-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-mediatek-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-nvidia-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-qcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-renesas-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-rockchip-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-socionext-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-sprd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-xilinx-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40185",
"url": "https://www.suse.com/security/cve/CVE-2025-40185"
},
{
"category": "external",
"summary": "SUSE Bug 1253394 for CVE-2025-40185",
"url": "https://bugzilla.suse.com/1253394"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 16.0:cluster-md-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dtb-allwinner-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-altera-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amazon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amlogic-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apple-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-arm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-broadcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-cavium-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-exynos-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-freescale-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-hisilicon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-lg-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-marvell-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-mediatek-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-nvidia-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-qcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-renesas-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-rockchip-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-socionext-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-sprd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-xilinx-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"openSUSE Leap 16.0:cluster-md-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dtb-allwinner-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-altera-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amazon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amlogic-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apple-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-arm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-broadcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-cavium-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-exynos-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-freescale-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-hisilicon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-lg-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-marvell-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-mediatek-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-nvidia-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-qcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-renesas-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-rockchip-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-socionext-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-sprd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-xilinx-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-19T17:38:16Z",
"details": "moderate"
}
],
"title": "CVE-2025-40185"
},
{
"cve": "CVE-2025-40186",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40186"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\ntcp: Don\u0027t call reqsk_fastopen_remove() in tcp_conn_request().\n\nsyzbot reported the splat below in tcp_conn_request(). [0]\n\nIf a listener is close()d while a TFO socket is being processed in\ntcp_conn_request(), inet_csk_reqsk_queue_add() does not set reqsk-\u003esk\nand calls inet_child_forget(), which calls tcp_disconnect() for the\nTFO socket.\n\nAfter the cited commit, tcp_disconnect() calls reqsk_fastopen_remove(),\nwhere reqsk_put() is called due to !reqsk-\u003esk.\n\nThen, reqsk_fastopen_remove() in tcp_conn_request() decrements the\nlast req-\u003ersk_refcnt and frees reqsk, and __reqsk_free() at the\ndrop_and_free label causes the refcount underflow for the listener\nand double-free of the reqsk.\n\nLet\u0027s remove reqsk_fastopen_remove() in tcp_conn_request().\n\nNote that other callers make sure tp-\u003efastopen_rsk is not NULL.\n\n[0]:\nrefcount_t: underflow; use-after-free.\nWARNING: CPU: 12 PID: 5563 at lib/refcount.c:28 refcount_warn_saturate (lib/refcount.c:28)\nModules linked in:\nCPU: 12 UID: 0 PID: 5563 Comm: syz-executor Not tainted syzkaller #0 PREEMPT(full)\nHardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025\nRIP: 0010:refcount_warn_saturate (lib/refcount.c:28)\nCode: ab e8 8e b4 98 ff 0f 0b c3 cc cc cc cc cc 80 3d a4 e4 d6 01 00 75 9c c6 05 9b e4 d6 01 01 48 c7 c7 e8 df fb ab e8 6a b4 98 ff \u003c0f\u003e 0b e9 03 5b 76 00 cc 80 3d 7d e4 d6 01 00 0f 85 74 ff ff ff c6\nRSP: 0018:ffffa79fc0304a98 EFLAGS: 00010246\nRAX: d83af4db1c6b3900 RBX: ffff9f65c7a69020 RCX: d83af4db1c6b3900\nRDX: 0000000000000000 RSI: 00000000ffff7fff RDI: ffffffffac78a280\nRBP: 000000009d781b60 R08: 0000000000007fff R09: ffffffffac6ca280\nR10: 0000000000017ffd R11: 0000000000000004 R12: ffff9f65c7b4f100\nR13: ffff9f65c7d23c00 R14: ffff9f65c7d26000 R15: ffff9f65c7a64ef8\nFS: 00007f9f962176c0(0000) GS:ffff9f65fcf00000(0000) knlGS:0000000000000000\nCS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033\nCR2: 0000200000000180 CR3: 000000000dbbe006 CR4: 0000000000372ef0\nCall Trace:\n \u003cIRQ\u003e\n tcp_conn_request (./include/linux/refcount.h:400 ./include/linux/refcount.h:432 ./include/linux/refcount.h:450 ./include/net/sock.h:1965 ./include/net/request_sock.h:131 net/ipv4/tcp_input.c:7301)\n tcp_rcv_state_process (net/ipv4/tcp_input.c:6708)\n tcp_v6_do_rcv (net/ipv6/tcp_ipv6.c:1670)\n tcp_v6_rcv (net/ipv6/tcp_ipv6.c:1906)\n ip6_protocol_deliver_rcu (net/ipv6/ip6_input.c:438)\n ip6_input (net/ipv6/ip6_input.c:500)\n ipv6_rcv (net/ipv6/ip6_input.c:311)\n __netif_receive_skb (net/core/dev.c:6104)\n process_backlog (net/core/dev.c:6456)\n __napi_poll (net/core/dev.c:7506)\n net_rx_action (net/core/dev.c:7569 net/core/dev.c:7696)\n handle_softirqs (kernel/softirq.c:579)\n do_softirq (kernel/softirq.c:480)\n \u003c/IRQ\u003e",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 16.0:cluster-md-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dtb-allwinner-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-altera-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amazon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amlogic-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apple-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-arm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-broadcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-cavium-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-exynos-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-freescale-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-hisilicon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-lg-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-marvell-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-mediatek-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-nvidia-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-qcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-renesas-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-rockchip-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-socionext-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-sprd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-xilinx-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40186",
"url": "https://www.suse.com/security/cve/CVE-2025-40186"
},
{
"category": "external",
"summary": "SUSE Bug 1253438 for CVE-2025-40186",
"url": "https://bugzilla.suse.com/1253438"
},
{
"category": "external",
"summary": "SUSE Bug 1253439 for CVE-2025-40186",
"url": "https://bugzilla.suse.com/1253439"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 16.0:cluster-md-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dtb-allwinner-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-altera-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amazon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amlogic-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apple-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-arm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-broadcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-cavium-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-exynos-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-freescale-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-hisilicon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-lg-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-marvell-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-mediatek-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-nvidia-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-qcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-renesas-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-rockchip-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-socionext-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-sprd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-xilinx-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"openSUSE Leap 16.0:cluster-md-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dtb-allwinner-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-altera-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amazon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amlogic-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apple-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-arm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-broadcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-cavium-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-exynos-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-freescale-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-hisilicon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-lg-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-marvell-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-mediatek-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-nvidia-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-qcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-renesas-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-rockchip-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-socionext-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-sprd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-xilinx-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-19T17:38:16Z",
"details": "important"
}
],
"title": "CVE-2025-40186"
},
{
"cve": "CVE-2025-40187",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40187"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nnet/sctp: fix a null dereference in sctp_disposition sctp_sf_do_5_1D_ce()\n\nIf new_asoc-\u003epeer.adaptation_ind=0 and sctp_ulpevent_make_authkey=0\nand sctp_ulpevent_make_authkey() returns 0, then the variable\nai_ev remains zero and the zero will be dereferenced\nin the sctp_ulpevent_free() function.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 16.0:cluster-md-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dtb-allwinner-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-altera-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amazon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amlogic-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apple-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-arm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-broadcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-cavium-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-exynos-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-freescale-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-hisilicon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-lg-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-marvell-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-mediatek-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-nvidia-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-qcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-renesas-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-rockchip-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-socionext-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-sprd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-xilinx-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40187",
"url": "https://www.suse.com/security/cve/CVE-2025-40187"
},
{
"category": "external",
"summary": "SUSE Bug 1253647 for CVE-2025-40187",
"url": "https://bugzilla.suse.com/1253647"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 16.0:cluster-md-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dtb-allwinner-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-altera-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amazon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amlogic-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apple-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-arm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-broadcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-cavium-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-exynos-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-freescale-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-hisilicon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-lg-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-marvell-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-mediatek-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-nvidia-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-qcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-renesas-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-rockchip-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-socionext-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-sprd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-xilinx-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.1,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"openSUSE Leap 16.0:cluster-md-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dtb-allwinner-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-altera-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amazon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amlogic-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apple-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-arm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-broadcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-cavium-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-exynos-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-freescale-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-hisilicon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-lg-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-marvell-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-mediatek-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-nvidia-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-qcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-renesas-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-rockchip-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-socionext-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-sprd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-xilinx-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-19T17:38:16Z",
"details": "moderate"
}
],
"title": "CVE-2025-40187"
},
{
"cve": "CVE-2025-40188",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40188"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\npwm: berlin: Fix wrong register in suspend/resume\n\nThe \u0027enable\u0027 register should be BERLIN_PWM_EN rather than\nBERLIN_PWM_ENABLE, otherwise, the driver accesses wrong address, there\nwill be cpu exception then kernel panic during suspend/resume.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 16.0:cluster-md-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dtb-allwinner-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-altera-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amazon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amlogic-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apple-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-arm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-broadcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-cavium-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-exynos-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-freescale-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-hisilicon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-lg-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-marvell-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-mediatek-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-nvidia-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-qcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-renesas-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-rockchip-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-socionext-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-sprd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-xilinx-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40188",
"url": "https://www.suse.com/security/cve/CVE-2025-40188"
},
{
"category": "external",
"summary": "SUSE Bug 1253449 for CVE-2025-40188",
"url": "https://bugzilla.suse.com/1253449"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 16.0:cluster-md-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dtb-allwinner-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-altera-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amazon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amlogic-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apple-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-arm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-broadcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-cavium-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-exynos-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-freescale-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-hisilicon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-lg-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-marvell-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-mediatek-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-nvidia-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-qcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-renesas-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-rockchip-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-socionext-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-sprd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-xilinx-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"openSUSE Leap 16.0:cluster-md-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dtb-allwinner-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-altera-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amazon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amlogic-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apple-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-arm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-broadcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-cavium-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-exynos-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-freescale-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-hisilicon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-lg-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-marvell-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-mediatek-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-nvidia-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-qcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-renesas-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-rockchip-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-socionext-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-sprd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-xilinx-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-19T17:38:16Z",
"details": "moderate"
}
],
"title": "CVE-2025-40188"
},
{
"cve": "CVE-2025-40192",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40192"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nRevert \"ipmi: fix msg stack when IPMI is disconnected\"\n\nThis reverts commit c608966f3f9c2dca596967501d00753282b395fc.\n\nThis patch has a subtle bug that can cause the IPMI driver to go into an\ninfinite loop if the BMC misbehaves in a certain way. Apparently\ncertain BMCs do misbehave this way because several reports have come in\nrecently about this.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 16.0:cluster-md-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dtb-allwinner-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-altera-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amazon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amlogic-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apple-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-arm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-broadcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-cavium-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-exynos-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-freescale-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-hisilicon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-lg-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-marvell-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-mediatek-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-nvidia-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-qcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-renesas-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-rockchip-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-socionext-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-sprd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-xilinx-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40192",
"url": "https://www.suse.com/security/cve/CVE-2025-40192"
},
{
"category": "external",
"summary": "SUSE Bug 1253622 for CVE-2025-40192",
"url": "https://bugzilla.suse.com/1253622"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 16.0:cluster-md-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dtb-allwinner-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-altera-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amazon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amlogic-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apple-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-arm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-broadcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-cavium-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-exynos-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-freescale-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-hisilicon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-lg-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-marvell-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-mediatek-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-nvidia-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-qcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-renesas-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-rockchip-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-socionext-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-sprd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-xilinx-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"openSUSE Leap 16.0:cluster-md-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dtb-allwinner-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-altera-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amazon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amlogic-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apple-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-arm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-broadcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-cavium-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-exynos-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-freescale-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-hisilicon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-lg-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-marvell-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-mediatek-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-nvidia-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-qcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-renesas-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-rockchip-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-socionext-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-sprd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-xilinx-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-19T17:38:16Z",
"details": "moderate"
}
],
"title": "CVE-2025-40192"
},
{
"cve": "CVE-2025-40194",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40194"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\ncpufreq: intel_pstate: Fix object lifecycle issue in update_qos_request()\n\nThe cpufreq_cpu_put() call in update_qos_request() takes place too early\nbecause the latter subsequently calls freq_qos_update_request() that\nindirectly accesses the policy object in question through the QoS request\nobject passed to it.\n\nFortunately, update_qos_request() is called under intel_pstate_driver_lock,\nso this issue does not matter for changing the intel_pstate operation\nmode, but it theoretically can cause a crash to occur on CPU device hot\nremoval (which currently can only happen in virt, but it is formally\nsupported nevertheless).\n\nAddress this issue by modifying update_qos_request() to drop the\nreference to the policy later.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 16.0:cluster-md-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dtb-allwinner-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-altera-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amazon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amlogic-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apple-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-arm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-broadcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-cavium-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-exynos-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-freescale-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-hisilicon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-lg-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-marvell-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-mediatek-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-nvidia-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-qcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-renesas-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-rockchip-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-socionext-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-sprd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-xilinx-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40194",
"url": "https://www.suse.com/security/cve/CVE-2025-40194"
},
{
"category": "external",
"summary": "SUSE Bug 1253445 for CVE-2025-40194",
"url": "https://bugzilla.suse.com/1253445"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 16.0:cluster-md-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dtb-allwinner-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-altera-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amazon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amlogic-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apple-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-arm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-broadcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-cavium-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-exynos-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-freescale-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-hisilicon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-lg-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-marvell-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-mediatek-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-nvidia-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-qcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-renesas-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-rockchip-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-socionext-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-sprd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-xilinx-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.7,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"openSUSE Leap 16.0:cluster-md-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dtb-allwinner-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-altera-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amazon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amlogic-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apple-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-arm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-broadcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-cavium-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-exynos-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-freescale-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-hisilicon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-lg-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-marvell-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-mediatek-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-nvidia-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-qcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-renesas-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-rockchip-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-socionext-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-sprd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-xilinx-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-19T17:38:16Z",
"details": "moderate"
}
],
"title": "CVE-2025-40194"
},
{
"cve": "CVE-2025-40196",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40196"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nfs: quota: create dedicated workqueue for quota_release_work\n\nThere is a kernel panic due to WARN_ONCE when panic_on_warn is set.\n\nThis issue occurs when writeback is triggered due to sync call for an\nopened file(ie, writeback reason is WB_REASON_SYNC). When f2fs balance\nis needed at sync path, flush for quota_release_work is triggered.\nBy default quota_release_work is queued to \"events_unbound\" queue which\ndoes not have WQ_MEM_RECLAIM flag. During f2fs balance \"writeback\"\nworkqueue tries to flush quota_release_work causing kernel panic due to\nMEM_RECLAIM flag mismatch errors.\n\nThis patch creates dedicated workqueue with WQ_MEM_RECLAIM flag\nfor work quota_release_work.\n\n------------[ cut here ]------------\nWARNING: CPU: 4 PID: 14867 at kernel/workqueue.c:3721 check_flush_dependency+0x13c/0x148\nCall trace:\n check_flush_dependency+0x13c/0x148\n __flush_work+0xd0/0x398\n flush_delayed_work+0x44/0x5c\n dquot_writeback_dquots+0x54/0x318\n f2fs_do_quota_sync+0xb8/0x1a8\n f2fs_write_checkpoint+0x3cc/0x99c\n f2fs_gc+0x190/0x750\n f2fs_balance_fs+0x110/0x168\n f2fs_write_single_data_page+0x474/0x7dc\n f2fs_write_data_pages+0x7d0/0xd0c\n do_writepages+0xe0/0x2f4\n __writeback_single_inode+0x44/0x4ac\n writeback_sb_inodes+0x30c/0x538\n wb_writeback+0xf4/0x440\n wb_workfn+0x128/0x5d4\n process_scheduled_works+0x1c4/0x45c\n worker_thread+0x32c/0x3e8\n kthread+0x11c/0x1b0\n ret_from_fork+0x10/0x20\nKernel panic - not syncing: kernel: panic_on_warn set ...",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 16.0:cluster-md-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dtb-allwinner-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-altera-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amazon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amlogic-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apple-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-arm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-broadcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-cavium-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-exynos-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-freescale-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-hisilicon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-lg-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-marvell-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-mediatek-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-nvidia-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-qcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-renesas-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-rockchip-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-socionext-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-sprd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-xilinx-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40196",
"url": "https://www.suse.com/security/cve/CVE-2025-40196"
},
{
"category": "external",
"summary": "SUSE Bug 1253624 for CVE-2025-40196",
"url": "https://bugzilla.suse.com/1253624"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 16.0:cluster-md-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dtb-allwinner-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-altera-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amazon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amlogic-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apple-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-arm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-broadcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-cavium-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-exynos-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-freescale-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-hisilicon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-lg-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-marvell-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-mediatek-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-nvidia-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-qcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-renesas-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-rockchip-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-socionext-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-sprd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-xilinx-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 3.3,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L",
"version": "3.1"
},
"products": [
"openSUSE Leap 16.0:cluster-md-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dtb-allwinner-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-altera-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amazon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amlogic-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apple-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-arm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-broadcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-cavium-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-exynos-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-freescale-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-hisilicon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-lg-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-marvell-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-mediatek-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-nvidia-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-qcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-renesas-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-rockchip-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-socionext-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-sprd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-xilinx-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-19T17:38:16Z",
"details": "low"
}
],
"title": "CVE-2025-40196"
},
{
"cve": "CVE-2025-40197",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40197"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nmedia: mc: Clear minor number before put device\n\nThe device minor should not be cleared after the device is released.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 16.0:cluster-md-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dtb-allwinner-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-altera-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amazon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amlogic-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apple-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-arm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-broadcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-cavium-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-exynos-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-freescale-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-hisilicon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-lg-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-marvell-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-mediatek-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-nvidia-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-qcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-renesas-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-rockchip-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-socionext-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-sprd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-xilinx-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40197",
"url": "https://www.suse.com/security/cve/CVE-2025-40197"
},
{
"category": "external",
"summary": "SUSE Bug 1253450 for CVE-2025-40197",
"url": "https://bugzilla.suse.com/1253450"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 16.0:cluster-md-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dtb-allwinner-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-altera-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amazon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amlogic-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apple-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-arm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-broadcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-cavium-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-exynos-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-freescale-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-hisilicon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-lg-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-marvell-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-mediatek-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-nvidia-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-qcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-renesas-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-rockchip-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-socionext-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-sprd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-xilinx-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"openSUSE Leap 16.0:cluster-md-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dtb-allwinner-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-altera-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amazon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amlogic-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apple-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-arm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-broadcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-cavium-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-exynos-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-freescale-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-hisilicon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-lg-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-marvell-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-mediatek-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-nvidia-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-qcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-renesas-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-rockchip-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-socionext-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-sprd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-xilinx-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-19T17:38:16Z",
"details": "moderate"
}
],
"title": "CVE-2025-40197"
},
{
"cve": "CVE-2025-40198",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40198"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\next4: avoid potential buffer over-read in parse_apply_sb_mount_options()\n\nUnlike other strings in the ext4 superblock, we rely on tune2fs to\nmake sure s_mount_opts is NUL terminated. Harden\nparse_apply_sb_mount_options() by treating s_mount_opts as a potential\n__nonstring.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 16.0:cluster-md-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dtb-allwinner-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-altera-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amazon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amlogic-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apple-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-arm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-broadcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-cavium-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-exynos-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-freescale-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-hisilicon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-lg-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-marvell-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-mediatek-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-nvidia-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-qcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-renesas-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-rockchip-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-socionext-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-sprd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-xilinx-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40198",
"url": "https://www.suse.com/security/cve/CVE-2025-40198"
},
{
"category": "external",
"summary": "SUSE Bug 1253453 for CVE-2025-40198",
"url": "https://bugzilla.suse.com/1253453"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 16.0:cluster-md-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dtb-allwinner-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-altera-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amazon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amlogic-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apple-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-arm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-broadcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-cavium-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-exynos-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-freescale-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-hisilicon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-lg-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-marvell-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-mediatek-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-nvidia-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-qcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-renesas-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-rockchip-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-socionext-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-sprd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-xilinx-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"openSUSE Leap 16.0:cluster-md-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dtb-allwinner-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-altera-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amazon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amlogic-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apple-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-arm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-broadcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-cavium-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-exynos-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-freescale-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-hisilicon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-lg-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-marvell-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-mediatek-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-nvidia-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-qcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-renesas-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-rockchip-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-socionext-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-sprd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-xilinx-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-19T17:38:16Z",
"details": "moderate"
}
],
"title": "CVE-2025-40198"
},
{
"cve": "CVE-2025-40200",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40200"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nSquashfs: reject negative file sizes in squashfs_read_inode()\n\nSyskaller reports a \"WARNING in ovl_copy_up_file\" in overlayfs.\n\nThis warning is ultimately caused because the underlying Squashfs file\nsystem returns a file with a negative file size.\n\nThis commit checks for a negative file size and returns EINVAL.\n\n[phillip@squashfs.org.uk: only need to check 64 bit quantity]",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 16.0:cluster-md-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dtb-allwinner-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-altera-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amazon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amlogic-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apple-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-arm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-broadcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-cavium-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-exynos-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-freescale-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-hisilicon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-lg-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-marvell-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-mediatek-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-nvidia-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-qcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-renesas-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-rockchip-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-socionext-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-sprd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-xilinx-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40200",
"url": "https://www.suse.com/security/cve/CVE-2025-40200"
},
{
"category": "external",
"summary": "SUSE Bug 1253448 for CVE-2025-40200",
"url": "https://bugzilla.suse.com/1253448"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 16.0:cluster-md-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dtb-allwinner-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-altera-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amazon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amlogic-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apple-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-arm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-broadcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-cavium-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-exynos-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-freescale-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-hisilicon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-lg-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-marvell-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-mediatek-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-nvidia-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-qcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-renesas-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-rockchip-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-socionext-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-sprd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-xilinx-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"openSUSE Leap 16.0:cluster-md-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dtb-allwinner-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-altera-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amazon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amlogic-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apple-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-arm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-broadcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-cavium-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-exynos-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-freescale-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-hisilicon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-lg-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-marvell-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-mediatek-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-nvidia-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-qcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-renesas-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-rockchip-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-socionext-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-sprd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-xilinx-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-19T17:38:16Z",
"details": "moderate"
}
],
"title": "CVE-2025-40200"
},
{
"cve": "CVE-2025-40201",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40201"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nkernel/sys.c: fix the racy usage of task_lock(tsk-\u003egroup_leader) in sys_prlimit64() paths\n\nThe usage of task_lock(tsk-\u003egroup_leader) in sys_prlimit64()-\u003edo_prlimit()\npath is very broken.\n\nsys_prlimit64() does get_task_struct(tsk) but this only protects task_struct\nitself. If tsk != current and tsk is not a leader, this process can exit/exec\nand task_lock(tsk-\u003egroup_leader) may use the already freed task_struct.\n\nAnother problem is that sys_prlimit64() can race with mt-exec which changes\n-\u003egroup_leader. In this case do_prlimit() may take the wrong lock, or (worse)\n-\u003egroup_leader may change between task_lock() and task_unlock().\n\nChange sys_prlimit64() to take tasklist_lock when necessary. This is not\nnice, but I don\u0027t see a better fix for -stable.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 16.0:cluster-md-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dtb-allwinner-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-altera-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amazon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amlogic-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apple-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-arm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-broadcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-cavium-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-exynos-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-freescale-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-hisilicon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-lg-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-marvell-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-mediatek-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-nvidia-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-qcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-renesas-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-rockchip-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-socionext-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-sprd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-xilinx-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40201",
"url": "https://www.suse.com/security/cve/CVE-2025-40201"
},
{
"category": "external",
"summary": "SUSE Bug 1253455 for CVE-2025-40201",
"url": "https://bugzilla.suse.com/1253455"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 16.0:cluster-md-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dtb-allwinner-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-altera-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amazon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amlogic-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apple-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-arm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-broadcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-cavium-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-exynos-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-freescale-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-hisilicon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-lg-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-marvell-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-mediatek-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-nvidia-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-qcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-renesas-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-rockchip-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-socionext-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-sprd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-xilinx-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"openSUSE Leap 16.0:cluster-md-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dtb-allwinner-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-altera-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amazon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amlogic-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apple-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-arm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-broadcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-cavium-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-exynos-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-freescale-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-hisilicon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-lg-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-marvell-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-mediatek-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-nvidia-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-qcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-renesas-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-rockchip-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-socionext-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-sprd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-xilinx-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-19T17:38:16Z",
"details": "moderate"
}
],
"title": "CVE-2025-40201"
},
{
"cve": "CVE-2025-40202",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40202"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nipmi: Rework user message limit handling\n\nThe limit on the number of user messages had a number of issues,\nimproper counting in some cases and a use after free.\n\nRestructure how this is all done to handle more in the receive message\nallocation routine, so all refcouting and user message limit counts\nare done in that routine. It\u0027s a lot cleaner and safer.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 16.0:cluster-md-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dtb-allwinner-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-altera-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amazon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amlogic-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apple-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-arm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-broadcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-cavium-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-exynos-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-freescale-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-hisilicon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-lg-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-marvell-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-mediatek-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-nvidia-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-qcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-renesas-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-rockchip-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-socionext-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-sprd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-xilinx-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40202",
"url": "https://www.suse.com/security/cve/CVE-2025-40202"
},
{
"category": "external",
"summary": "SUSE Bug 1253451 for CVE-2025-40202",
"url": "https://bugzilla.suse.com/1253451"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 16.0:cluster-md-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dtb-allwinner-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-altera-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amazon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amlogic-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apple-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-arm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-broadcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-cavium-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-exynos-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-freescale-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-hisilicon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-lg-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-marvell-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-mediatek-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-nvidia-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-qcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-renesas-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-rockchip-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-socionext-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-sprd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-xilinx-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"openSUSE Leap 16.0:cluster-md-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dtb-allwinner-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-altera-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amazon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amlogic-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apple-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-arm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-broadcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-cavium-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-exynos-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-freescale-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-hisilicon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-lg-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-marvell-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-mediatek-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-nvidia-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-qcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-renesas-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-rockchip-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-socionext-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-sprd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-xilinx-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-19T17:38:16Z",
"details": "moderate"
}
],
"title": "CVE-2025-40202"
},
{
"cve": "CVE-2025-40203",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40203"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nlistmount: don\u0027t call path_put() under namespace semaphore\n\nMassage listmount() and make sure we don\u0027t call path_put() under the\nnamespace semaphore. If we put the last reference we\u0027re fscked.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 16.0:cluster-md-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dtb-allwinner-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-altera-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amazon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amlogic-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apple-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-arm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-broadcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-cavium-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-exynos-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-freescale-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-hisilicon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-lg-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-marvell-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-mediatek-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-nvidia-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-qcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-renesas-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-rockchip-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-socionext-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-sprd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-xilinx-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40203",
"url": "https://www.suse.com/security/cve/CVE-2025-40203"
},
{
"category": "external",
"summary": "SUSE Bug 1253457 for CVE-2025-40203",
"url": "https://bugzilla.suse.com/1253457"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 16.0:cluster-md-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dtb-allwinner-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-altera-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amazon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amlogic-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apple-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-arm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-broadcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-cavium-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-exynos-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-freescale-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-hisilicon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-lg-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-marvell-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-mediatek-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-nvidia-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-qcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-renesas-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-rockchip-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-socionext-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-sprd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-xilinx-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"openSUSE Leap 16.0:cluster-md-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dtb-allwinner-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-altera-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amazon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amlogic-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apple-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-arm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-broadcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-cavium-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-exynos-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-freescale-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-hisilicon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-lg-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-marvell-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-mediatek-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-nvidia-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-qcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-renesas-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-rockchip-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-socionext-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-sprd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-xilinx-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-19T17:38:16Z",
"details": "moderate"
}
],
"title": "CVE-2025-40203"
},
{
"cve": "CVE-2025-40204",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40204"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nsctp: Fix MAC comparison to be constant-time\n\nTo prevent timing attacks, MACs need to be compared in constant time.\nUse the appropriate helper function for this.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 16.0:cluster-md-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dtb-allwinner-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-altera-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amazon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amlogic-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apple-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-arm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-broadcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-cavium-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-exynos-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-freescale-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-hisilicon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-lg-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-marvell-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-mediatek-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-nvidia-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-qcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-renesas-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-rockchip-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-socionext-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-sprd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-xilinx-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40204",
"url": "https://www.suse.com/security/cve/CVE-2025-40204"
},
{
"category": "external",
"summary": "SUSE Bug 1253436 for CVE-2025-40204",
"url": "https://bugzilla.suse.com/1253436"
},
{
"category": "external",
"summary": "SUSE Bug 1253437 for CVE-2025-40204",
"url": "https://bugzilla.suse.com/1253437"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 16.0:cluster-md-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dtb-allwinner-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-altera-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amazon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amlogic-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apple-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-arm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-broadcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-cavium-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-exynos-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-freescale-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-hisilicon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-lg-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-marvell-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-mediatek-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-nvidia-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-qcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-renesas-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-rockchip-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-socionext-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-sprd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-xilinx-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"openSUSE Leap 16.0:cluster-md-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dtb-allwinner-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-altera-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amazon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amlogic-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apple-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-arm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-broadcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-cavium-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-exynos-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-freescale-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-hisilicon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-lg-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-marvell-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-mediatek-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-nvidia-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-qcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-renesas-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-rockchip-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-socionext-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-sprd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-xilinx-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-19T17:38:16Z",
"details": "important"
}
],
"title": "CVE-2025-40204"
},
{
"cve": "CVE-2025-40205",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40205"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nbtrfs: avoid potential out-of-bounds in btrfs_encode_fh()\n\nThe function btrfs_encode_fh() does not properly account for the three\ncases it handles.\n\nBefore writing to the file handle (fh), the function only returns to the\nuser BTRFS_FID_SIZE_NON_CONNECTABLE (5 dwords, 20 bytes) or\nBTRFS_FID_SIZE_CONNECTABLE (8 dwords, 32 bytes).\n\nHowever, when a parent exists and the root ID of the parent and the\ninode are different, the function writes BTRFS_FID_SIZE_CONNECTABLE_ROOT\n(10 dwords, 40 bytes).\n\nIf *max_len is not large enough, this write goes out of bounds because\nBTRFS_FID_SIZE_CONNECTABLE_ROOT is greater than\nBTRFS_FID_SIZE_CONNECTABLE originally returned.\n\nThis results in an 8-byte out-of-bounds write at\nfid-\u003eparent_root_objectid = parent_root_id.\n\nA previous attempt to fix this issue was made but was lost.\n\nhttps://lore.kernel.org/all/4CADAEEC020000780001B32C@vpn.id2.novell.com/\n\nAlthough this issue does not seem to be easily triggerable, it is a\npotential memory corruption bug that should be fixed. This patch\nresolves the issue by ensuring the function returns the appropriate size\nfor all three cases and validates that *max_len is large enough before\nwriting any data.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 16.0:cluster-md-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dtb-allwinner-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-altera-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amazon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amlogic-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apple-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-arm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-broadcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-cavium-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-exynos-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-freescale-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-hisilicon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-lg-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-marvell-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-mediatek-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-nvidia-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-qcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-renesas-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-rockchip-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-socionext-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-sprd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-xilinx-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40205",
"url": "https://www.suse.com/security/cve/CVE-2025-40205"
},
{
"category": "external",
"summary": "SUSE Bug 1253456 for CVE-2025-40205",
"url": "https://bugzilla.suse.com/1253456"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 16.0:cluster-md-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dtb-allwinner-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-altera-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amazon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amlogic-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apple-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-arm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-broadcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-cavium-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-exynos-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-freescale-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-hisilicon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-lg-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-marvell-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-mediatek-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-nvidia-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-qcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-renesas-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-rockchip-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-socionext-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-sprd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-xilinx-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"openSUSE Leap 16.0:cluster-md-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dtb-allwinner-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-altera-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amazon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amlogic-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apple-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-arm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-broadcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-cavium-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-exynos-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-freescale-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-hisilicon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-lg-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-marvell-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-mediatek-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-nvidia-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-qcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-renesas-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-rockchip-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-socionext-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-sprd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-xilinx-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-19T17:38:16Z",
"details": "moderate"
}
],
"title": "CVE-2025-40205"
},
{
"cve": "CVE-2025-40206",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40206"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nnetfilter: nft_objref: validate objref and objrefmap expressions\n\nReferencing a synproxy stateful object from OUTPUT hook causes kernel\ncrash due to infinite recursive calls:\n\nBUG: TASK stack guard page was hit at 000000008bda5b8c (stack is 000000003ab1c4a5..00000000494d8b12)\n[...]\nCall Trace:\n __find_rr_leaf+0x99/0x230\n fib6_table_lookup+0x13b/0x2d0\n ip6_pol_route+0xa4/0x400\n fib6_rule_lookup+0x156/0x240\n ip6_route_output_flags+0xc6/0x150\n __nf_ip6_route+0x23/0x50\n synproxy_send_tcp_ipv6+0x106/0x200\n synproxy_send_client_synack_ipv6+0x1aa/0x1f0\n nft_synproxy_do_eval+0x263/0x310\n nft_do_chain+0x5a8/0x5f0 [nf_tables\n nft_do_chain_inet+0x98/0x110\n nf_hook_slow+0x43/0xc0\n __ip6_local_out+0xf0/0x170\n ip6_local_out+0x17/0x70\n synproxy_send_tcp_ipv6+0x1a2/0x200\n synproxy_send_client_synack_ipv6+0x1aa/0x1f0\n[...]\n\nImplement objref and objrefmap expression validate functions.\n\nCurrently, only NFT_OBJECT_SYNPROXY object type requires validation.\nThis will also handle a jump to a chain using a synproxy object from the\nOUTPUT hook.\n\nNow when trying to reference a synproxy object in the OUTPUT hook, nft\nwill produce the following error:\n\nsynproxy_crash.nft: Error: Could not process rule: Operation not supported\n synproxy name mysynproxy\n ^^^^^^^^^^^^^^^^^^^^^^^^",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 16.0:cluster-md-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dtb-allwinner-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-altera-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amazon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amlogic-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apple-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-arm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-broadcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-cavium-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-exynos-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-freescale-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-hisilicon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-lg-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-marvell-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-mediatek-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-nvidia-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-qcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-renesas-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-rockchip-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-socionext-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-sprd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-xilinx-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40206",
"url": "https://www.suse.com/security/cve/CVE-2025-40206"
},
{
"category": "external",
"summary": "SUSE Bug 1253393 for CVE-2025-40206",
"url": "https://bugzilla.suse.com/1253393"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 16.0:cluster-md-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dtb-allwinner-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-altera-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amazon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amlogic-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apple-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-arm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-broadcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-cavium-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-exynos-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-freescale-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-hisilicon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-lg-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-marvell-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-mediatek-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-nvidia-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-qcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-renesas-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-rockchip-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-socionext-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-sprd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-xilinx-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.1,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"openSUSE Leap 16.0:cluster-md-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dtb-allwinner-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-altera-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amazon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amlogic-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apple-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-arm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-broadcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-cavium-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-exynos-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-freescale-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-hisilicon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-lg-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-marvell-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-mediatek-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-nvidia-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-qcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-renesas-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-rockchip-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-socionext-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-sprd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-xilinx-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-19T17:38:16Z",
"details": "moderate"
}
],
"title": "CVE-2025-40206"
},
{
"cve": "CVE-2025-40207",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40207"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nmedia: v4l2-subdev: Fix alloc failure check in v4l2_subdev_call_state_try()\n\nv4l2_subdev_call_state_try() macro allocates a subdev state with\n__v4l2_subdev_state_alloc(), but does not check the returned value. If\n__v4l2_subdev_state_alloc fails, it returns an ERR_PTR, and that would\ncause v4l2_subdev_call_state_try() to crash.\n\nAdd proper error handling to v4l2_subdev_call_state_try().",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 16.0:cluster-md-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dtb-allwinner-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-altera-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amazon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amlogic-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apple-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-arm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-broadcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-cavium-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-exynos-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-freescale-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-hisilicon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-lg-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-marvell-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-mediatek-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-nvidia-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-qcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-renesas-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-rockchip-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-socionext-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-sprd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-xilinx-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40207",
"url": "https://www.suse.com/security/cve/CVE-2025-40207"
},
{
"category": "external",
"summary": "SUSE Bug 1253395 for CVE-2025-40207",
"url": "https://bugzilla.suse.com/1253395"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 16.0:cluster-md-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dtb-allwinner-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-altera-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amazon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amlogic-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apple-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-arm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-broadcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-cavium-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-exynos-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-freescale-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-hisilicon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-lg-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-marvell-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-mediatek-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-nvidia-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-qcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-renesas-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-rockchip-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-socionext-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-sprd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-xilinx-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"openSUSE Leap 16.0:cluster-md-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:cluster-md-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:cluster-md-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:dlm-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dlm-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:dtb-allwinner-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-altera-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amazon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-amlogic-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-apple-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-arm-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-broadcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-cavium-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-exynos-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-freescale-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-hisilicon-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-lg-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-marvell-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-mediatek-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-nvidia-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-qcom-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-renesas-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-rockchip-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-socionext-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-sprd-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:dtb-xilinx-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:gfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:gfs2-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-64kb-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.aarch64",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.ppc64le",
"openSUSE Leap 16.0:kernel-default-base-6.12.0-160000.8.1.160000.2.5.x86_64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-default-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-default-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-devel-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-docs-html-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-kvmsmall-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-kvmsmall-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-macros-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-build-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-obs-qa-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-devel-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-extra-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-rt-optional-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-rt-vdso-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-source-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-source-vanilla-6.12.0-160000.8.1.noarch",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kernel-syms-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kernel-zfcpdump-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:kselftests-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:kselftests-kmp-rt-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-64kb-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.ppc64le",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.s390x",
"openSUSE Leap 16.0:ocfs2-kmp-default-6.12.0-160000.8.1.x86_64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.aarch64",
"openSUSE Leap 16.0:ocfs2-kmp-rt-6.12.0-160000.8.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-19T17:38:16Z",
"details": "moderate"
}
],
"title": "CVE-2025-40207"
}
]
}
MSRC_CVE-2025-40201
Vulnerability from csaf_microsoft - Published: 2025-11-02 00:00 - Updated: 2025-12-07 01:51| URL | Category | |
|---|---|---|
{
"document": {
"category": "csaf_vex",
"csaf_version": "2.0",
"distribution": {
"text": "Public",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en-US",
"notes": [
{
"category": "general",
"text": "To determine the support lifecycle for your software, see the Microsoft Support Lifecycle: https://support.microsoft.com/lifecycle",
"title": "Additional Resources"
},
{
"category": "legal_disclaimer",
"text": "The information provided in the Microsoft Knowledge Base is provided \\\"as is\\\" without warranty of any kind. Microsoft disclaims all warranties, either express or implied, including the warranties of merchantability and fitness for a particular purpose. In no event shall Microsoft Corporation or its suppliers be liable for any damages whatsoever including direct, indirect, incidental, consequential, loss of business profits or special damages, even if Microsoft Corporation or its suppliers have been advised of the possibility of such damages. Some states do not allow the exclusion or limitation of liability for consequential or incidental damages so the foregoing limitation may not apply.",
"title": "Disclaimer"
}
],
"publisher": {
"category": "vendor",
"contact_details": "secure@microsoft.com",
"name": "Microsoft Security Response Center",
"namespace": "https://msrc.microsoft.com"
},
"references": [
{
"category": "self",
"summary": "CVE-2025-40201 kernel/sys.c: fix the racy usage of task_lock(tsk-\u003egroup_leader) in sys_prlimit64() paths - VEX",
"url": "https://msrc.microsoft.com/csaf/vex/2025/msrc_cve-2025-40201.json"
},
{
"category": "external",
"summary": "Microsoft Support Lifecycle",
"url": "https://support.microsoft.com/lifecycle"
},
{
"category": "external",
"summary": "Common Vulnerability Scoring System",
"url": "https://www.first.org/cvss"
}
],
"title": "kernel/sys.c: fix the racy usage of task_lock(tsk-\u003egroup_leader) in sys_prlimit64() paths",
"tracking": {
"current_release_date": "2025-12-07T01:51:54.000Z",
"generator": {
"date": "2025-12-07T15:03:05.337Z",
"engine": {
"name": "MSRC Generator",
"version": "1.0"
}
},
"id": "msrc_CVE-2025-40201",
"initial_release_date": "2025-11-02T00:00:00.000Z",
"revision_history": [
{
"date": "2025-11-14T01:02:24.000Z",
"legacy_version": "1",
"number": "1",
"summary": "Information published."
},
{
"date": "2025-12-07T01:51:54.000Z",
"legacy_version": "2",
"number": "2",
"summary": "Information published."
}
],
"status": "final",
"version": "2"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "3.0",
"product": {
"name": "Azure Linux 3.0",
"product_id": "17084"
}
}
],
"category": "product_name",
"name": "Azure Linux"
},
{
"branches": [
{
"category": "product_version_range",
"name": "\u003cazl3 kernel 6.6.112.1-2",
"product": {
"name": "\u003cazl3 kernel 6.6.112.1-2",
"product_id": "1"
}
},
{
"category": "product_version",
"name": "azl3 kernel 6.6.112.1-2",
"product": {
"name": "azl3 kernel 6.6.112.1-2",
"product_id": "20613"
}
}
],
"category": "product_name",
"name": "kernel"
}
],
"category": "vendor",
"name": "Microsoft"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "\u003cazl3 kernel 6.6.112.1-2 as a component of Azure Linux 3.0",
"product_id": "17084-1"
},
"product_reference": "1",
"relates_to_product_reference": "17084"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "azl3 kernel 6.6.112.1-2 as a component of Azure Linux 3.0",
"product_id": "20613-17084"
},
"product_reference": "20613",
"relates_to_product_reference": "17084"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2025-40201",
"notes": [
{
"category": "general",
"text": "Linux",
"title": "Assigning CNA"
}
],
"product_status": {
"fixed": [
"20613-17084"
],
"known_affected": [
"17084-1"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-40201 kernel/sys.c: fix the racy usage of task_lock(tsk-\u003egroup_leader) in sys_prlimit64() paths - VEX",
"url": "https://msrc.microsoft.com/csaf/vex/2025/msrc_cve-2025-40201.json"
}
],
"remediations": [
{
"category": "vendor_fix",
"date": "2025-11-14T01:02:24.000Z",
"details": "6.6.117.1-1:Security Update:https://learn.microsoft.com/en-us/azure/azure-linux/tutorial-azure-linux-upgrade",
"product_ids": [
"17084-1"
],
"url": "https://learn.microsoft.com/en-us/azure/azure-linux/tutorial-azure-linux-upgrade"
}
],
"title": "kernel/sys.c: fix the racy usage of task_lock(tsk-\u003egroup_leader) in sys_prlimit64() paths"
}
]
}
FKIE_CVE-2025-40201
Vulnerability from fkie_nvd - Published: 2025-11-12 22:15 - Updated: 2025-11-14 16:42| URL | Tags | ||
|---|---|---|---|
| 416baaa9-dc9f-4396-8d5f-8c081fb06d67 | https://git.kernel.org/stable/c/132f827e7bac7373e1522e89709d70b43cae5342 | ||
| 416baaa9-dc9f-4396-8d5f-8c081fb06d67 | https://git.kernel.org/stable/c/19b45c84bd9fd42fa97ff80c6350d604cb871c75 | ||
| 416baaa9-dc9f-4396-8d5f-8c081fb06d67 | https://git.kernel.org/stable/c/1bc0d9315ef5296abb2c9fd840336255850ded18 | ||
| 416baaa9-dc9f-4396-8d5f-8c081fb06d67 | https://git.kernel.org/stable/c/6796412decd2d8de8ec708213bbc958fab72f143 | ||
| 416baaa9-dc9f-4396-8d5f-8c081fb06d67 | https://git.kernel.org/stable/c/a15f37a40145c986cdf289a4b88390f35efdecc4 |
| Vendor | Product | Version |
|---|
{
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "In the Linux kernel, the following vulnerability has been resolved:\n\nkernel/sys.c: fix the racy usage of task_lock(tsk-\u003egroup_leader) in sys_prlimit64() paths\n\nThe usage of task_lock(tsk-\u003egroup_leader) in sys_prlimit64()-\u003edo_prlimit()\npath is very broken.\n\nsys_prlimit64() does get_task_struct(tsk) but this only protects task_struct\nitself. If tsk != current and tsk is not a leader, this process can exit/exec\nand task_lock(tsk-\u003egroup_leader) may use the already freed task_struct.\n\nAnother problem is that sys_prlimit64() can race with mt-exec which changes\n-\u003egroup_leader. In this case do_prlimit() may take the wrong lock, or (worse)\n-\u003egroup_leader may change between task_lock() and task_unlock().\n\nChange sys_prlimit64() to take tasklist_lock when necessary. This is not\nnice, but I don\u0027t see a better fix for -stable."
}
],
"id": "CVE-2025-40201",
"lastModified": "2025-11-14T16:42:30.503",
"metrics": {},
"published": "2025-11-12T22:15:47.283",
"references": [
{
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"url": "https://git.kernel.org/stable/c/132f827e7bac7373e1522e89709d70b43cae5342"
},
{
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"url": "https://git.kernel.org/stable/c/19b45c84bd9fd42fa97ff80c6350d604cb871c75"
},
{
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"url": "https://git.kernel.org/stable/c/1bc0d9315ef5296abb2c9fd840336255850ded18"
},
{
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"url": "https://git.kernel.org/stable/c/6796412decd2d8de8ec708213bbc958fab72f143"
},
{
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"url": "https://git.kernel.org/stable/c/a15f37a40145c986cdf289a4b88390f35efdecc4"
}
],
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"vulnStatus": "Awaiting Analysis"
}
BDU:2025-14656
Vulnerability from fstec - Published: 15.09.2025{
"CVSS 2.0": "AV:L/AC:H/Au:S/C:P/I:P/A:C",
"CVSS 3.0": "AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:H",
"CVSS 4.0": null,
"remediation_\u0418\u0434\u0435\u043d\u0442\u0438\u0444\u0438\u043a\u0430\u0442\u043e\u0440": null,
"remediation_\u041d\u0430\u0438\u043c\u0435\u043d\u043e\u0432\u0430\u043d\u0438\u0435": null,
"\u0412\u0435\u043d\u0434\u043e\u0440 \u041f\u041e": "\u0421\u043e\u043e\u0431\u0449\u0435\u0441\u0442\u0432\u043e \u0441\u0432\u043e\u0431\u043e\u0434\u043d\u043e\u0433\u043e \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c\u043d\u043e\u0433\u043e \u043e\u0431\u0435\u0441\u043f\u0435\u0447\u0435\u043d\u0438\u044f, Red Hat Inc.",
"\u0412\u0435\u0440\u0441\u0438\u044f \u041f\u041e": "12 (Debian GNU/Linux), 9 (Red Hat Enterprise Linux), 10 (Red Hat Enterprise Linux), 13 (Debian GNU/Linux), \u0434\u043e 6.18 rc1 (Linux), \u043e\u0442 6.6 \u0434\u043e 6.6.113 (Linux), \u043e\u0442 6.12 \u0434\u043e 6.12.54 (Linux), \u043e\u0442 6.17 \u0434\u043e 6.17.4 (Linux), \u043e\u0442 5.18 \u0434\u043e 6.1.157 (Linux)",
"\u0412\u043e\u0437\u043c\u043e\u0436\u043d\u044b\u0435 \u043c\u0435\u0440\u044b \u043f\u043e \u0443\u0441\u0442\u0440\u0430\u043d\u0435\u043d\u0438\u044e": "\u0412 \u0443\u0441\u043b\u043e\u0432\u0438\u044f\u0445 \u043e\u0442\u0441\u0443\u0442\u0441\u0442\u0432\u0438\u044f \u043e\u0431\u043d\u043e\u0432\u043b\u0435\u043d\u0438\u0439 \u0431\u0435\u0437\u043e\u043f\u0430\u0441\u043d\u043e\u0441\u0442\u0438 \u043e\u0442 \u043f\u0440\u043e\u0438\u0437\u0432\u043e\u0434\u0438\u0442\u0435\u043b\u044f \u0440\u0435\u043a\u043e\u043c\u0435\u043d\u0434\u0443\u0435\u0442\u0441\u044f \u043f\u0440\u0438\u0434\u0435\u0440\u0436\u0438\u0432\u0430\u0442\u044c\u0441\u044f \"\u0420\u0435\u043a\u043e\u043c\u0435\u043d\u0434\u0430\u0446\u0438\u0439 \u043f\u043e \u0431\u0435\u0437\u043e\u043f\u0430\u0441\u043d\u043e\u0439 \u043d\u0430\u0441\u0442\u0440\u043e\u0439\u043a\u0435 \u043e\u043f\u0435\u0440\u0430\u0446\u0438\u043e\u043d\u043d\u044b\u0445 \u0441\u0438\u0441\u0442\u0435\u043c LINUX\", \u0438\u0437\u043b\u043e\u0436\u0435\u043d\u043d\u044b\u0445 \u0432 \u043c\u0435\u0442\u043e\u0434\u0438\u0447\u0435\u0441\u043a\u043e\u043c \u0434\u043e\u043a\u0443\u043c\u0435\u043d\u0442\u0435 \u0424\u0421\u0422\u042d\u041a \u0420\u043e\u0441\u0441\u0438\u0438, \u0443\u0442\u0432\u0435\u0440\u0436\u0434\u0451\u043d\u043d\u043e\u043c 25 \u0434\u0435\u043a\u0430\u0431\u0440\u044f 2022 \u0433\u043e\u0434\u0430.\n\n\u0418\u0441\u043f\u043e\u043b\u044c\u0437\u043e\u0432\u0430\u043d\u0438\u0435 \u0440\u0435\u043a\u043e\u043c\u0435\u043d\u0434\u0430\u0446\u0438\u0439:\n\u0414\u043b\u044f Linux:\nhttps://lore.kernel.org/linux-cve-announce/2025111246-CVE-2025-40201-b8fe@gregkh/\nhttps://git.kernel.org/stable/c/132f827e7bac7373e1522e89709d70b43cae5342 \nhttps://git.kernel.org/stable/c/19b45c84bd9fd42fa97ff80c6350d604cb871c75 \nhttps://git.kernel.org/stable/c/1bc0d9315ef5296abb2c9fd840336255850ded18 \nhttps://git.kernel.org/stable/c/6796412decd2d8de8ec708213bbc958fab72f143 \nhttps://git.kernel.org/stable/c/a15f37a40145c986cdf289a4b88390f35efdecc4\n\n\u0414\u043b\u044f Debian GNU/Linux:\nhttps://security-tracker.debian.org/tracker/CVE-2025-40201\n\n\u0414\u043b\u044f \u043f\u0440\u043e\u0434\u0443\u043a\u0442\u043e\u0432 Red Hat Inc.:\nhttps://access.redhat.com/security/cve/cve-2025-40201",
"\u0414\u0430\u0442\u0430 \u0432\u044b\u044f\u0432\u043b\u0435\u043d\u0438\u044f": "15.09.2025",
"\u0414\u0430\u0442\u0430 \u043f\u043e\u0441\u043b\u0435\u0434\u043d\u0435\u0433\u043e \u043e\u0431\u043d\u043e\u0432\u043b\u0435\u043d\u0438\u044f": "25.11.2025",
"\u0414\u0430\u0442\u0430 \u043f\u0443\u0431\u043b\u0438\u043a\u0430\u0446\u0438\u0438": "25.11.2025",
"\u0418\u0434\u0435\u043d\u0442\u0438\u0444\u0438\u043a\u0430\u0442\u043e\u0440": "BDU:2025-14656",
"\u0418\u0434\u0435\u043d\u0442\u0438\u0444\u0438\u043a\u0430\u0442\u043e\u0440\u044b \u0434\u0440\u0443\u0433\u0438\u0445 \u0441\u0438\u0441\u0442\u0435\u043c \u043e\u043f\u0438\u0441\u0430\u043d\u0438\u0439 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": "CVE-2025-40201",
"\u0418\u043d\u0444\u043e\u0440\u043c\u0430\u0446\u0438\u044f \u043e\u0431 \u0443\u0441\u0442\u0440\u0430\u043d\u0435\u043d\u0438\u0438": "\u0423\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c \u0443\u0441\u0442\u0440\u0430\u043d\u0435\u043d\u0430",
"\u041a\u043b\u0430\u0441\u0441 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": "\u0423\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c \u043a\u043e\u0434\u0430",
"\u041d\u0430\u0437\u0432\u0430\u043d\u0438\u0435 \u041f\u041e": "Debian GNU/Linux, Red Hat Enterprise Linux, Linux",
"\u041d\u0430\u0438\u043c\u0435\u043d\u043e\u0432\u0430\u043d\u0438\u0435 \u041e\u0421 \u0438 \u0442\u0438\u043f \u0430\u043f\u043f\u0430\u0440\u0430\u0442\u043d\u043e\u0439 \u043f\u043b\u0430\u0442\u0444\u043e\u0440\u043c\u044b": "\u0421\u043e\u043e\u0431\u0449\u0435\u0441\u0442\u0432\u043e \u0441\u0432\u043e\u0431\u043e\u0434\u043d\u043e\u0433\u043e \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c\u043d\u043e\u0433\u043e \u043e\u0431\u0435\u0441\u043f\u0435\u0447\u0435\u043d\u0438\u044f Debian GNU/Linux 12 , Red Hat Inc. Red Hat Enterprise Linux 9 , Red Hat Inc. Red Hat Enterprise Linux 10 , \u0421\u043e\u043e\u0431\u0449\u0435\u0441\u0442\u0432\u043e \u0441\u0432\u043e\u0431\u043e\u0434\u043d\u043e\u0433\u043e \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c\u043d\u043e\u0433\u043e \u043e\u0431\u0435\u0441\u043f\u0435\u0447\u0435\u043d\u0438\u044f Debian GNU/Linux 13 , \u0421\u043e\u043e\u0431\u0449\u0435\u0441\u0442\u0432\u043e \u0441\u0432\u043e\u0431\u043e\u0434\u043d\u043e\u0433\u043e \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c\u043d\u043e\u0433\u043e \u043e\u0431\u0435\u0441\u043f\u0435\u0447\u0435\u043d\u0438\u044f Linux \u0434\u043e 6.18 rc1 , \u0421\u043e\u043e\u0431\u0449\u0435\u0441\u0442\u0432\u043e \u0441\u0432\u043e\u0431\u043e\u0434\u043d\u043e\u0433\u043e \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c\u043d\u043e\u0433\u043e \u043e\u0431\u0435\u0441\u043f\u0435\u0447\u0435\u043d\u0438\u044f Linux \u043e\u0442 6.6 \u0434\u043e 6.6.113 , \u0421\u043e\u043e\u0431\u0449\u0435\u0441\u0442\u0432\u043e \u0441\u0432\u043e\u0431\u043e\u0434\u043d\u043e\u0433\u043e \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c\u043d\u043e\u0433\u043e \u043e\u0431\u0435\u0441\u043f\u0435\u0447\u0435\u043d\u0438\u044f Linux \u043e\u0442 6.12 \u0434\u043e 6.12.54 , \u0421\u043e\u043e\u0431\u0449\u0435\u0441\u0442\u0432\u043e \u0441\u0432\u043e\u0431\u043e\u0434\u043d\u043e\u0433\u043e \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c\u043d\u043e\u0433\u043e \u043e\u0431\u0435\u0441\u043f\u0435\u0447\u0435\u043d\u0438\u044f Linux \u043e\u0442 6.17 \u0434\u043e 6.17.4 , \u0421\u043e\u043e\u0431\u0449\u0435\u0441\u0442\u0432\u043e \u0441\u0432\u043e\u0431\u043e\u0434\u043d\u043e\u0433\u043e \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c\u043d\u043e\u0433\u043e \u043e\u0431\u0435\u0441\u043f\u0435\u0447\u0435\u043d\u0438\u044f Linux \u043e\u0442 5.18 \u0434\u043e 6.1.157 ",
"\u041d\u0430\u0438\u043c\u0435\u043d\u043e\u0432\u0430\u043d\u0438\u0435 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": "\u0423\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c \u043c\u043e\u0434\u0443\u043b\u044f kernel/sys.c \u044f\u0434\u0440\u0430 \u043e\u043f\u0435\u0440\u0430\u0446\u0438\u043e\u043d\u043d\u043e\u0439 \u0441\u0438\u0441\u0442\u0435\u043c\u044b Linux, \u043f\u043e\u0437\u0432\u043e\u043b\u044f\u044e\u0449\u0430\u044f \u043d\u0430\u0440\u0443\u0448\u0438\u0442\u0435\u043b\u044e \u0432\u044b\u0437\u0432\u0430\u0442\u044c \u043e\u0442\u043a\u0430\u0437 \u0432 \u043e\u0431\u0441\u043b\u0443\u0436\u0438\u0432\u0430\u043d\u0438\u0438",
"\u041d\u0430\u043b\u0438\u0447\u0438\u0435 \u044d\u043a\u0441\u043f\u043b\u043e\u0439\u0442\u0430": "\u0414\u0430\u043d\u043d\u044b\u0435 \u0443\u0442\u043e\u0447\u043d\u044f\u044e\u0442\u0441\u044f",
"\u041e\u043f\u0438\u0441\u0430\u043d\u0438\u0435 \u043e\u0448\u0438\u0431\u043a\u0438 CWE": "\u041e\u0434\u043d\u043e\u0432\u0440\u0435\u043c\u0435\u043d\u043d\u043e\u0435 \u0432\u044b\u043f\u043e\u043b\u043d\u0435\u043d\u0438\u0435 \u0441 \u0438\u0441\u043f\u043e\u043b\u044c\u0437\u043e\u0432\u0430\u043d\u0438\u0435\u043c \u043e\u0431\u0449\u0435\u0433\u043e \u0440\u0435\u0441\u0443\u0440\u0441\u0430 \u0441 \u043d\u0435\u043f\u0440\u0430\u0432\u0438\u043b\u044c\u043d\u043e\u0439 \u0441\u0438\u043d\u0445\u0440\u043e\u043d\u0438\u0437\u0430\u0446\u0438\u0435\u0439 (\u00ab\u0421\u0438\u0442\u0443\u0430\u0446\u0438\u044f \u0433\u043e\u043d\u043a\u0438\u00bb) (CWE-362)",
"\u041e\u043f\u0438\u0441\u0430\u043d\u0438\u0435 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": "\u0423\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c \u043c\u043e\u0434\u0443\u043b\u044f kernel/sys.c \u044f\u0434\u0440\u0430 \u043e\u043f\u0435\u0440\u0430\u0446\u0438\u043e\u043d\u043d\u043e\u0439 \u0441\u0438\u0441\u0442\u0435\u043c\u044b Linux \u0441\u0432\u044f\u0437\u0430\u043d\u0430 \u0441 \u043e\u0448\u0438\u0431\u043a\u0430\u043c\u0438 \u0441\u0438\u043d\u0445\u0440\u043e\u043d\u0438\u0437\u0430\u0446\u0438\u0438 \u043f\u0440\u0438 \u0438\u0441\u043f\u043e\u043b\u044c\u0437\u043e\u0432\u0430\u043d\u0438\u0438 \u043e\u0431\u0449\u0435\u0433\u043e \u0440\u0435\u0441\u0443\u0440\u0441\u0430. \u042d\u043a\u0441\u043f\u043b\u0443\u0430\u0442\u0430\u0446\u0438\u044f \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438 \u043c\u043e\u0436\u0435\u0442 \u043f\u043e\u0437\u0432\u043e\u043b\u0438\u0442\u044c \u043d\u0430\u0440\u0443\u0448\u0438\u0442\u0435\u043b\u044e \u0432\u044b\u0437\u0432\u0430\u0442\u044c \u043e\u0442\u043a\u0430\u0437 \u0432 \u043e\u0431\u0441\u043b\u0443\u0436\u0438\u0432\u0430\u043d\u0438\u0438",
"\u041f\u043e\u0441\u043b\u0435\u0434\u0441\u0442\u0432\u0438\u044f \u044d\u043a\u0441\u043f\u043b\u0443\u0430\u0442\u0430\u0446\u0438\u0438 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": null,
"\u041f\u0440\u043e\u0447\u0430\u044f \u0438\u043d\u0444\u043e\u0440\u043c\u0430\u0446\u0438\u044f": null,
"\u0421\u0432\u044f\u0437\u044c \u0441 \u0438\u043d\u0446\u0438\u0434\u0435\u043d\u0442\u0430\u043c\u0438 \u0418\u0411": "\u0414\u0430\u043d\u043d\u044b\u0435 \u0443\u0442\u043e\u0447\u043d\u044f\u044e\u0442\u0441\u044f",
"\u0421\u043e\u0441\u0442\u043e\u044f\u043d\u0438\u0435 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": "\u041e\u043f\u0443\u0431\u043b\u0438\u043a\u043e\u0432\u0430\u043d\u0430",
"\u0421\u043f\u043e\u0441\u043e\u0431 \u0443\u0441\u0442\u0440\u0430\u043d\u0435\u043d\u0438\u044f": "\u041e\u0431\u043d\u043e\u0432\u043b\u0435\u043d\u0438\u0435 \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c\u043d\u043e\u0433\u043e \u043e\u0431\u0435\u0441\u043f\u0435\u0447\u0435\u043d\u0438\u044f",
"\u0421\u043f\u043e\u0441\u043e\u0431 \u044d\u043a\u0441\u043f\u043b\u0443\u0430\u0442\u0430\u0446\u0438\u0438": "\u041c\u0430\u043d\u0438\u043f\u0443\u043b\u0438\u0440\u043e\u0432\u0430\u043d\u0438\u0435 \u0441\u0440\u043e\u043a\u0430\u043c\u0438 \u0438 \u0441\u043e\u0441\u0442\u043e\u044f\u043d\u0438\u0435\u043c",
"\u0421\u0441\u044b\u043b\u043a\u0438 \u043d\u0430 \u0438\u0441\u0442\u043e\u0447\u043d\u0438\u043a\u0438": "https://lore.kernel.org/linux-cve-announce/2025111246-CVE-2025-40201-b8fe@gregkh/\nhttps://git.kernel.org/stable/c/132f827e7bac7373e1522e89709d70b43cae5342 \nhttps://git.kernel.org/stable/c/19b45c84bd9fd42fa97ff80c6350d604cb871c75 \nhttps://git.kernel.org/stable/c/1bc0d9315ef5296abb2c9fd840336255850ded18 \nhttps://git.kernel.org/stable/c/6796412decd2d8de8ec708213bbc958fab72f143 \nhttps://git.kernel.org/stable/c/a15f37a40145c986cdf289a4b88390f35efdecc4\nhttps://security-tracker.debian.org/tracker/CVE-2025-40201\nhttps://access.redhat.com/security/cve/cve-2025-40201",
"\u0421\u0442\u0430\u0442\u0443\u0441 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": "\u041f\u043e\u0434\u0442\u0432\u0435\u0440\u0436\u0434\u0435\u043d\u0430 \u043f\u0440\u043e\u0438\u0437\u0432\u043e\u0434\u0438\u0442\u0435\u043b\u0435\u043c",
"\u0422\u0438\u043f \u041f\u041e": "\u041e\u043f\u0435\u0440\u0430\u0446\u0438\u043e\u043d\u043d\u0430\u044f \u0441\u0438\u0441\u0442\u0435\u043c\u0430",
"\u0422\u0438\u043f \u043e\u0448\u0438\u0431\u043a\u0438 CWE": "CWE-362",
"\u0423\u0440\u043e\u0432\u0435\u043d\u044c \u043e\u043f\u0430\u0441\u043d\u043e\u0441\u0442\u0438 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": "\u0421\u0440\u0435\u0434\u043d\u0438\u0439 \u0443\u0440\u043e\u0432\u0435\u043d\u044c \u043e\u043f\u0430\u0441\u043d\u043e\u0441\u0442\u0438 (\u0431\u0430\u0437\u043e\u0432\u0430\u044f \u043e\u0446\u0435\u043d\u043a\u0430 CVSS 2.0 \u0441\u043e\u0441\u0442\u0430\u0432\u043b\u044f\u0435\u0442 5)\n\u0421\u0440\u0435\u0434\u043d\u0438\u0439 \u0443\u0440\u043e\u0432\u0435\u043d\u044c \u043e\u043f\u0430\u0441\u043d\u043e\u0441\u0442\u0438 (\u0431\u0430\u0437\u043e\u0432\u0430\u044f \u043e\u0446\u0435\u043d\u043a\u0430 CVSS 3.1 \u0441\u043e\u0441\u0442\u0430\u0432\u043b\u044f\u0435\u0442 5,8)"
}
Sightings
| Author | Source | Type | Date |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or observed by the user.
- Confirmed: The vulnerability has been validated from an analyst's perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
- Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
- Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
- Not confirmed: The user expressed doubt about the validity of the vulnerability.
- Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.